Next Article in Journal
Remote-State PWM with Minimum RMS Torque Ripple and Reduced Common-Mode Voltage for Three-Phase VSI-Fed BLAC Motor Drives
Next Article in Special Issue
Performance Analysis of Interference-Aware Multi-Packet Reception Networks
Previous Article in Journal
Ultra-Compact Reconfigurable Band Reject UWB MIMO Antenna with Four Radiators
Previous Article in Special Issue
Analytical Performance Evaluation of Massive MIMO Techniques for SC-FDE Modulations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Information Transmission with Self Jamming SWIPT

by
Akashkumar Rajaram
1,2,3,*,
Rui Dinis
1,3,
Dushnatha Nalin K. Jayakody
2,4 and
Marko Beko
3,5
1
Faculty of Science and Technology, New University of Lisbon, 2829-516 Caparica, Portugal
2
School of Computer Science and Robotics, National Research Tomsk Polytechnic University, 634050 Tomsk, Russia
3
COPELABS, Universidade Lusòfona de Humanidades e Tecnologias, 1749-024 Lisboa, Portugal
4
School of Engineering, Sri Lanka Technological Campus, 10500 Padukka City, Sri Lanka
5
UNINOVA, Monte da Caparica, 2829-516 Caparica, Portugal
*
Author to whom correspondence should be addressed.
Electronics 2020, 9(4), 587; https://doi.org/10.3390/electronics9040587
Submission received: 27 February 2020 / Revised: 25 March 2020 / Accepted: 25 March 2020 / Published: 30 March 2020
(This article belongs to the Special Issue Cooperative Communications for Future Wireless Systems)

Abstract

:
This article is focused on implementing simultaneous wireless information and power transmission as a physical layer security measure by using artificial noise. A series of high energy precoded symbols is simultaneously transmitted along with the information symbols over a Rayleigh frequency selective fading channel. The high energy precoded symbols act as an artificial noise for the eavesdroppers. The energy symbols are precoded on the basis of a legitimate user’s channel matrix to form a null space vector, which eliminates the interference of energy symbols at the information symbol receiver antennas, while allowing the rectenna to harvest energy from the superimposed information and energy symbols. We analyze the secrecy rate and error rate performance at the receiver under different circumstances, and we show that the performance of the legitimate user can be improved by using the iterative block decision feedback equalization method at the receiver.

1. Introduction

In a dense wireless communication network (WCN), both the energy and security reliability need to be assured. This represents a challenge in the case of a network with a huge number of nodes [1]. Thus, in order to keep up with the energy demands of the increasing number of network nodes, new radio frequency energy harvesting (EH) techniques like simultaneous wireless information and power transmission (SWIPT) are investigated for 5G networks [1,2,3]. Apart from harvesting energy by using SWIPT techniques, many other signal processing applications like channel estimation with SWIPT [4] and physical layer security (PLS) measures with the help of SWIPT technique were investigated in [5]. One of the most important techniques in improving PLS in a wiretap channel is using artificial noise (AN) in the communication channel to degrade the signal-to-noise plus interference ratio (SINR) of eavesdroppers; thereby improving the security of legitimate users [6]. The high energy signal that is used for harvesting energy in SWIPT can also be adopted for creating AN to improve PLS, as in [7]. The secrecy rate of legitimate users in a wiretap channel can be improved with the SINR degradation of eavesdroppers as in [8,9]. Furthermore, the secrecy rate for the multiple-input and multiple-output (MIMO) system model was established in [10]. To avoid the impact of AN on the legitimate receiver, AN is introduced in the null space of the legitimate receiver’s channel matrix. Thereby, AN degrades the SINR of eavesdroppers without compromising the quality of the legitimate users’ signal [11]. However, the successful negation of AN is dependent on the channel state information (CSI) of the receiver at the legitimate transmitter and can be effectively used against very robust eavesdroppers as in [12,13]. This is considered as a challenge in the imperfect CSI condition [14,15]. Another challenge in using AN against eavesdroppers lies in the fact that a jamming attack depends on the channel correlation between the eavesdroppers and legitimate receiver; if the channel correlation is very high, then AN can be partially canceled out by the eavesdropper [16,17].
In this article, we use energy signals as a source of AN for secure communication, but also to harvest energy at the receiver. We consider the conventional MIMO system model with separate antennas for data and energy signal transmission and reception. AN is created by the transmitter by using channel precoding based on the CSI of the receiver. In this paper, we analyze the impact on channel precoding based on imperfect CSI. Furthermore, we also consider high channel correlation between eavesdroppers and the legitimate receiver as one of the challenges in the analysis. Our main contribution in this paper involves improving the error rate and secrecy rate performance of the legitimate receiver using iterative block decision feedback equalization (IB-DFE). IB-DFE is an efficient low complex receiver and performs better than non-iterative methods [18]. IB-DFE is effectively used with the single carrier frequency-division multiple access (SC-FDMA) transmission technique, and its performance was studied in detail [19,20,21]. IB-DFE can also be used to improve channel estimation at the transmitter side against imperfect CSI by using the robust superimposed pilot signal method for accurate channel estimation, as in [4,22]. For a fair comparison between the legitimate user and eavesdroppers, we also analyze the impact of imperfect CSI on the legitimate user’s performance.
Throughout this article, matrices or vectors are denoted by bold letters, and scalar variables are denoted by italic letters. The variables associated with the frequency domain and time domain are denoted by capital letters and small letters, respectively. ( . ) * , ( . ) T , ( . ) H , | | . | | , and E [ . ] denote the conjugate, transpose, Hermitian, trace, and expectation operation, respectively.

