Next Article in Journal
Approximate LSTM Computing for Energy-Efficient Speech Recognition
Next Article in Special Issue
Field Trials of SC-FDMA, FBMC and LP-FBMC in Indoor Sub-3.5 GHz Bands
Previous Article in Journal
Wirelessly-Powered Cage Designs for Supporting Long-Term Experiments on Small Freely Behaving Animals in a Large Experimental Arena
Previous Article in Special Issue
Performance Analysis of LDS Multi Access Technique and New 5G Waveforms for V2X Communication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Waveform Design for Space–Time Coded MIMO Systems with High Secrecy Protection †

IT Convergence Research Center, Division of Electronics Engineering, Jeonbuk National University, 567 Baekje-daero, Deokjin-gu, Jeonju 54896, Jeollabuk-do, Korea
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in ICTC 2020.
Electronics 2020, 9(12), 2003; https://doi.org/10.3390/electronics9122003
Submission received: 14 October 2020 / Revised: 12 November 2020 / Accepted: 17 November 2020 / Published: 25 November 2020
(This article belongs to the Special Issue Waveform Design for 5G and beyond Systems)

Abstract

:
In this paper, we present a new secrecy-enhancing scheme for multi-input-multi-output (MIMO) systems using a space–time coding scheme. We adopt a quasi-orthogonal space–time block coding (QO-STBC) scheme that was originally designed to improve the performance of the MIMO system, and propose an efficient waveform design that can enhance the secrecy, as well as improve the error rate performance. Channel- and signal-dependent artificial interference (AI) is added to the proposed waveform, so that only a legitimate receiver can successfully retrieve information. We investigate the secrecy capacity of the proposed scheme, and demonstrate that the proposed scheme provides highly enhanced secrecy performance, compared to the conventional schemes. The performance simulation results reveal that the transmitted information can be properly extracted only at the legitimate receiver.

