Please use this identifier to cite or link to this item:
Title: Achieving physical layer security in multi-antenna wiretap channels
Authors: Xiong, Qi
Keywords: DRNTU::Engineering::Electrical and electronic engineering
Issue Date: 2016
Source: Xiong, Q. (2016). Achieving physical layer security in multi-antenna wiretap channels. Doctoral thesis, Nanyang Technological University, Singapore.
Abstract: Achieving secure transmission in wireless network is a significantly important research topic. Classic cryptography encrypts a confidential message to an unreadable cipher message. Thus only the authentic receiver with correct secrecy key is able to decrypt the message. However, with the growing computational capability of adversaries, the requirement of secrecy key generation and distribution is getting stringent. Another method to achieve wireless security, which has attracted much attention in recent years, is through physical layer processing, named physical layer security. In a typical wiretap channel model consisting of a transmitter, a legal receiver and an adversary (illegal receiver), early works have proven that it is possible to achieve positive secrecy rate using multiple antenna techniques, such as beamforming, at the transmitter. In this thesis, we focus on two types of malicious behaviors of the adversary: passive eavesdropping and active attack. For the passive eavesdropping, we first consider the multi-input-single-output (MISO) wiretap channel, in which the legitimate transmitter utilizes the artificial noise aided precoding strategy to maximize the achievable secrecy rate of the channel. Both scenarios of known and unknown channel state information (CSI) for the eavesdropper channels are considered. By deriving the closed-form expression of ergodic secrecy rate, we prove that there exists an optimal power ratio between the information signal and the artificial noise. We then extend our study to a four-node fading channel model in a wireless relay network, which includes two single-antenna users, one single-antenna eavesdropper and one relay node equipped with multiple antennas. By studying the decode-and-forward (DF) scheme, cooperative jamming (CJ) scheme and one proposed hybrid relay scheme, relay-and-jamming (RJ), we aims to find the optimal relay scheme with the condition that the transmitter and the relay node are under individual power constraints and the CSI of the illegitimate channel is only statistically known. Our analysis shows that the hybrid RJ scheme is optimal when the transmitter has a relatively small power budget and/or the transmitter is far away from the intended receiver. Besides the passive eavesdropping, the adversary could also choose the active attack. The pilot spoofing attack is one active attack conducted by the adversary during the channel estimation phase of the legitimate transmission. In practical systems, the pilot signals are usually known \textit{a priori} and repeatedly used information. In this attack, an intelligent adversary spoofs the transmitter on the estimation of CSI by sending the identical pilot signal as the legitimate receiver. By doing so, the adversary could obtain a larger channel rate in the data transmission phase, and also drastically weaken the strength of the received signal at the legitimate receiver if the adversary utilizes large enough power. Due to the serious consequences caused by such an attack, we first propose an energy ratio detector (ERD) that explores the asymmetry of received signal power levels at the transmitter and the legitimate receiver when the attack occurs. Our analysis shows that the ERD could provide very high probability of detection with certain requirement on the false alarming probability. Furthermore, we design a two-way training based scheme to provide not only attack detection but also secure transmission. The two-way training based detector (TWTD) exploits the intrusive component created by the adversary, followed by a secure beamforming-assisted data transmission. In addition to the good detection performance, our scheme could estimate both legitimate and illegitimate channels, with which the beamforming could be designed for data transmission.
DOI: 10.32657/10356/67324
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:EEE Theses

Files in This Item:
File Description SizeFormat 
QXIONG_THESIS.pdfPhysical layer security880.2 kBAdobe PDFThumbnail

Page view(s)

Updated on May 5, 2021

Download(s) 20

Updated on May 5, 2021

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.