2. System Model

The MIMO system model is shown in Figure 1. It is composed of three transmitting antennas and two receiving antennas, with a dedicated transmitting antenna and a receiving antenna for information transmission, denoted as T and R, respectively. The other two transmitting antennas, E 1 and E 2 , are used for energy transmission, and the rectenna is used to harvest energy from the physical layer network coded (PLNC) signal. The eavesdropper is denoted as ξ . It is assumed that E 1 , E 2 , and T are not spatially correlated. In Figure 1, based on the location of ξ , if ξ is very close to R, ξ is considered to have high channel correlation with R [16]. The system adopts the quadrature amplitude modulation (QAM) signal over the Rayleigh frequency selective fading channel by using SC-FDMA for simultaneously transferring information from T and the high energy signal from E 1 and E 2 to both R and . The frequency domain signals transmitted from T , E 1 , and E 2 are denoted as X I ( k ) , X E 1 ( k ) , and X E 2 ( k ) , respectively, where k represents the index of the symbol with k = 0 , 1 , K and K is the total number of symbols in the respective signal stream. The frame structure of X I , X E 1 , and X E 2 is illustrated in Figure 2, where the time duration per symbol, block duration, and total time for all the blocks are denoted as T , T l , and T l L , respectively. A frame consists of L signal blocks where each signal block contains N symbols. The signal blocks are denoted as l, where l = 0 , 1 , L . We assume that X I ( k ) , X E 1 ( k ) , and X E 2 ( k ) are transmitted with perfect time synchronization and in equal block size. The following system of equations is considered for a single block, and therefore, we set l = 1 .
S E 1 , S E 2 , and S I are the unamplified versions of X E 1 , X E 2 , and X I , respectively, and the power amplification levels of energy symbols and information symbols are at different levels. P E 1 , P E 2 , and P I denote the transmit powers of X E 1 , X E 2 , and X I , respectively. For the sake of simplicity, without loss of generality, we assume that P E 1 = P E 2 . The relationship between the power levels of energy and information symbols is given as:
X I ( k ) = S I ( k ) P I ; X E 1 ( k ) = S E 1 ( k ) P E 1 ; X E 2 ( k ) = S E 2 ( k ) P E 2 ; β = 2 P E 1 P I ,
where β is the ratio between the transmit power of the energy and information signal.
Throughout this paper, the channel coefficient for the channel link between two nodes, i.e., for example, nodes T and R, is denoted as H T R ( k ) , where k represents the index of channel coefficient with respect to the transmitted symbol in the signal stream. Then, H T R ( k ) is characterized as H T R ( k ) CN ( 0 , σ H , T R 2 ) , and its channel gain is given as | ( H T R ( k ) ) 2 | Exp { σ H , T R 2 } , where σ H , T R 2 is the variance of H T R ( k ) . Since all the channel links between the nodes are Rayleigh frequency selective fading channels, they follow similar notation and channel characterization as H T R ( k ) . Similarly, the channel coefficients corresponding to the channel link between E 1 and R, E 2 and R, T and , E 1 and , E 2 and , T and ξ , E 1 and ξ , and E 2 and ξ are denoted as H E 1 R ( k ) , H E 2 R ( k ) , H T ( k ) , H E 1 ( k ) , H E 2 ( k ) , H T ξ ( k ) , H E 1 ξ ( k ) , and H E 2 ξ ( k ) , respectively. The received signals at R, , and ξ experience additive white Gaussian noise (AWGN) modeled as a zero mean complex Gaussian random variable, and their respective AWGNs are given as N ( k ) CN ( 0 , σ N 2 ) , W ( k ) CN ( 0 , σ W 2 ) , and J ( k ) CN ( 0 , σ J 2 ) , respectively.
The system model exploits the CSI of H E 2 R ( k ) and H E 1 R ( k ) , to cancel the interference of the energy signals to the information signal at R. X E 1 ( k ) and X E 2 ( k ) will be precoded to equalize H E 2 R ( k ) and H E 1 R ( k ) , respectively. Unlike R, the eavesdropper ξ receives a highly distorted signal, which makes the decoding process difficult. In general, ξ can decode the information based on the estimated value of X E 1 ( k ) , X E 2 ( k ) , H E 2 R ( k ) , and H E 1 R ( k ) . Furthermore, to reduce the accuracy of these estimated values at ξ , the EH signal should act as AN. Similar to ξ , will receive the combination of all the transmitted signals as a PLNC signal. Furthermore, can effectively take advantage of the PLNC signal for harvesting energy, and the received PLNC signal at is given as:
Y ( k ) = H E 1 ( k ) X E 1 ( k ) + H E 2 ( k ) X E 2 ( k ) + H T ( k ) X I ( k ) + W ( k ) .
The performance of this secure self jamming SWIPT technique is analyzed based on the secrecy rate and the bit error rate (BER). Here, three different scenarios are considered, and in all the scenarios, R and ξ are considered to have a CSI of H T R and H T ξ , respectively. Here, both R and ξ do not have a CSI of H E 1 R and H E 2 R . The assumptions behind the three scenarios are explained as follows:
A
Scenario A: T has the CSI of H E 1 R and H E 2 R . ξ is assumed to be far away from R, and ξ does not have channel correlation. In this scenario, ξ is denoted as ξ ( a ) , and R is denoted as R ( a ) .
B
Scenario B: T does not have the CSI of H E 1 R and H E 2 R , and T estimates H E 1 R and H E 2 R . ξ is assumed to be very close to R, and their channel correlation is very high. In this scenario, ξ is denoted as ξ ( b ) , and R is denoted as R ( b ) .
C
Scenario C: This scenario is similar to A where T has the CSI of H E 1 R and H E 2 R , but here, ξ is assumed to be very close to R, and their channel correlation is very high. In this scenario, ξ is denoted as ξ ( c ) . Based on the perfect CSI condition, R is the same in Scenario A and Scenario C.
Then, the received signal at R ( a ) is given as:
Y R ( a ) ( k ) = H T R ( k ) X I ( k ) + N ( k ) ; if L ( V ( k ) ) = 0 , H T R ( k ) X I ( k ) + N ( k ) + H E 1 R ( k ) X E 1 ( k ) + H E 2 R ( k ) X E 2 ( k ) ; otherwise ,
where L ( . ) denotes the linear subspace of a vector and V ( k ) = H E 1 R ( k ) X E 1 ( k ) + H E 2 R ( k ) X E 2 ( k ) . Here, H E 1 R ( k ) X E 1 ( k ) is the additive inverse of H E 2 R ( k ) X E 2 ( k ) , and this allows T to nullify the interference of X E 1 ( k ) and X E 2 ( k ) . To achieve L ( H E 1 R ( k ) X E 1 ( k ) + H E 2 R ( k ) X E 2 ( k ) ) = 0 , both X E 1 ( k ) and X E 2 ( k ) should be precoded based on the CSI of the EH signals; thereby, the inference of EH signals to X I ( k ) can be reduced to a negligible level as in (3). The precoded X E 1 ( k ) and X E 2 ( k ) are given in Appendix A.1. Therefore, due to precoding, the SINR of Y R ( a ) at R ( a ) does not experience any interference from EH signals, which is given as:
Γ R ( a ) = E [ | X I T H T R | 2 ] E [ | | N | | 2 ] = σ X , I 2 σ H , T R 2 σ N 2 ,
where E [ | X I | 2 ] = σ X , I 2 . Thus, under the perfect channel condition, the EH signal does not affect the performance of the legitimate receiver R.
Irrespective of its location, ξ receives the signal with low SINR due to the EH signal interference. The received signal at ξ ( a ) is given as:
Y ξ ( k ) ( a ) = H T ξ ( k ) X I ( k ) + H E 1 ξ ( k ) X E 1 ( k ) + H E 2 ξ ( k ) X E 2 ( k ) + J ( k ) ,
where Y ξ ( k ) ( a ) is the PLNC signal, H T ξ ( k ) X I ( k ) is the useful information component, and the EH signal components ( H E 1 ξ ( k ) X E 1 ( k ) and H E 2 ξ ( k ) X E 2 ( k ) ) are considered as interference to X I ( k ) . Hence, the SINR of Y ξ ( a ) at ξ ( a ) is given as:
Γ ξ ( a ) = E [ | X I T H T ξ | 2 ] E [ | X E 1 T H E 1 ξ | 2 ] + E [ | X E 2 T H E 2 ξ | 2 ] + E [ | | J | | 2 ] = σ X , I 2 σ H , T ξ 2 σ H , E 1 ξ 2 σ X , E 1 2 + σ H , E 2 ξ 2 σ X , E 2 2 + σ J 2 .
Note that the performance of the legitimate user is dependent on the perfect channel condition, which allows E 1 and E 2 to perform signal precoding using CSI. With the imperfect channel condition, the performance of R is dependent on a robust channel estimation technique as in [2,4]. The channel estimates of H E 1 R and H E 2 R are obtained by using training symbols from R to E 1 and E 2 , respectively. The channel estimates of H E 1 R ( k ) and H E 2 R ( k ) , respectively, are given as H ^ E 1 R ( k ) = H E 1 R ( k ) + ϵ E 1 R ( k ) and H ^ E 2 R ( k ) = H E 2 R ( k ) + ϵ E 1 R ( k ) . Here, ϵ E 1 R ( k ) and ϵ E 2 R ( k ) are the channel estimation errors of H E 1 R ( k ) and H E 2 R ( k ) , respectively. Then, the new precoded EH signals denoted as X E 1 ( k ) and X E 2 ( k ) are expressed in Appendix A.2. ϵ A , E 1 ( k ) and ϵ A , E 2 ( k ) are the precoding errors due to channel estimation error at ϵ E 2 R ( k ) A E 1 ( k ) and ϵ E 1 R ( k ) A E 2 ( k ) , respectively.
Similarly, the received signal at R ( b ) based on the impact of H ^ E 1 R ( k ) and H ^ E 2 R ( k ) is given as:
Y R ( b ) ( k ) = H T R ( k ) X I ( k ) + N ( k ) + ε R ( b ) , E 1 ( k ) + ε R ( b ) , E 2 ( k ) ; if L ( V ( k ) ) = ε R ( b ) ( k ) , H T R ( k ) X I ( k ) + N ( k ) + H E 1 R ( k ) X E 1 ( k ) + H E 2 R ( k ) X E 2 ( k ) ; otherwise ,
where ε R ( b ) , E 1 ( k ) = H E 1 R ( k ) ϵ A , E 2 ( k ) , ε R ( b ) , E 2 ( k ) = H E 2 R ( k ) ϵ A , E 1 ( k ) , and ε R ( b ) , E 1 ( k ) and ε R ( b ) , E 2 ( k ) are the additional noise components of Y R ( b ) ( k ) due to precoding error. Then, L ( H E 1 R ( k ) X E 1 ( k ) + H E 2 R ( k ) X E 2 ( k ) ) = ε R ( b ) ( k ) , where ε R ( b ) ( k ) = ε R ( b ) , E 1 ( k ) + ε R ( b ) , E 2 ( k ) . The SINR of Y R ( b ) for the condition L ( V ( k ) ) = ε R ( b ) ( k ) is given as:
Γ R ( b ) = E [ | X I T H T R | 2 ] E [ ( k = 0 K 1 | ε R ( b ) , E 1 ( k ) | ) 2 ] + E [ ( k = 0 K 1 | ε R ( b ) , E 2 ( k ) | ) 2 ] + E [ | | N | | 2 ] = σ X , I 2 σ H , T R 2 σ ε , R ( b ) , E 1 2 + σ ε , R ( b ) , E 2 2 + σ N 2 .