1. Introduction

Most technology development in wireless systems has mainly focused on the enhancement of spectral efficiency and/or power efficiency (error rate performance). The explosion of multiple-input multiple-output (MIMO) technology can be one of the representative examples that have largely contributed to enhancing spectral or power efficiency. Due to their inherent broadcasting nature, wireless communication systems are vulnerable to security and privacy protection. However, waveform design for the past generation systems has not focused mainly on the secrecy performance aspect. Although the classical cryptography protocols in the network layer may guarantee secure communications, the involved secret-key distribution and management processes are generally unaffordable, and are fragile to attacks, especially in wireless systems [1]. For this reason, security protection needs to be considered during the waveform design process along with power and spectral efficiency.
Physical layer security (PLS) schemes can be considered as one of the effective waveform design techniques to provide security protection, and a number of study results have been reported by exploiting the characteristics of wireless channels [2,3,4]. Because MIMO techniques are now almost mandatory in most wireless systems, PLS schemes combined with MIMO techniques have recently gained a lot of attention. As a measure of secrecy protection, Reference [5] derived the secrecy capacity of a MIMO system. Later, Reference [6] proved that perfect secrecy protection could theoretically be achieved for MIMO systems, and these results accelerated the development of PLS techniques for MIMO systems. Reference [7] considered utilization of spatial modulation (SM) and adding artificial noise (AN) as effective means to increase the secrecy capacity for MIMO systems. The essence of AN technology is to add a noise that is orthogonal to the legitimate channel, so that it can be null to the legitimate receiver, while presenting interference to the illegal receiver.
On the other hand, there have been efforts to utilize space–time block coding (STBC) schemes for PLS [8,9,10,11,12,13]. The Alamouti scheme was utilized for PLS [8,9,10,11,12]. As a cooperative multi-user transmission technique, Reference [8] proposed the idea of transmit antenna selection (TAS)-Alamouti scheme for PLS enhancement. Reference [9] proposed another cooperative Alamouti scheme, where Alamouti users collaborate with each other with an AN-aided technique to secure the transmissions. They demonstrated that the secrecy sum-capacity was improved by adding AN aligned with the null space of the legitimate channel matrix. The Alamouti scheme was also utilized in SM with AN, where SM was used to increase the secrecy performance while the Alamouti scheme was used to enhance the performance [10]. Reference [11] proposed a PLS scheme employing a coordinate interleaved orthogonal design, while Reference [12] proposed a transmission technique for PLS by applying the Alamouti coded non-orthogonal multiple access scheme.
Furthermore, secrecy outage probability was derived for a quasi-orthogonal STBC (QO-STBC) scheme that linearly combines two Alamouti codes [13]. The results in this research demonstrate the secrecy outage probability according to the power ratio of legitimate and illegal receivers. This QO-STBC scheme utilized a power scaling (PS) method, but the PS itself did not contribute to enhancing the secrecy performance. Instead, the PS was used to achieve the full rate and full diversity effect. Reference [14] also proposed a similar idea, presenting a new encoding matrix for QO-STBC to achieve full orthogonality of the channel matrix.
In this paper, we propose a new waveform design for the MIMO system using STBC, which is targeted at enhancing the secrecy, as well as the error rate performance. We modify the idea of combing AN with STBC, and adopt a QO-STBC scheme with linear detection capability [14]. The advantage of the QO-STBC scheme in [14] lies in the full orthogonality of the channel matrix, and thus it was termed a linear decoding QO-STBC (LD-QO-STBC) scheme. However, its disadvantage lies in the non-uniform signal power distribution. In the proposed scheme, we utilize this property, and add the artificial interference (AI) by considering non-uniform signal distribution. The waveform with time-varying AI is received at the legitimate receiver without any interference, while the added interference at the illegal receiver prevents proper detection.
We note that STBC schemes are widely used in modern wireless systems to improve performance. Even though the STBC schemes were investigated for PLS in the previous studies, they can achieve reasonable secrecy protection only with a limited condition, i.e., when the power strength of the legitimate receiver is sufficiently higher than that of the illegal receiver. An approach with AN can be used, but this requires additional power allocation. Therefore, the proposed PLS scheme can be efficiently utilized for many wireless systems equipped with STBC, without any performance degradation.
Compared to the conventional PLS schemes with STBC, we summarize the superiority of our work as follows. First, the proposed scheme can be utilized in the STBC MIMO systems with more than two transmit antennae, and thus it can achieve more diversity gain compared to the previous works with the Alamouti scheme [8,9,10,11,12]. Second, the proposed scheme does not allocate additional power to AN for security protection, and thus it is power efficient. The probability distribution of the LD-QO-STBC signal waveform is newly derived. By using the investigation results of the signal distribution, the power reallocation is dynamically performed across the multi transmit antennae. This power reallocation contributes to equalizing power distribution across the transmit antennae as well as transmit time. In addition, it imposes severe interference on the eavesdropper. The novelty of the proposed idea lies in using the new waveform for STBC MIMO systems with power reallocation. By virtue of the above two strong advantages, the proposed scheme can achieve perfect security protection even though the eavesdropper has almost the same power as the legitimate receiver.
The rest of this paper is organized as follows. Section 2 describes the related works with the proposed scheme. We first introduce the PLS scheme that combines the Alamouti-code with AN, and present the LD-QO-STBC scheme [14]. Section 3 presents the proposed waveform design for PLS using the LD-QO-STBC scheme. We first investigate the characteristics of the signal constellation of the LD-QO-STBC scheme. Afterwards, we propose a method to generate signal- and channel-dependent AI that can be perfectly canceled only at the legitimate receiver. Section 4 evaluates the secrecy capacity of the proposed scheme, and compares it with that of the conventional scheme. In addition, we present a bit error rate (BER) performance simulation results to demonstrate proper security protection. Finally, Section 5 draws the conclusions.
Notation: Bold lower case letters represent vectors, while bold upper case letters denote matrices. A T , A H , and A denote the transpose, Hermitian transpose, and Euclidean norm of matrix A , respectively. The superscript ( · ) * denotes the complex conjugate, while * denotes the convolution operator.

