Robust Deception Scheme for Secure Interference Exploitation under PSK Modulations

Ye Fan, Rugui Yao, Ang Li, Xuewen Liao, Victor C.M. Leung

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

This paper investigates the security problem of a multi-eavesdrop multiple-input-single-output (MISO) wiretap channel, where an N -antenna transmitter communicates with a single-antenna legitimate user in the presence of multiple single-antenna smart eavesdroppers. To overcome the security risk of the traditional secure constructive interference-based (CI-based) scheme when facing the smart eavesdroppers, we propose a novel deception scheme (DS) via a random transmission strategy, where the eavesdroppers are expected to decode the deception symbols correctly but unable to distinguish the authenticity of the decoded symbol. Then, an efficient algorithm is proposed for the deception signal-to interference-plus-noise (SINR)-balancing problem when perfect channel state information (CSI) is assumed. Furthermore, we consider a practical scenario where only imperfect CSI is available, and explore two different methods for the deception optimization problem, i.e., convexification relaxation approach (CRA) and Lagrangian relaxation approach (LRA), respectively. For both CSI cases, a closed-form solution to the considered CI-based deception scheme is obtained. Simulation results validate the superiority of the proposed approach over traditional secure precoding schemes, and also demonstrate the significant computation efficiency improvements for the proposed algorithms.

Original languageEnglish
Article number9424608
Pages (from-to)5425-5440
Number of pages16
JournalIEEE Transactions on Communications
Volume69
Issue number8
DOIs
StatePublished - Aug 2021

Keywords

  • deception scheme
  • multiple eavesdroppers
  • Physical-layer security
  • symbol-level precoding

Fingerprint

Dive into the research topics of 'Robust Deception Scheme for Secure Interference Exploitation under PSK Modulations'. Together they form a unique fingerprint.

Cite this