Note that, since R does not need to equalize H E 1 R ( k ) and H E 2 R ( k ) , their respective channel estimation errors ϵ E 1 R ( k ) and ϵ E 2 R ( k ) are neglected in Equation (8).
The performance of ξ ( b ) is better than ξ ( a ) due to high channel correlations between H E 1 ξ and H E 1 R and also between H E 2 ξ and H E 2 R . Let us denote the channel correlation between H E 1 ξ and H E 1 R as ρ E 1 . Furthermore, let us denote the channel correlation between between H E 2 ξ and H E 2 R as ρ E 2 . ρ E 1 and ρ E 2 are expressed in Appendix B. The error due to ρ E 1 and ρ E 2 is denoted as ϵ ρ , E 1 and ϵ ρ , E 2 , respectively. The channel precodings at E 1 and E 2 from the perspective of ξ ( b ) , respectively, are given as:
X E 1 ( k ) ( 1 + ϵ ρ , E 2 ) = ( X E 1 ( k ) + ϵ A , E 1 ( k ) ) ( 1 + ϵ ρ , E 2 ) = A E 1 ( k ) ( H E 2 R ( k ) + ϵ E 2 R ( k ) ) ( 1 + ϵ ρ , E 2 ) , X E 2 ( k ) ( 1 + ϵ ρ , E 1 ) = ( X E 2 ( k ) + ϵ A , E 2 ( k ) ) ( 1 + ϵ ρ , E 1 ) = A E 2 ( k ) ( H E 1 R ( k ) + ϵ E 1 R ( k ) ) ( 1 + ϵ ρ , E 1 ) .
From the perspective of ξ , ( 1 + ϵ ρ , E 2 ) and ( 1 + ϵ ρ , E 2 ) are the impacts on X E 1 ( k ) and X E 2 ( k ) , respectively, which degrade the precoded EH signals and increase the precoding errors.
The received signal at ξ ( b ) is given as:
Y ξ ( b ) ( k ) = H T ξ ( k ) X I ( k ) + J ( k ) + ε ξ ( b ) , E 1 ( k ) + ε ξ ( b ) , E 2 ( k ) ; if L ( V ( k ) ) = ε ξ ( b ) ( k ) , H T ξ ( k ) X I ( k ) + J ( k ) + H E 1 R ( k ) X E 1 ( k ) ( 1 + ϵ ρ , E 2 ) + H E 2 R ( k ) X E 2 ( k ) ( 1 + ϵ ρ , E 1 ) ; otherwise .
where ε ξ ( b ) , E 1 ( k ) = H E 1 R ( k ) ( X E 1 ( k ) + ϵ A , E 1 ( k ) ) ( 1 + ϵ ρ , E 2 ) X E 2 ( k ) , ε ξ ( b ) , E 2 ( k ) = H E 2 R ( k ) ( X E 2 ( k ) + ϵ A , E 2 ( k ) ) ( 1 + ϵ ρ , E 2 ) X E 1 ( k ) , and ε ξ ( b ) , E 1 ( k ) and ε ξ ( b ) , E 2 ( k ) are the additional noise components to Y ξ ( b ) ( k ) . Then, L ( H E 1 ξ ( k ) X E 1 ( k ) + H E 2 ξ ( k ) X E 2 ( k ) ) = ε ξ ( b ) ( k ) , where ε ξ ( b ) ( k ) = ε ξ ( b ) , E 1 ( k ) + ε ξ ( b ) , E 2 ( k ) . The SINR of Y ξ ( b ) for the condition L ( V ( k ) ) = ε ξ ( b ) ( k ) is given as:
Γ ξ ( b ) = E [ | X I T H T ξ | 2 ] E [ ( k = 0 K 1 | ε ξ ( b ) , E 1 ( k ) | ) 2 ] + E [ ( k = 0 K 1 | ε ξ ( b ) , E 2 ( k ) | ) 2 ] + E [ | | J | | 2 ] = σ X , I 2 σ H , T ξ 2 σ ε , ξ ( b ) , E 1 2 + σ ε , ξ ( b ) , E 2 2 + σ J 2 .
The best scenario for ξ is ξ ( c ) , where, the precoding errors due to the channel estimation errors can be avoided at T . However, there will be a precoding error due to H E 1 R ( k ) ( 1 + ϵ ρ , E 1 ) and H E 2 R ( k ) ( 1 + ϵ ρ , E 2 ) . Hence, the precoded EH signals can be written as:
X E 1 ( k ) ( 1 + ϵ ρ , E 2 ) = A E 1 ( k ) H E 2 R ( k ) ( 1 + ϵ ρ , E 2 ) , X E 2 ( k ) ( 1 + ϵ ρ , E 1 ) = A E 2 ( k ) H E 1 R ( k ) ( 1 + ϵ ρ , E 1 ) .
Then, the received signal at ξ ( c ) is given as:
Y ξ ( c ) ( k ) = H T ξ ( k ) X I ( k ) + N ( k ) + ε ξ ( c ) , E 1 ( k ) + ε ξ ( c ) , E 2 ( k ) ; if L ( V ( k ) ) = ε ξ ( c ) ( k ) , H T ξ ( k ) X I ( k ) + N ( k ) + H E 1 R ( k ) X E 1 ( k ) ( 1 + ϵ ρ , E 2 ) + H E 2 R ( k ) X E 2 ( k ) ( 1 + ϵ ρ , E 1 ) ; otherwise ,
where ε ξ ( c ) , E 1 ( k ) = H E 1 R ( k ) ( 1 + ϵ ρ , E 2 ) and ε ξ ( c ) , E 2 ( k ) = H E 2 R ( k ) ( 1 + ϵ ρ , E 1 ) . Then, L ( H E 1 ξ ( k ) X E 1 ( k ) + H E 2 ξ ( k ) X E 2 ( k ) ) = ε ξ ( c ) ( k ) , where ε ξ ( c ) ( k ) = ε ξ ( c ) , E 1 ( k ) + ε ξ ( c ) , E 2 ( k ) . The SINR of Y ξ ( c ) for the condition L ( V ( k ) ) = ε ξ ( c ) ( k ) is given as:
Γ ξ ( c ) = E [ | X I T H T ξ | 2 ] E [ ( k = 0 K 1 | ε ξ ( c ) , E 1 ( k ) | ) 2 ] + E [ ( k = 0 K 1 | ε ξ ( c ) , E 2 ( k ) | ) 2 ] + E [ | | J | | 2 ] = σ X , I 2 σ H , T ξ 2 σ ε , ξ ( c ) , E 1 2 + σ ε , ξ ( c ) , E 2 2 + σ J 2 .
For all the scenarios of ξ and R ( b ) , the channel precoding error is denoted as ϵ A , and its variance is denoted as σ A 2 . In this system model, both the channel estimate errors and the channel correlation errors are considered to be the sole contributors of ϵ A , and ϵ A proportionally increases with the increase in β . To form the generalized SINR equation, σ H , T R 2 and σ H , T ξ 2 are assumed as one; then, the SINR of the received signal at R and ξ can be written as:
Γ = σ X , I 2 σ N 2 + β σ A 2 ,
At a very high SINR of the information signal, σ N 2 can be neglected. Then, Equation (15) can be written as:
Γ σ X , I 2 β σ A 2 .
Therefore, even at a very high SINR condition, β σ A 2 can be used to degrade the performance of ξ . The secrecy of X I can be improved at R ( a ) and R ( b ) by increasing β under the condition that the σ A 2 value in Y R ( a ) and Y R ( b ) is lesser than the σ A 2 value in Y ξ ( a ) , Y ξ ( b ) , and Y ξ ( c ) . Another observation from Equation (15) indicates that, if β 1 , then ξ ( a ) will always be in the negative SINR region.