2. Related Works

2.1. Alamouti Coded PLS with AN

The generic model for the PLS scheme, comprises a cooperative wireless network that consists of three nodes. Suppose that a legitimate transmitter node is referred to as Alice, which is the source node. The corresponding destination node is referred to as Bob, which is the legitimate receiver node. On the other hand, the third node, named Eve, is the passive eavesdropper node.
Figure 1 shows a block diagram for the Alamouti-coded PLS with AN [10]. In this system, it is assumed that Alice is equipped with three antennae, while Bob and Eve are equipped with only one antenna, respectively. At the transmitter, the bit stream emitted by a binary source is divided into a block containing one bit to select one antenna among Ant 1 and Ant 2 for SM, and the other blocks containing information bits to transmit. The selected antenna will form the first virtual antenna for the Alamouti scheme, while Ant 3 in Figure 1 will form the second virtual antenna for the 2 × 1 Alamouti scheme. Therefore, the first virtual antenna is dynamically changed by time. During the first symbol period, s 1 and s 2 which are mapped by using m bits for each will be transmitted through two antennae, respectively. In addition, AN will be injected for secrecy purpose. During the second symbol period, the Alamouti encoded symbols, s 2 * and s 1 * , are transmitted along with ANs through two antennae, respectively.
It is assumed that the channel coefficients are constant within each transmission block, i.e., two symbol periods, and they are changed independently from block to block, as in the conventional Alamouti scheme. The perfect channel state information (CSI) is assumed to be available at Bob and Eve, but it may not be available at Alice. The encoding matrix for the Alamouti code with AN, X AN can be expressed as:
X AN = s 1 + β 11 v s 2 + β 12 v s 2 + β 21 v * s 1 + β 22 v * ,
where s 1 and s 2 are modulation symbols used for the Alamouti code during two symbol periods, and they are drawn from the M-ary quadrature amplitude modulation (QAM) constellation, where M = 2 m . In addition, v is the complex Gaussian AN with zero-mean and unit variance, and β i j s are the coefficients of the v for the i-th timeslot at the j-th antenna. The coefficients β i j s are designed to be nulled at the legitimate receiver. Therefore they should be computed by exploiting the CSI of the legitimate channel, which results in the following two possible sets of solutions for each symbol period, i.e., for the first time period:
β 11 = h 2 , β 12 = h 1 , or β 11 = h 2 , β 12 = h 1 ,
and for the second time period:
β 21 = h 2 * , β 22 = h 1 * , or β 21 = h 2 * , β 22 = h 1 * ,
where, h 1 and h 2 are the channel gains from the first and second virtual antennae at Alice to Bob, respectively.
With the above solution, the received signal at Bob during two symbol periods, y b 1 and y b 2 can be represented by:
y b 1 = h 1 s 1 + h 2 s 2 + n b 1 , y b 2 = h 1 s 2 * + h 2 s 1 * + n b 2 ,
where n b 1 and n b 2 are additive white Gaussian noise (AWGN) at Bob for the first and second symbol periods, respectively. Because the added ANs are perfectly canceled due to (2) and (3) at Bob, the detection can be successfully made as in the conventional 2 × 1 Alamouti scheme. On the other hand, the received signal at Eve will contain serious interference terms as follows:
y e 1 = g 1 s 1 + β 11 v + g 2 s 2 + β 12 v + n e 1 , y e 2 = g 1 s 2 + β 21 v * + g 2 s 1 + β 22 v * + n e 2 ,
where g 1 and g 2 are the channel gains from the first and second virtual antennae at Alice to Eve, respectively. In addition, n e 1 and n e 2 are AWGN at Eve for the first and second symbol periods, respectively.

2.2. Linear Decoding QO-STBC Scheme

After Alamouti first proposed the orthogonal STBC scheme with two transmit antennae [15], efforts were made to invent full-rate STBC schemes with a larger number of transmitting antennae. In an effort to increase the antenna size and achieve the full data rate, by loosening the orthogonality condition, several QO-STBC schemes have been proposed [16,17]. These QO-STBC schemes could achieve the full rate, but at the cost of higher decoding complexity, due to the non-perfect orthogonality of the encoding matrix.
In order to solve this problem, a new QO-STBC scheme providing a simple linear detection capability was proposed [14]. By applying the Givens rotation to the detection matrix of a conventional QO-STBC scheme, new encoding matrices for three and four antenna systems were derived. The encoding matrix, X , for four transmit antennae can be expressed as follows:
X = s 1 + s 3 s 2 + s 4 s 3 s 1 s 4 s 2 s 2 * s 4 * s 1 * + s 3 * s 2 * s 4 * s 3 * s 1 * s 3 s 1 s 4 s 2 s 1 + s 3 s 2 + s 4 s 2 * s 4 * s 3 * s 1 * s 2 * s 4 * s 1 * + s 3 * .
As shown above, a signal transmitted for each time slot at each antenna has now become a linear combination of two modulation symbols. By assuming a single receive antenna, the received signal during four time slots can be expressed as
y 1 y 2 y 3 y 4 T = X h 1 h 2 h 3 h 4 T + n T ,
where h i is the channel gain from the i-th transmit antenna to the receive antenna, and n = n 1 n 2 n 3 n 4 is an AWGN vector for the four time slots. For detection, the received signal vector can be represented by using the equivalent channel matrix, H , as follows:
y 1 y 2 * y 3 y 4 * T = H s 1 s 2 s 3 s 4 T + n 1 n 2 * n 3 n 4 * T ,
where
H = h 1 h 3 h 2 h 4 h 1 + h 3 h 2 + h 4 h 2 * h 4 * h 3 * h 1 * h 2 * + h 4 * h 1 * h 3 * h 3 h 1 h 4 h 2 h 1 + h 3 h 2 + h 4 h 4 * h 2 * h 1 * h 3 * h 2 * + h 4 * h 1 * h 3 * .
The channel matrix H is orthogonal, although the encoding matrix X is quasi-orthogonal. For this reason, maximum likelihood (ML) decoding can be achieved via simple linear detection, as given by:
s ^ = H H y 1 y 2 * y 3 y 4 * T .

3. Secrecy-Enhancing LD-QO-STBC Scheme

3.1. Waveform Analysis for LD-QO-STBC

In order to design an efficient waveform for secrecy enhancement, we first investigate the signal constellation of the LD-QO-STBC scheme. By letting combinations of modulation symbols be used in (6) as follows:
x 1 = s 1 + s 3 , x 2 = s 2 + s 4 , x 3 = s 3 s 1 , x 4 = s 4 s 2 ,
the encoding matrix X in (6) can be represented as:
X = x 1 x 2 x 3 x 4 x 2 * x 1 * x 4 * x 3 * x 3 x 4 x 1 x 2 x 4 * x 3 * x 2 * x 1 * .
Because each element of X is a linear combination of any possible values of s i and s j , the waveforms of s i and x i will be different. In order to investigate the signal distributions, we denote constellation symbol sets used for s i and x i as a O a and b O b , respectively. We note that for any Gray-coded QAM constellation symbol mapping, s i , s i , s i * , and s i * are all in the same set O a , due to its symmetric constellation. Likewise, elements of X that are either x i , x i , x i * , or x i * , are in the same set O b . Nevertheless, it is clear that O b forms a different set from O a .
Figure 2 demonstrates an example of waveform transformation from O a to O b when 4-QAM is used for a. In the figure, we denote a i and b i as one of the complex constellation symbols included in O a and O b , respectively. In addition, we derive the probability density function (PDF) of b, and show that it is not a uniform distribution. For any M-ary QAM, we can assume that without loss of generality, the PDF of a follows a uniform distribution. That is,
f a ( a ) = 1 / M , a O a .
By assuming the independency of the real and imaginary parts of a,
f a R ( a R ) = 1 / M , f a I ( a I ) = 1 / M , a O a ,
where a R and a I are the real and imaginary parts of a complex value a, respectively.
For any symbol b, we note that it is the sum of two independent random variables, so its PDF can be found by first taking the convolution of f b R ( b R ) and f b I ( b I ) in their real and imaginary parts, respectively. Therefore,
f b R ( b R ) = f a R ( a R ) * f a R ( a R ) , f b I ( b I ) = f a I ( a I ) * f a I ( a I ) , a O a ,
and finally using the independency of real and imaginary parts,
f b ( b ) = f b R ( b R ) f b I ( b I ) , b O b .
Figure 2 compares the PDFs, f a ( a ) and f b ( b ) when 4-QAM is used for O a . We find that the number of elements in O b is greater than that in O a , and that there is a null value 0 + j 0 in O b , which is denoted by b 1 in the example of 4-QAM of Figure 2. Whatever M-ary QAM is used for O a , this null value exists. We also find that the probability of having the null value of b is the maximum among the other possible values, i.e., f b ( b 1 ) is the maximum amongst, and Figure 2 also demonstrates this. These findings will be applicable to higher-order M-ary QAM. The resultant O b from the LD-QO-STBC scheme will incur zero-crossing amongst non-zero modulation symbol values.

3.2. The Design of Artificial Interference

From the investigation in the previous section, we note that the probability of having the null value of x i , i.e., x i = 0 + j 0 is the maximum amongst all possible values in O b . We also note from (6) that whenever we have zero value of x i , there will be 2 s i value in the same row in X . For example, consider the case when x 1 = 0 , which means s 1 = s 3 , because x 1 = s 1 + s 3 as defined in (11). This implies that x 3 = 2 s 3 , because x 3 = s 3 s 1 , as in (11). We refer to these two elements that have the null value and 2 s i as a pair. Investigation of (6) reveals that there are two pairs in each row; that is, the first and third elements form one pair, and the second and fourth elements form the other pair.
We design the AI in order to satisfy the following condition. First, by adding AI, we escape the zero value transmission. For this, whenever we have a zero value of x i , we add AI that will change the transmitted symbol to a non-zero value. At the same time, we subtract the added value from the paired elements, which reduces the original amplitude. Second, the AI is added in such a way that the paired elements contribute to canceling each other’s AI at the receiving end. For this, we multiply the channel gains in such a way that the added AI is canceled.
To achieve the above design goal, we represent the received signal at Bob during the i-th time period, y b i , as follows:
y b i = j = 1 4 χ i j + ω i j h j + n b i ,
where, χ i j is the element of X in the i-th row and j-th column, ω i j is the AI term, and n b i is the noise at Bob during the i-th time period. Because χ i j and χ i ( j + 2 ) , j = 1 , 2 , always form a pair, we represent (17) as the following pairwise form:
y b i = j = 1 2 χ i j + ω i j h j + χ i ( j + 2 ) + ω i ( j + 2 ) h j + 2 + n b i .
In order to satisfy the first condition, when χ i j = 0 , we set ω i j to a non-zero value, so that it can increase the power of χ i j . At the same time, we decrease the same amount of power from the paired element. In other words, we set ω i j = ω i ( j + 2 ) = χ i ( j + 2 ) / 2 , in the case χ i j = 0 . This pairwise power reallocation will contribute to decreasing the difference of power allocations across the transmit antennae. Even though AI is added, it is a kind of reallocation of power, and thus there will be no additional average power allocation. In addition, thanks to the following solution to the second condition, this AI will be perfectly eliminated.
The second condition requires that AI should be canceled at the legitimate receiver. For this, we represent (18) by separating the signal and AI terms, that is
y b i = j = 1 2 χ i j h j + χ i ( j + 2 ) h j + 2 + j = 1 2 ω i j h j + ω i ( j + 2 ) h j + 2 + n b i .
Because the AI term in (19) is j = 1 2 ω i j h j + ω i ( j + 2 ) h j + 2 , we need to make it zero, i.e.,
j = 1 2 ω i j h j + ω i ( j + 2 ) h j + 2 = 0 .
A simple solution to (20) can be letting ω i j and ω i ( j + 2 ) contain h ( j + 2 ) and h j terms, respectively.
By combining the above two conditions at the same time, ω i j can be defined as follows:
ω i j = χ i ( j + 2 ) h j + 2 2 , ω i ( j + 2 ) = χ i ( j + 2 ) h j 2 , if j = 1 , 2 , and χ i j = 0 , ω i j = χ i ( j 2 ) h j 2 2 , ω i ( j 2 ) = χ i ( j 2 ) h j 2 , if j = 3 , 4 , and χ i j = 0 , ω i j = 0 , χ i j 0 , χ i ( j ± 2 ) 0 .
As shown above, ω i j has a non-static time-varying value that is dependent on χ i j , as well as on h j . At the transmitter part, this AI contributes to reducing the difference of power allocations, while at the receiving end, it will be perfectly canceled out. Therefore, by using (21), (18) can be represented without any AI, as follows:
y b i = j = 1 2 χ i j h j + χ i ( j + 2 ) h j + 2 + n b i .
In summary, the received signal at Bob during the four time slots can be represented as:
y b 1 y b 2 y b 3 y b 4 T = X + W h 1 h 2 h 3 h 4 T + n b T ,
where W is the AI matrix with ω i j as the element in the i-th row and j-th column. Then, the received signal after the interference cancelation can be equivalently represented as:
y b 1 y b 2 * y b 3 y b 4 * T = H s 1 s 2 s 3 s 4 T + n b 1 n b 2 * n b 3 n b 4 * T ,
and the detection can be made exactly the same as in the conventional detection using (10).
On the other hand, the received signal vector at Eve is expressed as follows:
y e 1 y e 2 y e 3 y e 4 T = ( X + W ) g 1 g 2 g 3 g 4 T + n e T ,
where g j is the channel gain from the j-th transmit antenna from Alice to Eve. Because the added AI matrix W has factors related to the channel gains of h j s for Bob, it cannot be canceled out at Eve. That is, the received signal at Eve during the i-th time slot is expressed as follows:
y e i = j = 1 2 χ i j + χ i ( j + 2 ) h j + 2 2 g j + χ i ( j + 2 ) χ i ( j + 2 ) h j 2 g j + 2 + n e i , if χ i j = 0 , j = 1 2 χ i j χ i j h j + 2 2 g j + χ i ( j + 2 ) + χ i j h j 2 g j + 2 + n e i , if χ i ( j + 2 ) = 0 , j = 1 2 χ i j g j + χ i ( j + 2 ) g j + 2 + n e i , if χ i j 0 , χ i ( j + 2 ) 0 .
Even though, there is the probability of not having AI, i.e., χ i j 0 and χ i ( j + 2 ) 0 , and thus ω i j = 0 , frequent uncanceled AI will cause serious performance degradation.

4. Performance Evaluation

This section presents the secrecy and BER performances of the proposed waveform design using LD-QO-STBC over a Rayleigh-faded MIMO channel, and compares them with the conventional schemes. In order to consider the worst-case for secrecy protection, we assume that not only Bob but also Eve have perfect CSI, and that they have the same signal-to-noise ratio (SNR). On the other hand, Alice only shares the CSI for Bob. We also assume that Alice transmits information using 4-QAM through the MIMO channel without frequency selectivity. All channel gains for each transmit symbol are assumed to be independent and constant over four consecutive symbol periods. In the simulations, the aggregated power from all the transmit antennae was normalized to one.
We first compare the secrecy capacity of the proposed scheme with the conventional schemes. It is well known that the secrecy capacity C s can be expressed by [6]:
C s = max C B C E , 0 ,
where C B and C E are the capacities achieved at Bob and Eve, respectively. Because the added AI can be canceled at Bob, C B can be estimated as in the conventional MIMO systems, as follows:
C B = log 2 det I + P σ b 2 H H H ,
where P and σ b 2 are the transmit power and noise variance at Bob, resulting in P / σ b 2 being the SNR. On the other hand, C E is estimated by accounting for the added AI, as follows [18]:
C E = log 2 det I + P W 2 + σ e 2 G G H ,
where, σ e 2 is the noise variance at Eve.
We estimate the secrecy performance in terms of C s in (27), and Figure 3 compares the simulation results of the average secrecy capacity. For comparative purpose, we implement a number of conventional schemes: (1) the Alamouti scheme [15], (2) the LD-QO-STBC scheme [14], (3) the QO-STBC scheme with power scaling [13], (4) the Alamouti scheme with AN [10], and (5) the proposed scheme. Because we assume that Bob and Eve have perfect CSI of their own and the same SNR, the secrecy capacities of the conventional schemes without any AN or AI, i.e., (1), (2), and (3), are almost zero. On the other hand, the addition of AN to the Alamouti scheme contributes largely to enhancing the secrecy capacity, even though Eve has the same SNR as Bob. Moreover, the proposed scheme achieves the best secrecy performance amongst the various schemes.
Next, Figure 4 compares the BER performance simulation results. With the conventional schemes, (1), (2), and (3), Bob and Eve will have almost the same BER performance. On the other hand, due to the highly enhanced secrecy protection in (4) the Alamouti scheme with AN, and (5) the proposed scheme, the BER performance at Eve approaches to 0.5. This means that there is no information leakage to Eve. However, at the expense of power usage of adding AN in scheme (4), we have to sacrifice power loss. For example, in scheme (4) the same power is allocated to AN as to the information signal, so we can find a 3 dB power loss in the performance. On the other hand, the proposed scheme utilizes the pairwise power reallocation for AI, and thus it does not incur any power loss.

5. Conclusions

In this paper, we presented a novel secrecy-enhancing scheme by tailoring the waveform of the LD-QO-STBC scheme. The proposed scheme employed dynamic AI that was dependent on the signal, as well as the channel gain of the legitimate receiver. The dependency on the information signal was used to reduce the difference of power allocations across the transmit antennae. In addition, the dependency on the channel gain was used to cancel the AI only at the legitimate receiver, while imposing serious interference on the passive eavesdropper. As a result, the secrecy capacity was highly enhanced. The BER simulation results showed that the proposed scheme prevented information leakage to the illegal listener, even in the case when the illegal listener has a perfect CSI and the same SNR as the legitimate receiver. Because the proposed method does not incur any power loss due to the addition of AI, it can be efficiently utilized for many wireless systems using STBC, resulting in diversity gain as well as security protection. Based on the promising results of the proposed scheme, our future work can be directed to the investigation of dynamic waveform design and efficient detection schemes utilizing artificial intelligence techniques [19,20].

Author Contributions

Conceptualization, S.K. and H.L.; methodology, P.S.; software, P.S.; validation, P.S., H.L. and S.K.; writing–original draft preparation, P.S.; writing–review and editing, S.K.; supervision, S.K.; project administration, S.K.; funding acquisition, S.K. All authors have read and agreed to the published version of the manuscript.

Funding

The research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2017R1D1A1B03027939).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Coskun, A.F.; Kucur, O. Secrecy outage probability of conventional and modified TAS/Alamouti-STBC schemes with power allocation in the presence of feedback errors. IEEE Trans. Veh. Technol. 2019, 68, 2609–2623. [Google Scholar] [CrossRef]
  2. Hamamreh, J.M.; Furqan, H.M.; Arslan, H. Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey. IEEE Commun. Surv. Tutor. 2018, 21, 1. [Google Scholar] [CrossRef]
  3. Wu, Y.; Khisti, A.; Xiao, C.; Caire, G.; Wong, K.-K.; Gao, X. A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE J. Sel. Areas Commun. 2018, 36, 679–695. [Google Scholar] [CrossRef] [Green Version]
  4. Yener, A.; Ulukus, S. Wireless physical-layer security: Lessons learned from information theory. Proc. IEEE 2015, 103, 1814–1825. [Google Scholar] [CrossRef] [Green Version]
  5. Liu, T.; Shamai, S. A note on secrecy capacity of multiple-antenna wiretap channel. IEEE Trans. Inf. Theory 2009, 55, 2547–2553. [Google Scholar] [CrossRef]
  6. Oggier, F.; Hassbii, B. The secrecy capacity of the MIMO wiretap channel. IEEE Trans. Inf. Theory 2011, 57, 4961–4972. [Google Scholar] [CrossRef] [Green Version]
  7. Shang, P.; Yu, W.; Zhang, K.; Jiang, X.-Q.; Kim, S. Secrecy enhancing scheme for spatial modulation using antenna selection and artificial noise. Entropy 2019, 21, 626. [Google Scholar] [CrossRef] [Green Version]
  8. Yan, S.; Yang, N.; Malaney, R.; Yuan, J. Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels. IEEE Trans. Wirel. Commun. 2014, 13, 1656–1667. [Google Scholar] [CrossRef]
  9. Allen, T.; Tajer, A.; AL-Dhahir, N. Secure Alamouti MAC transmissions. IEEE Trans. Wirel. Commun. 2017, 16, 3674–3682. [Google Scholar] [CrossRef]
  10. Shang, P.; Kim, S.; Jiang, X.-Q. Efficient Alamouti-coded spatial modulation for secrecy enhancing. In Proceedings of the 2019 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea, 16–18 October 2019. [Google Scholar]
  11. Pouri, A.B.; Torabi, M. Physical layer security in space-time block codes from coordinate interleaved orthogonal design. IET Commun. 2020, 14, 2007–2017. [Google Scholar] [CrossRef]
  12. Li, M.L.; Yuan, H.; Yue, X.; Muhaidat, S.; Maple, C.; Dianati, M. Secrecy outage analysis for Alamouti space–time block coded Non-Orthogonal multiple access. IEEE Commun. Lett. 2020, 24, 1405–1409. [Google Scholar] [CrossRef] [Green Version]
  13. Chae, S.; Bang, I.; Lee, H. Physical layer security of QSTBC with power scaling in MIMO wiretap channels. IEEE Trans. Veh. Technol. 2020, 69, 5647–5651. [Google Scholar] [CrossRef]
  14. Park, U.; Kim, S.; Lim, K.; Li, J. A novel QO-STBC scheme with linear decoding for three and four transmit antennas. IEEE Commun. Lett. 2008, 12, 868–870. [Google Scholar] [CrossRef]
  15. Alamouti, S.M. A simple transmit diversity technique for wireless communications. IEEE J. Sel. Areas Commun. 1998, 16, 1451–1458. [Google Scholar] [CrossRef]
  16. Jafarkhani, H. A quasi-orthogonal space-time block code. In Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, Chicago, IL, USA, 23–28 September 2000. [Google Scholar]
  17. Tirkkonen, O.; Boariu, A.; Hottinen, A. Minimal non-orthogonality rate 1 space-time block code for 3+ Tx antennas. In Proceedings of the 2000 IEEE Sixth International Symposium On Spread Spectrum Techniques and Applications, Parsippany, NJ, USA, 6–8 September 2000. [Google Scholar]
  18. Negi, R.; Goel, S. Secret communication using artificial noise. In Proceedings of the 2005 IEEE 62nd Vehicular Technology Conference, Dallas, TX, USA, 28 September 2005. [Google Scholar]
  19. Martino, L.; Read, J. Joint Introduction to Gaussian Processes and Relevance Vector Machines with Connections to Kalman Filtering and other Kernel Smoothers. Available online: https://arxiv.org/abs/2009.09217 (accessed on 19 September 2020).
  20. O’Shea, T.J.; Erpek, T.; Clancy, T.C. Deep Learning Based MIMO Communications. Available online: https://arxiv.org/abs/1707.07980 (accessed on 25 July 2017).
Figure 1. System model of the Alamouti-coded physical layer security (PLS) with artificial noise (AN).
Figure 1. System model of the Alamouti-coded physical layer security (PLS) with artificial noise (AN).
Electronics 09 02003 g001
Figure 2. Signal constellations and PDFs for a O a and b O b used for s i and x i , respectively.
Figure 2. Signal constellations and PDFs for a O a and b O b used for s i and x i , respectively.
Electronics 09 02003 g002
Figure 3. Secrecy capacity of the proposed scheme over a Rayleigh fading channel compared to the conventional space–time block coding (STBC)-based PLS schemes.
Figure 3. Secrecy capacity of the proposed scheme over a Rayleigh fading channel compared to the conventional space–time block coding (STBC)-based PLS schemes.
Electronics 09 02003 g003
Figure 4. Comparison of bit error rate (BER) performances for various STBC-based PLS schemes over a Rayleigh fading channel at the legitimate (Bob) and illegal (Eve) receivers.
Figure 4. Comparison of bit error rate (BER) performances for various STBC-based PLS schemes over a Rayleigh fading channel at the legitimate (Bob) and illegal (Eve) receivers.
Electronics 09 02003 g004
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Shang, P.; Lee, H.; Kim, S. Waveform Design for Space–Time Coded MIMO Systems with High Secrecy Protection. Electronics 2020, 9, 2003. https://doi.org/10.3390/electronics9122003

AMA Style

Shang P, Lee H, Kim S. Waveform Design for Space–Time Coded MIMO Systems with High Secrecy Protection. Electronics. 2020; 9(12):2003. https://doi.org/10.3390/electronics9122003

Chicago/Turabian Style

Shang, Pingping, Hyein Lee, and Sooyoung Kim. 2020. "Waveform Design for Space–Time Coded MIMO Systems with High Secrecy Protection" Electronics 9, no. 12: 2003. https://doi.org/10.3390/electronics9122003

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop