TY - GEN
T1 - A new jamming technique for secrecy in multi-antenna wireless networks
AU - Bakr, Osman
AU - Mudumbai, Raghuraman
N1 - KAUST Repository Item: Exported on 2020-10-01
Acknowledgements: Omar Bakr’s research is sponsored by a fellowship from King AbdullahUniversity of Science and Technology. The authors would also like toacknowledge the students, faculty and sponsors of the Berkeley WirelessResearch Center, and the National Science Foundation Infrastructure GrantNo. 0403427.
This publication acknowledges KAUST support, but has no KAUST affiliated authors.
PY - 2010
Y1 - 2010
N2 - We consider the problem of secure wireless communication in the presence of an eavesdropper when the transmitter has multiple antennas, using a variation of the recently proposed artificial noise technique. Under this technique, the transmitter sends a pseudo-noise jamming signal to selectively degrade the link to the eavesdropper without affecting the desired receiver. The previous work in the literature focuses on ideal Gaussian signaling for both the desired signal and the noise signal. The main contribution of this paper is to show that the Gaussian signaling model has important limitations and propose an alternative "induced fading" jamming technique that takes some of these limitations into account. Specifically we show that under the Gaussian noise scheme, the eavesdropper is able to recover the desired signal with very low bit error rates when the transmitter is constrained to use constant envelope signaling. Furthermore, we show that an eavesdropper with multiple antennas is able to use simple, blind constant-envelope algorithms to completely remove the Gaussian artificial noise signal and thus defeat the secrecy scheme. We propose an alternative scheme that induces artificial fading in the channel to the eavesdropper, and show that it outperforms the Gaussian noise scheme in the sense of causing higher bit error rates at the eavesdropper and is also more resistant to constant modulus-type algorithms.
AB - We consider the problem of secure wireless communication in the presence of an eavesdropper when the transmitter has multiple antennas, using a variation of the recently proposed artificial noise technique. Under this technique, the transmitter sends a pseudo-noise jamming signal to selectively degrade the link to the eavesdropper without affecting the desired receiver. The previous work in the literature focuses on ideal Gaussian signaling for both the desired signal and the noise signal. The main contribution of this paper is to show that the Gaussian signaling model has important limitations and propose an alternative "induced fading" jamming technique that takes some of these limitations into account. Specifically we show that under the Gaussian noise scheme, the eavesdropper is able to recover the desired signal with very low bit error rates when the transmitter is constrained to use constant envelope signaling. Furthermore, we show that an eavesdropper with multiple antennas is able to use simple, blind constant-envelope algorithms to completely remove the Gaussian artificial noise signal and thus defeat the secrecy scheme. We propose an alternative scheme that induces artificial fading in the channel to the eavesdropper, and show that it outperforms the Gaussian noise scheme in the sense of causing higher bit error rates at the eavesdropper and is also more resistant to constant modulus-type algorithms.
UR - http://www.scopus.com/inward/record.url?scp=77955703276&partnerID=8YFLogxK
U2 - 10.1109/ISIT.2010.5513559
DO - 10.1109/ISIT.2010.5513559
M3 - Conference contribution
AN - SCOPUS:77955703276
SN - 9781424469604
T3 - IEEE International Symposium on Information Theory - Proceedings
SP - 2513
EP - 2517
BT - 2010 IEEE International Symposium on Information Theory, ISIT 2010 - Proceedings
T2 - 2010 IEEE International Symposium on Information Theory, ISIT 2010
Y2 - 13 June 2010 through 18 June 2010
ER -