1. Introduction
For secure wireless communications, along with cryptographic encryption on an application layer, physical-layer security (PLS) technologies [1,2,3] have been attracting intensive research interest from various fields with numerous successful applications, such as wireless power transmission systems [4,5], massive multi-input multi-output (MIMO) systems [6,7], millimeter wave systems [8], and unmanned aerial vehicle systems [9,10,11,12]. Contrary to an anti-jamming scheme that intends to remove the jamming signals from the received signals [13,14], i.e., the data protection from the jammer’s attack, the PLS technologies are mainly focused on the data protection from being eavesdropped by the eavesdropper. Various practical PLS techniques, such as the precoding/beamforming schemes [15,16], the cooperation methods [17,18,19,20], the secrecy-achieving codes [21,22,23], and artificial noise (AN) injection [24,25,26,27,28,29], have been studied. Among these, the AN injection methods have been vigorously studied due to their simplicity and effectiveness. By adding AN to the transmitted signals at a transmitter (i.e., Alice), the secrecy capacity can be significantly improved as the AN affects as an interference only on an eavesdropper (i.e., Eve), not a legitimate user (i.e., Bob). In [27,28], an AN was designed for a secure space-time block coded (STBC) system to improve the secrecy rate of the STBC systems.
In this paper, we consider a two-antenna secure system, in which all devices including Alice, Bob, and Eve have two antennas. Following a vast majority of studies (see [30] and the references therein), both the main and the eavesdropper channels are assumed to be available at Alice. Nevertheless, Eve’s channel cannot be nullified due to the lack of spatial degrees of freedom. Furthermore, no nullspace of the main (Bob’s) channel exists without any receive-combining technique. Thus, we employed a space-time line code (STLC) scheme in [31], which is a dual transmission scheme of space-time block code [32]. The STLC scheme has been applied to various communication systems, e.g., the multiuser systems [33,34], two-way relay systems [35,36], antenna shuffling systems [37], and blind decoding systems [38]. Here, channel state information (CSI) is assumed to be available at the transmitter under the assumption that the uplink and downlink channels are symmetric in time-division duplex (TDD) mode. Assuming the TDD mode in a two-antenna secure system considered in this paper, the channels from Bob to Alice are symmetric with the channels from Alice to Bob. Hence, the legitimate downlink channels (Bob’s channel) can be obtained by estimating the uplink channels at Alice. Since STLC can achieve full spatial diversity gain with a single transmit antenna, the other transmit antenna can be utilized to generate AN. The AN is designed such that it is perfectly canceled out after decoding the STLC symbols at Bob, and its optimal power loading factor is then designed to maximize the secrecy rate, i.e., a sort of resource management scheme [34,36,39]. Furthermore, the STLC schemes can be implemented with full-blind (non-coherent) detection at the legitimate receiver [38], and the transmitter does not need to transmit long-training sequences, which also improve the secrecy rate of the network as this hinders the eavesdroppers from estimating their own channels. Numerical results verify that the designed power loading strategy maximizes the secrecy rate, and the proposed secure STLC with the power controlled AN can significantly improve PLS of the STLC systems.
Notations: Superscripts T and * denote transposition and complex conjugate, respectively, for any scalar, vector, or matrix. The notations and denote the absolute value of x and the norm of a vector , respectively; gives the span of the nullspace of ; and means that a complex random variable x conforms to a normal distribution with a zero mean and variance . stands for the expectation of a random variable x.
2. Proposed Secure STLC with AN
Consider an STLC system as shown in Figure 1, in which Alice sends two information symbols, and , through two consecutive transmissions to Bob. Here, Eve eavesdrops the information. All devices are assumed to have two antennas, i.e., two STLC systems, and without loss of generality, . Let be an STLC symbol that is transmitted through the transmit antenna at time t, where . Denote AN by and its complex-value weight by such that:
(1)
The proposed secure STLC symbols with AN are then written as follows:
(2a)
(2b)
(2c)
(2d)
where represents the channel gain from the transmit antenna of Alice to the receive antenna of Bob;(3)
is for the transmit power normalization such that:(4)
and is the power loading factor for the AN signals, where . According to the AN-power loading factor, , three operation modes can be considered as follows:: a conventional STLC mode without AN [31,33],
: a secure STLC mode with AN,
: a jamming mode without data transmission.
Herein, we focus on the secure STLC mode in this letter.
Denoting as the received signal at antenna n of Bob at time t, the four received signals are then written as follows ():
(5)
where is the additive white Gaussian noise at .The received symbols and in Equation (5) are directly combined to obtain the estimate of and , which are derived by using Equations (2)–(5) as follows:
where the first, second, and third terms of the right-hand side (RHS) of Equation (6f) are the intended signal, the interferences caused by AN, and the combined noise , respectively.Similarly, combining and in Equation (5), the estimate of is obtained as follows:
where the first, second, and third terms of the RHS of Equation (7f) are the intended signal, the interferences caused by AN, and the combined noise .To eliminate the AN effects on Bob perfectly, the second terms in the RHS of Equations (6f) and (7f) should be a zero as follows:
(8a)
(8b)
Therefore, the AN weights, , should fulfill the following conditions, which are a matrix and vector representation of Equation (8):
(9)
From Equation (9), the AN weights are obtained as follows:
(10)
where gives the span of the nullspace of a matrix , which is a unit-norm vector, and thus, . Using Equations (6f), (7f) and (10), the combined STLC signals turn into the interference-free estimates as:(11)
Noting that and are not coupled with each other in Equation (11), two separate maximum-likelihood detections can be applied to detect and independently. Here, the detection signal-to-noise (SNR) is readily derived as:
(12)
From Equation (12), we verify that the secure STLC achieves performance identical to that of the conventional STLC and STBC in terms of the spatial diversity gain.
As we extend the number of transmit antennas from two to M, where M is an even number for simple derivation, which is not a necessary condition of M in practice, the AN effects on Bob Equation (8) can be generally written as follows:
(13a)
(13b)
Thus, the AN weights, , should fulfill the following conditions:
(14)
where:(15)
From this, the AN weights are obtained as follows:
(16)
The computational complexity to design AN for M transmit antenna STLC systems, i.e., STLC systems, is roughly . Since the computational complexity to design a power control factor , which is shown in the next section, is lower than that for the AN design, the total computational complexity of the proposed method is .
3. Power Control for AN
Denote Eve’s channel gain between the transmit antenna of Alice and the receive antenna of Eve by . The received signal of Eve is then written as follows ():
(17)
where is AWGN with the same variance as , i.e., . Suppose that Eve operates optimally for the coherent detection and successive inter-symbol-interference cancellation (SIC) with full CSI (FCSI) including and . In other words, we consider the worst case scenario of the secure communications. After the perfect STLC combining and SIC procedure, Eve obtains the estimate of as follows:(18)
where:(19a)
(19b)
Note that Eve cannot cancel AN even with FCSI. Thus, the effective signal-to-interference-plus-noise ratio (SINR) of Eve is derived from Equation (18) as follows:
(20)
where the effective Eve channel gain and AN are defined as:(21)
(22)
From Equations (12) and (20), it is clear that the SNR of Bob and the SINR of Eve are the functions of a power loading factor, . Consequently, for the given channels, the worst-case instantaneous secrecy rate is defined as a function of as:
(23)
where .We now design , which maximizes the worst-case secrecy rate as follows:
(24)
The equivalent objective function of Equation (24) can be derived as follows:
(25)
where comes from the facts that the secure communication is feasible, i.e., , and is a monotonically-increasing function.Since the convexity of the objective function in Equation (25) with respect to depends on the system parameters, namely , , , and , to find the optimal , we have to check the critical points including two boundary points 0 and 1. To find the critical point of between 0 and 1, we relax the feasible reason of to the entire real values and derive from the first-order optimality condition, i.e.,
(26)
By solving Equation (26) with respect to , we can obtain the critical point as follows:
(27)
where:We can then obtain the optimal by considering the feasible region of and two boundaries of , namely 0 and 1, as follows:
(29)
From Equation (29), the interesting remarks, which can be a guideline to design the AN power loading factor, are obtained as follows:
As the channel quality between Alice and Bob becomes better, i.e., γ increases, more power is allocated to the intended signals, i.e., α decreases, to further exploit the good quality of the main channels.
As the quality of the eavesdropper channel between Eve and Alice becomes better, i.e., and increase, more power is allocated to the AN signals, i.e., α increases, to hinder Eve from eavesdropping.
The remarks are intuitively reasonable. If Eve’s channel is dominant, more power is allocated to AN as it is more efficient for the secrecy rate improvement to reduce Eve’s rate, i.e., the second term inside the brackets in Equation (23). On the other hand, if Bob’s channel is dominant, more power is allocated to the intended signals as it is more efficient for the secrecy rate improvement to increase Bob’s rate, i.e., the first term inside the brackets in Equation (23). The remarks are verified through the simulation results in Figure 2. Figure 2 shows the optimal power loading factor for AN, according to and , where we set and . For varying , we set , while for varying , we set . From these results, we clearly observe that the optimal AN power increased as increased or as decreased, as stated in Remarks 1 and 2.
Numerical results verifying the optimality of in Equation (29) are shown in Figure 3. As observed in Figure 3, achieved the maximum of the equivalent cost function in Equation (25) in the feasible region; as a result, the designed in Equation (29) provided the maximum secrecy rate.
4. Numerical Results
In this section, we compare the proposed secure STLC with AN and the conventional STLC without AN. In Figure 4, the secrecy rate in Equation (23) has been evaluated over Eve’s channel quality when and . Obviously, the secrecy rate decreased as increased. However, the secrecy rate’s decrease of the speed of the proposed secure STLC was relatively moderate compared to that of the conventional STLC. From the results, we see that the proposed secure STLC always outperformed the conventional STLC; especially, Eve’s channel gain was relatively stronger than Bob’s channel gain.
In Figure 5, the secrecy rate in Equation (23) was evaluated over Bob’s channel quality when and . Obviously, the secrecy rate increased as increased. Here, the secrecy rate’s increase of the speed of the proposed secure STLC was relatively faster compared to the conventional STLC. From the results, we see that the proposed secure STLC always outperformed the conventional STLC; especially, Bob’s channel gain was relatively stronger than Bob’s channel gain.
From the results in Figure 4 and Figure 5, it is verified that the proposed secure STLC system with AN always outperformed the conventional STLC system, i.e., . Especially, when the main and eavesdropper channels were highly asymmetric, i.e., one channel gain was relatively stronger than the other one, the proposed secure STLC system could significantly improve the secrecy rate compared to the conventional STLC system.
In Figure 6, the secrecy rate was evaluated over noise variance . As expected, the secrecy rate decreased as increased, and both secrecy rates of the proposed secure STLC and the conventional STLC were merged at the low secrecy rate as both Bob and Eve achieved very low rates. From the results, we see that the proposed AN with power control played a crucial role in the secure communication, especially in the high system SNR regime.
5. Conclusions
In this paper, we have designed artificial noise and its optimal power loading factor to improve the secrecy rate of a space-time line code (STLC) system. The proposed secure STLC systems can significantly improve the secrecy rate of the conventional STLC system, as verified by the numerical results.
Author Contributions
Conceptualization, J.J. and J.C.; methodology, J.C.; software, J.J.; validation, J.J. and J.C.; investigation, J.C. and B.C.J.; writing, original draft preparation, J.J.; writing, review and editing, B.C.J. and S.Y.; visualization, J.J.; supervision, J.J.; project administration, J.J.; funding acquisition, J.J.
Funding
This research was supported in part by the Chung-Ang University Research Grants in 2019 and in part by the National Research Foundation of Korea (NRF) Grant 2018R1A4A1023826 funded by the Korean government (MSIT).
Conflicts of Interest
The authors declare no conflict of interest.
Figures
Figure 1. The 2×2 secure space-time line coded (STLC) system model, with a transmitter (Alice) and legitimate receiver (Bob). Here, one eavesdropper (Eve) eavesdrops actively.
Figure 2. Optimal power loading factor αo for artificial noise (AN) over γ when ϵa=ϵh=ϵ=8 and σ2=0.1 and over ϵ when γ=4 and σ2=0.1.
Figure 4. Secrecy rate evaluation results over Eve’s channel quality ϵ when γ=4 and σ2=0.1.
Figure 5. Secrecy rate evaluation results over Bob’s channel quality γ when ϵ=8 and σ2=0.1.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2019 by the authors.
Abstract
In this paper, we consider a
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details



1 School of Electrical and Electronics Engineering, Chung-Ang University, Seoul 06974, Korea
2 School of Electronics and Information Engineering, Korea Aerospace University, Gyeonggi-do 10540, Korea
3 Department of Electronics Engineering, Chungnam National University, Daejeon 34134, Korea