TY - JOUR
T1 - Secure Interference Exploitation Precoding in MISO Wiretap Channel
T2 - Destructive Region Redefinition with Efficient Solutions
AU - Fan, Ye
AU - Li, Ang
AU - Liao, Xuewen
AU - Leung, Victor C.M.
N1 - Publisher Copyright:
© 2005-2012 IEEE.
PY - 2021
Y1 - 2021
N2 - In this paper, we focus on the physical layer security for a $K$-user multiple-input-single-output (MISO) wiretap channel in the presence of a malicious eavesdropper, where we propose several interference exploitation (IE) precoding schemes for different types of the eavesdropper. Specifically, in the case where a common eavesdropper decodes the signal directly and Eve's full channel state information (CSI) is available at the transmitter, we show that the required transmit power can be further reduced by re-designing the 'destructive region' of the constellations for symbol-level precoding and re-formulating the power minimization problem. We further study the SINR balancing problems with the derived 'complete destructive region' with full, statistical and no Eve's CSI, respectively, and show that the SINR balancing problem becomes non-convex with statistical or no Eve's CSI. On the other hand, in the presence of a smart eavesdropper using maximal likelihood (ML) detection, the security cannot be guaranteed with all the existing approaches. To this end, we further propose a random jamming scheme (RJS) and a random precoding scheme (RPS), respectively. To solve the introduced convex/non-convex problems in an efficient manner, we propose an iterative algorithm for the convex ones based on the Karush-Kuhn-Tucker (KKT) conditions, and deal with the non-convex ones by resorting to Taylor expansions. Simulation results show that all proposed schemes outperform the existing works in secrecy performance, and that the proposed algorithm improves the computation efficiency significantly.
AB - In this paper, we focus on the physical layer security for a $K$-user multiple-input-single-output (MISO) wiretap channel in the presence of a malicious eavesdropper, where we propose several interference exploitation (IE) precoding schemes for different types of the eavesdropper. Specifically, in the case where a common eavesdropper decodes the signal directly and Eve's full channel state information (CSI) is available at the transmitter, we show that the required transmit power can be further reduced by re-designing the 'destructive region' of the constellations for symbol-level precoding and re-formulating the power minimization problem. We further study the SINR balancing problems with the derived 'complete destructive region' with full, statistical and no Eve's CSI, respectively, and show that the SINR balancing problem becomes non-convex with statistical or no Eve's CSI. On the other hand, in the presence of a smart eavesdropper using maximal likelihood (ML) detection, the security cannot be guaranteed with all the existing approaches. To this end, we further propose a random jamming scheme (RJS) and a random precoding scheme (RPS), respectively. To solve the introduced convex/non-convex problems in an efficient manner, we propose an iterative algorithm for the convex ones based on the Karush-Kuhn-Tucker (KKT) conditions, and deal with the non-convex ones by resorting to Taylor expansions. Simulation results show that all proposed schemes outperform the existing works in secrecy performance, and that the proposed algorithm improves the computation efficiency significantly.
KW - destructive region
KW - jamming
KW - MU-MISO
KW - physical layer security
KW - symbol-level precoding
UR - http://www.scopus.com/inward/record.url?scp=85089297972&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2020.3013210
DO - 10.1109/TIFS.2020.3013210
M3 - 文章
AN - SCOPUS:85089297972
SN - 1556-6013
VL - 16
SP - 402
EP - 417
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
M1 - 9153068
ER -