2.1. Secrecy Rate Analysis

The secrecy rate analysis of this system model is based on the Gaussian wiretap channel secrecy capacity, which deduces the difference between Shannon’s capacity of R and ξ . The maximum achievable secrecy rate is the secrecy capacity of R [8,9]. The secrecy capacity of R ( a ) with respect to ξ ( a ) and the secrecy capacity of R ( a ) with respect to ξ ( c ) , respectively, are given (The notation for the secrecy rate of R ( a ) with respect to ξ ( c ) is given as C ( c ) , A , where ( c ) denotes ξ ( c ) and A denotes R ( a ) . A similar rule is followed for the other three secrecy rate notions.) as:
C ( a ) , A = Δ f k k = 0 K 1 log 1 + | H T R ( k ) | 2 Γ R ( a ) 1 + | H T ξ ( k ) | 2 Γ ξ ( a ) , C ( c ) , A = Δ f k k = 0 K 1 log 1 + | H T R ( k ) | 2 Γ R ( a ) 1 + | H T ξ ( k ) | 2 Γ ξ ( c ) ,
where 2 Δ f is the bandwidth and Δ f is the peak frequency deviation. The secrecy capacity of R ( b ) with respect to ξ ( a ) and the secrecy capacity of R ( b ) with respect to ξ ( b ) , respectively, are given as:
C ( a ) , B = Δ f k k = 0 K 1 log 1 + | H T R ( k ) | 2 Γ R ( b ) 1 + | H T ξ ( k ) | 2 Γ ξ ( a ) , C ( b ) , B = Δ f k k = 0 K 1 log 1 + | H T R ( k ) | 2 Γ R ( b ) 1 + | H T ξ ( k ) | 2 Γ ξ ( b ) .
Here, the interference of the EH signals is used as the external noise to improve the maximum achievable secrecy rate of R, and by increasing β , the secrecy capacity can be improved in all scenarios. Even though β can reduce the capacity of R ( b ) due to the amplification of channel estimation errors, since ξ ( b ) also has channel correlation error in addition to the channel estimate errors, β will improve R’s secrecy capacity.

2.2. Iterative Block Decision Feedback Equalization Receiver

In this system model, it is assumed that both R and ξ employ IB-DFE to improve the accuracy of the information estimate as proposed in [18]. The IB-DFE based estimate for X I ( k ) at R is given as:
X ˜ I ( j , k ) = Y I ( k ) F ( j , k ) X ˜ I ( j 1 , k ) B ( j , k ) ,
where j = 0 , 1 , , J , j is the number of iterations followed in the IB-DFE receiver, X ˜ I ( j 1 , k ) is the previous iteration value of X ˜ I ( j , k ) , and F ( j , k ) is the iteration of the feedforward coefficient, given as:
F ( j , k ) = F ˜ ( j , k ) 1 K k = 0 K 1 F ˜ ( j , k ) H T R ( j , k ) ,
where F ˜ ( j , k ) is written as:
F ˜ ( j , k ) = H T R ( j , k ) * σ N 2 σ X , I 2 + | H T R ( j , k ) | 2 1 ( ρ ( j 1 ) ) 2 ,
and the correlation factor ρ ( j 1 ) = E [ x ^ i ( j , n ) x i ( j , n * ) ] E [ | x i ( j , n ) 2 | ] , where x i ( j , n ) is time domain equivalent of X I ( j , k ) and x ^ i ( j , n ) is the extrinsic information of x i ( j , n ) . Furthermore, { X I ( j , k ) ; k = 0 , 1 , , K 1 } = DFT { x i ( j , n ) g n ; n = 0 , 1 , , N 1 } , and if the n th time domain is inside the cycle prefix, then g n is either one or zero. The feedback co-efficient B ( j , k ) is written as:
B ( j , k ) = F ( j , k ) H T R ( j , k ) ˜ 1 .
In fact, the accuracy of X ˜ I ( j , k ) increases with each iteration up to its saturation point. Similarly, the accuracy of the information estimate can be improved at R and ξ for all the scenarios except ξ ( a ) . For ξ ( a ) , X ˜ I ( j , k ) is completely distorted by EH signals.
The performance of the IB-DFE receiver can be improved at R ( b ) with improved feedforward input in the iteration. The feedforward estimate, F ˜ ( j , k ) , is derived in Equation (21), and this estimate can be improved by including the impact of β σ A 2 in the SINR of the information signal. Therefore, by using Equation (15) in (21), we get:
F ˜ ( j , k ) = H T R ( j , k ) * σ N 2 + β σ A 2 σ X , I 2 + | H T R ( j , k ) | 2 1 ( ρ ( j 1 ) ) 2 .
Here, unlike the eavesdropper, R ( b ) can take advantage of the available knowledge from the legitimate transmitter and improve the performance of R ( b ) ; therefore, R ( b ) with the improved feedback estimate can perform better than ξ .

3. Numerical Results

In this section, the BER performance of the legitimate user and eavesdropper in the system model is analyzed by using Monte Carlo simulations. The signal used the 2.4 GHz frequency band, T = 4 × 10 6 , and it was considered that all the communication nodes including the eavesdroppers were operating in the non-line-of-sight channel condition. The secrecy rate was another performance metric of the legitimate user in the presence of the eavesdropper at various conditions and was analyzed through simulations. In the following simulations, the system adopted the 4-QAM signal with K = 256 and L = 200 , and the IB-DFE receiver was used in R and ξ to improve their error rate performance. The channel estimate errors of the H E 1 R and H E 2 R links, i.e., ϵ E 1 R and ϵ E 2 R , respectively were assumed to be equal, i.e., ϵ E 1 R = ϵ E 2 R , and ϵ E 1 R was either 0.02 or 0.1 . We assumed that, under an exceptionally favorable circumstance, ρ E 1 = ρ E 2 = 0.99 and 0.98 ; this allowed ξ ( b ) and ξ ( c ) to perform better than ξ ( a ) . In the following figures, the BER performance results by default illustrate the fourth iteration of the IB-DFE decoder unless it is specified as zero-forcing (ZF) decoding.
Figure 3 demonstrates the BER performance of R ( a ) and R ( b ) . We see that the BER performance of R ( a ) did not vary with the change in β , due to the successful channel precoding, which was based on the complete CSI of the EH signals, i.e., jamming signals. Furthermore, the results of R ( a ) demonstrated that the performance of IB-DFE receiver and BER improved up to the fourth iteration. In the first iteration, without any feedforward and feedback values, the resultant BER of the first iteration was equal to the ZF decoding. For R ( b ) , the channel precoding error occurred due to ϵ E 1 R , where ϵ E 1 R = 0.02 and 0.1 , and the results demonstrated that due to the precoding error at the transmitter, the BER performance of R ( b ) was poorer as compared to R ( a ) . When ϵ E 1 R = 0.2 , up to β = 4 , the performance of R ( b ) was equivalent to that of R ( a ) , whereas for β > 4 , the performance of R ( b ) degraded with the increase in β . The precoding error increased proportionally with the increase in ϵ E 1 R , and β acted as a multiplication factor in increasing the precoding error.
Figure 4 demonstrates the BER performance of ξ in all the scenarios with the comparison to BER of R, and ξ ( a ) received an incompatible signal for decoding the information. Unlike ξ ( a ) , with ρ E 1 = ρ E 2 = 0.99 and 0.98 , ξ ( b ) and ξ ( c ) could partially decode the signal, and their performance degraded with the decrease in ρ E 1 as the precoding errors increased in turn. Due to high channel correlation between H E 1 ξ and H E 1 R and similarly between H E 1 ξ and H E 1 R , the jamming EH signals were partially canceled out in ξ ( b ) and ξ ( c ) , allowing them to perform better than ξ ( a ) . With ϵ E 1 R = 0.02 , ξ ( b ) performed slightly more poorly as compared to ξ ( c ) . Even though ξ ( b ) and ξ ( c ) could decode information in the high channel correlation condition, the BER results of R demonstrated that, by increasing β , the jamming signals could degrade the performance of ξ , while R suffered a negligible loss.
Figure 5 demonstrates the impact of the inclusion of β σ A 2 in the IB-DFE receiver, and the results validated the advantage of using (23) over (21) in the iterative loop. R i had significant SINR gain over R ( b ) with the increase in β . At β = 10 , R i had 0.5 dBm SINR gain over R ( b ) , and when β > 12 , R i had more than 6 dBm SINR gain over R ( b ) . The results also illustrated the BER difference between the best performance of ξ ( c ) , i.e., ξ ( c ) with β = 1 and ρ E 1 = ρ E 2 = 0.99 versus the performance of R i with β = 13 .
In Figure 6, we compare the BER performance of R i in Rician fading and Rayleigh frequency flat fading channel conditions. For the simulation of Rician fading, we set T = 4 × 10 6 for 256 symbols; the multipath gain range was 0 : 3 : 45 ; the Doppler shift was 50; and the kfactor was 10. The results of Figure 6 demonstrate that the BER performance of R i under both fading conditions had similar effects on the signal performance. The fading effects were relatively low due to the application of SC-FDMA, and the BER performance improved with the IB-DFE receiver.
Figure 7 demonstrates the secrecy rate of R ( a ) and R ( b ) based on (17) and (18), respectively. Since ξ ( a ) was always in the negative SINR region, C ( a ) , A had the best performance over C ( c ) , A , C ( a ) , B and C ( b ) , B . For any given β value, C ( c ) , A always performed better than C ( b ) , B because in C ( c ) , A , neither ξ ( c ) nor R ( a ) experienced channel estimation error. The performance of C ( a ) , B and C ( b ) , B did not improve when the SINR was greater than 20 dBm because R ( b ) experienced precoding error due to the channel estimate error of the EH signals, which was ϵ E 1 R = 0.02 , and it was independent of the SINR of the information signal as observed in (15) and (16). The results of C ( c ) , A and C ( a ) , B proved that, at high SINR (i.e., greater than 20 dBm), C ( c ) , A could perform better than C ( a ) , B , irrespective of ξ ’s condition. At low SINR (i.e., less than 20 dBm), the performance of C ( a ) , B as compared to C ( c ) , A was better because R ( b ) took advantage of ξ ( a ) ’s poor performance, and this characteristic validated (15) and (16). Similar to the BER results, the secrecy rate performance of C ( c ) , A and C ( b ) , B was better when ρ E 1 = 0.98 than their performance when ρ E 1 = 0.99 . The secrecy rate of R ( a ) improved with the increase in β , but in the case of R ( b ) , contrary to the BER results, the secrecy rate degraded with the increase in β due to the channel estimate error. Unlike the secrecy rate results of R ( b ) , the impact of channel estimate error on the BER of R ( b ) was reduced due to the implementation the IB-DFE receiver.

4. Conclusions

In this paper, we implemented the SWIPT based self jamming physical layer security model, which relied on the channel precoding method to transmit information securely to the legitimate user. We considered different case studies by assuming that the eavesdropper had high channel correlation with the legitimate user. We also considered the possibility of channel estimate error (the channel link between jamming antennas to the legitimate user), which negatively affected the channel precoding. All the study cases were analyzed with the theoretical expressions supported by the simulation results.
The BER performance of the legitimate user and eavesdropper was improved by using the IB-DFE receiver, and we concluded that the channel precoding error could be further reduced at the legitimate user by taking advantage of all the available knowledge (i.e., including the variance of channel precoding error) in the IB-DFE receiver. Thus, the legitimate user could perform better than the eavesdropper, and the performance of the legitimate user improved over the eavesdropper with the increase in the jamming signal power. The secrecy rate analysis of legitimate user demonstrated that the performance of the legitimate user with the channel precoding error did not improve beyond 20 dBm SINR and slightly degraded with the increase in jamming signal power. In the case of perfect channel precoding, the secrecy rate performance of the legitimate user improved proportionally with the increase in SINR and with the increase in the jamming signal power.

Author Contributions

Conceptualization, A.R. and R.D.; investigation, A.R., M.B., and R.D.; software, A.R.; supervision, R.D. and D.N.K.J.; validation, D.N.K.J. and R.D.; visualization, A.R.; writing, original draft, A.R., M.B., D.N.K.J., and R.D.; writing, review and editing, A.R and R.D. All authors read and agreed to the published version of the manuscript.

Funding

This work was supported by FCT/MCTESthrough national funds and when applicable co-funded EU funds under the project MASSIVE5G(PTDC/EEI-TEL/30588/2017), Copelabs (UIDB/04111/2020), and Instituto de Telecomunicações (UIDB/EEA/50008/2020). The research work was developed in part with Universidade Lusòfona/ILINDfunding and supported, in part, by the Russian Foundation for Basic Research (RFBR) Grant No. 19-37-50083\19.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

The precoding vector for the legitimate receiver is given below.

Appendix A.1.

The precoded EH signals at R ( a ) , denoted as X E 1 ( k ) and X E 2 ( k ) , are given by:
X E 1 ( k ) = A E 1 ( k ) H E 2 R ( k ) , X E 2 ( k ) = A E 2 ( k ) H E 1 R ( k ) ,
where A E 1 ( k ) and A E 2 ( k ) are the k th entries of the precoding vectors A E 1 and A E 2 , respectively. The precoding vectors are chosen such that, under any SINR condition, L ( H E 1 R ( k ) X E 1 ( k ) + H E 2 R ( k ) X E 2 ( k ) ) = 0 .

Appendix A.2.

The precoded EH signals at R ( b ) , denoted as X E 1 ( k ) and X E 2 ( k ) , are given by:
X E 1 ( k ) = X E 1 ( k ) + ϵ A , E 1 ( k ) = A E 1 ( k ) ( H E 2 R ( k ) + ϵ E 2 R ( k ) ) , X E 2 ( k ) = X E 2 ( k ) + ϵ A , E 2 ( k ) = A E 2 ( k ) ( H E 1 R ( k ) + ϵ E 1 R ( k ) ) ,
where ϵ A , E 1 ( k ) and ϵ A , E 2 ( k ) are the precoding errors due to ϵ E 2 R ( k ) A E 1 ( k ) and ϵ E 1 R ( k ) A E 2 ( k ) , respectively.

Appendix B

The channel correlations ( ρ E 1 and ρ E 2 ) are given as:
ρ E 1 = E [ | | H E 1 R H E 1 ξ H | | ] E [ | | H E 1 R | | 2 ] E [ | | H E 1 ξ | | 2 ] , ρ E 2 = E [ | | H E 2 R H E 2 ξ H | | ] E [ | | H E 2 R | | 2 ] E [ | | H E 2 ξ | | 2 ] .

References

  1. Jayakody, D.N.K.; Thompson, J.; Chatzinotas, S.; Durrani, S. Wireless Information and Power Transfer: A New Green Communications Paradigm; Springer: New York, NY, USA, 2017. [Google Scholar]
  2. Perera, T.D.P.; Jayakody, D.N.K.; Sharma, S.K.; Chatzinotas, S.; Li, J. Simultaneous wireless information and power transfer (swipt): Recent advances and future challenges. IEEE Commun. Surv. Tutor. 2018, 20, 264–302. [Google Scholar] [CrossRef] [Green Version]
  3. Rajaram, A.; Khan, R.; Tharranetharan, S.; Jayakody, D.; Dinis, R.; Panic, S. Novel SWIPT Schemes for 5G Wireless Networks. Sensors 2019, 19, 1169. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. Rajaram, A.; Jayakody, D.N.K.; Dinis, R.; Kumar, N. Receiver Design to Employ Simultaneous Wireless Information and Power Transmission with Joint CFO and Channel Estimation. IEEE Access 2019, 7, 9678–9687. [Google Scholar] [CrossRef]
  5. Tang, X.; Cai, Y.; Yang, W.; Yang, W.; Chen, D.; Hu, J. Secure transmission of cooperative zero-forcing jamming for two-user SWIPT sensor networks. Sensors 2018, 18, 331. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  6. Khan, R.; Kumar, P.; Jayakody, D.N.K.; Liyanage, M.; Li, J. A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions. IEEE Commun. Surv. Tutor. 2019, 22, 196–248. [Google Scholar]
  7. Ng, D.W.K.; Xiang, L.; Schober, R. Multi-objective beamforming for secure communication in systems with wireless information and power transfer. In Proceedings of the 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), London, UK, 8–11 September 2013; pp. 7–12. [Google Scholar]
  8. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  9. Leung-Yan-Cheong, S.; Hellman, M. The Gaussian wire-tap channel. IEEE Trans. Inf. Theory 1978, 24, 451–456. [Google Scholar] [CrossRef]
  10. Oggier, F.; Hassibi, B. The Secrecy Capacity of the MIMO Wiretap Channel. IEEE Trans. Inf. Theory 2011, 57, 4961–4972. [Google Scholar] [CrossRef] [Green Version]
  11. Goel, S.; Negi, R. Guaranteeing Secrecy using Artificial Noise. IEEE Trans. Wirel. Commun. 2008, 7, 2180–2189. [Google Scholar] [CrossRef]
  12. Anjos, G.; Castanheira, D.; Silva, A.; Gameiro, A.; Gomes, M.; Vilela, J.P. Exploiting the Reciprocal Channel for Discrete Jamming to Secure Wireless Communications Against Multiple-Antenna Eavesdropper. IEEE Access 2018, 6, 1–10. [Google Scholar] [CrossRef]
  13. Anjos, G.; Castanheira, D.; Silva, A.; Gameiro, A. Exploiting Reciprocal Channel Estimations for Jamming to Secure Wireless Communications. In Proceedings of the 2017 International Wireless Days Conference, Porto, Portugal, 29–31 March 2017. [Google Scholar]
  14. Cumanan, K.; Xing, H.; Xu, P.; Zheng, G.; Dai, X.; Nallanathan, A.; Ding, Z.; Karagiannidis, G.K. Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks. IEEE Access 2017, 5, 3603–3611. [Google Scholar] [CrossRef] [Green Version]
  15. He, B.; Zhou, X.; Abhayapala, T.D. Wireless physical layer security with imperfect channel state information: A survey. arXiv 2013, arXiv:1307.4146. [Google Scholar]
  16. Chou, T.; Draper, S.C.; Sayeed, A.M. Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness. In Proceedings of the 2010 IEEE International Symposium on Information Theory, Austin, TX, USA, 13–18 June 2010; pp. 2518–2522. [Google Scholar]
  17. Zhang, B.; He, T.; Duong, Q.; Woods, R. On the Key Generation From Correlated Wireless Channels. IEEE Commun. Lett. 2017, 21, 961–964. [Google Scholar] [CrossRef] [Green Version]
  18. Benvenuto, N.; Tomasin, S. Block iterative DFE for single carrier modulation. Electron. Lett. 2002, 38, 1144–1145. [Google Scholar] [CrossRef] [Green Version]
  19. Silva, A.; Assunção, J.; Dinis, R.; Gameiro, A. Performance Evaluation of IB-DFE based Strategies for SC-FDMA Systems. EURASIP J. Wirel. Commun. Netw. 2013, 2013, 1–10. [Google Scholar] [CrossRef] [Green Version]
  20. Castanheira, D.; Silva, A.; Dinis, R.; Gameiro, A. Efficient Transmitter and Receiver Designs for SC-FDMA Based Heterogeneous Networks. IEEE Trans. Commun. 2015, 63, 2500–2510. [Google Scholar] [CrossRef]
  21. Silva, A.; Teodoro, S.; Dinis, R.; Gameiro, A. Iterative Frequency-Domain Detection for IA-Precoded MC-CDMA Systems. IEEE Trans. Commun. 2014, 62, 1240–1248. [Google Scholar] [CrossRef] [Green Version]
  22. Dinis, R.; Lam, C.T.; Falconer, D. Joint frequency-domain equalization and channel estimation using superimposed pilots. In Proceedings of the 2008 Wireless Communications and Networking Conference, Las Vegas, NV, USA, 31 March–3 April 2008; pp. 447–452. [Google Scholar]
Figure 1. System model. EH, energy harvesting.
Figure 1. System model. EH, energy harvesting.
Electronics 09 00587 g001
Figure 2. Frame structure of the proposed system, where T and T l are the time duration of a symbol and a block, respectively.
Figure 2. Frame structure of the proposed system, where T and T l are the time duration of a symbol and a block, respectively.
Electronics 09 00587 g002
Figure 3. BER performance of R ( a ) and R ( b ) . ZF, zero-forcing.
Figure 3. BER performance of R ( a ) and R ( b ) . ZF, zero-forcing.
Electronics 09 00587 g003
Figure 4. BER performance of ξ in all the scenarios with ϵ E 1 R = 0.02 in Scenario B.
Figure 4. BER performance of ξ in all the scenarios with ϵ E 1 R = 0.02 in Scenario B.
Electronics 09 00587 g004
Figure 5. BER performance of R ( b ) and R i with ϵ E 1 R = 0.02 , where R i denotes R ( b ) with an improved feedback loop in the IB-DFE receiver.
Figure 5. BER performance of R ( b ) and R i with ϵ E 1 R = 0.02 , where R i denotes R ( b ) with an improved feedback loop in the IB-DFE receiver.
Electronics 09 00587 g005
Figure 6. BER performance of R i in Rician fading and Rayleigh fading conditions.
Figure 6. BER performance of R i in Rician fading and Rayleigh fading conditions.
Electronics 09 00587 g006
Figure 7. The secrecy rate of R ( a ) and R ( b ) and in Scenario B, ϵ E 1 R = 0.02 .
Figure 7. The secrecy rate of R ( a ) and R ( b ) and in Scenario B, ϵ E 1 R = 0.02 .
Electronics 09 00587 g007

Share and Cite

MDPI and ACS Style

Rajaram, A.; Dinis, R.; Jayakody, D.N.K.; Beko, M. Secure Information Transmission with Self Jamming SWIPT. Electronics 2020, 9, 587. https://doi.org/10.3390/electronics9040587

AMA Style

Rajaram A, Dinis R, Jayakody DNK, Beko M. Secure Information Transmission with Self Jamming SWIPT. Electronics. 2020; 9(4):587. https://doi.org/10.3390/electronics9040587

Chicago/Turabian Style

Rajaram, Akashkumar, Rui Dinis, Dushnatha Nalin K. Jayakody, and Marko Beko. 2020. "Secure Information Transmission with Self Jamming SWIPT" Electronics 9, no. 4: 587. https://doi.org/10.3390/electronics9040587

APA Style

Rajaram, A., Dinis, R., Jayakody, D. N. K., & Beko, M. (2020). Secure Information Transmission with Self Jamming SWIPT. Electronics, 9(4), 587. https://doi.org/10.3390/electronics9040587

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop