Distance-Aware Beamforming for Multiuser Secure Communication Systems

Document Type : Research Article

Authors

1 Electrical Eng., Amirkabir university of Technology

2 Amirkabir University of Technology

Abstract

Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems)  are possible alternatives to provide security for such applications. In this paper, we consider a network with multiple groups of users as receivers and a transmitter that intends to send different messages to each group of users. There are also some eavesdroppers (Eavs) at known locations of the environment. The goal of this paper is to find the beamforming vectors that minimize the total transmitting power while keeping the signal level above a threshold at the exact locations of the legitimate receivers (both angle and range) and keeping it less than another threshold at eavesdropping points.  We use frequency diverse arrays (FDA) at the transmitter; thus, the transmitter also needs to determine the frequency that each antenna element must use for data transmission. This condition makes the problem non-convex and so we propose an approximate solution for solving this optimization problem. Simulation results show the performance of the proposed scheme in a particular network setting.

Keywords

Main Subjects


[1] Y. Liu, H.-H. Chen, L. Wang, Physical layer security for next generation wireless networks: Theories, technologies, and challenges, IEEE Communications Surveys & Tutorials, 19(1) (2016) 347-376.
[2] Y. Wu, A. Khisti, C. Xiao, G. Caire, K.-K. Wong, X. Gao, A survey of physical layer security techniques for 5G wireless networks and challenges ahead, IEEE Journal on Selected Areas in Communications, 36(4) (2018) 679-695.
[3] A.D. Wyner, The wire‐tap channel, Bell system technical journal, 54(8) (1975) 1355-1387.
[4] M.P. Daly, J.T. Bernhard, Directional modulation technique for phased arrays, IEEE Transactions on Antennas and Propagation, 57(9) (2009) 2633-2640.
[5] N.D. Sidiropoulos, T.N. Davidson, Z.-Q. Luo, Transmit beamforming for physical-layer multicasting, IEEE Trans. Signal Processing, 54(6-1) (2006) 2239-2251.
[6] M.P. Daly, E.L. Daly, J.T. Bernhard, Demonstration of directional modulation using a phased array, IEEE Transactions on Antennas and Propagation, 58(5) (2010) 1545-1550.
[7] Y. Ding, V.F. Fusco, A vector approach for the analysis and synthesis of directional modulation transmitters, IEEE Transactions on Antennas and Propagation, 62(1) (2013) 361-370.
[8] E. Karipidis, N.D. Sidiropoulos, Z.-Q. Luo, Far-field multicast beamforming for uniform linear antenna arrays, IEEE Transactions on Signal Processing, 55(10) (2007) 4916-4927.
[9] D. Wang, B. Bai, W. Zhao, Z. Han, A survey of optimization approaches for wireless physical layer security, IEEE Communications Surveys & Tutorials, 21(2) (2018) 1878-1911.
[10] S. Goel, R. Negi, Guaranteeing secrecy using artificial noise, IEEE transactions on wireless communications, 7(6) (2008) 2180-2189.
[11] F. Shu, L. Xu, J. Wang, W. Zhu, Z. Xiaobo, Artificial-noise-aided secure multicast precoding for directional modulation systems, IEEE Transactions on Vehicular Technology, 67(7) (2018) 6658-6662.
[12] R. Soltani, D. Goeckel, D. Towsley, B.A. Bash, S. Guha, Covert wireless communication with artificial noise generation, IEEE Transactions on Wireless Communications, 17(11) (2018) 7252-7267.
[13] A. Al-Nahari, G. Geraci, M. Al-Jamali, M.H. Ahmed, N. Yang, Beamforming with artificial noise for secure MISOME cognitive radio transmissions, IEEE Transactions on Information Forensics and Security, 13(8) (2018) 1875-1889.
[14] M.A. Arfaoui, H. Zaid, Z. Rezki, A. Ghrayeb, A. Chaaban, M.-S. Alouini, Artificial Noise-Based Beamforming for the MISO VLC Wiretap Channel, IEEE Transactions on Communications, 67(4) (2018) 2866-2879.
[15] W.-C. Liao, T.-H. Chang, W.-K. Ma, C.-Y. Chi, QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach, IEEE Transactions on Signal Processing, 59(3) (2010) 1202-1216.
[16] P. Antonik, An investigation of a frequency diverse array, UCL (University College London), 2009.
[17] P.F. Sammartino, C.J. Baker, H.D. Griffiths, Frequency diverse MIMO techniques for radar, IEEE Transactions on Aerospace and Electronic Systems, 49(1) (2013) 201-222.
[18] W.-Q. Wang, Frequency diverse array antenna: New opportunities, IEEE Antennas and Propagation Magazine, 57(2) (2015) 145-152.
[19] P. Antonik, M.C. Wicks, H.D. Griffiths, C.J. Baker, Frequency diverse array radars, in:  2006 IEEE Conference on Radar, IEEE, 2006, pp. 3 pp.
[20] Y. Liu, H. Ruan, L. Wang, A. Nehorai, The random frequency diverse array: A new antenna structure for uncoupled direction-range indication in active sensing, IEEE Journal of Selected Topics in Signal Processing, 11(2) (2016) 295-308.
[21] J. Hu, S. Yan, F. Shu, J. Wang, J. Li, Y. Zhang, Artificial-noise-aided secure transmission with directional modulation based on random frequency diverse arrays, IEEE Access, 5 (2017) 1658-1667.
[22] J. Lin, Q. Li, J. Yang, H. Shao, W.-Q. Wang, Physical-layer security for proximal legitimate user and eavesdropper: A frequency diverse array beamforming approach, IEEE Transactions on Information Forensics and Security, 13(3) (2017) 671-684.
[23] B. Qiu, J. Xie, L. Wang, Y. Wang, Artificial-noise-aided secure transmission for proximal legitimate user and eavesdropper based on frequency diverse arrays, IEEE Access, 6 (2018) 52531-52543.
[24] B. Qiu, M. Tao, L. Wang, J. Xie, Y. Wang, Multi-beam directional modulation synthesis scheme based on frequency diverse array, IEEE Transactions on Information Forensics and Security,  (2019).
[25] M. Grant, S. Boyd, CVX: Matlab software for disciplined convex programming, version 2.1, in, 2014.
[26] U. ADEEC, Time complexity of genetic algorithms on exponentially scaled problems, Urbana, 51 (2000) 61,801.