Beruflich Dokumente
Kultur Dokumente
7, JULY 2009
Abstract—Recently, Li, Hwu and Ratazzi have proposed a binary coding. In wireless security, one practical objective
physical-layer security design to guarantee low probability of is to design a wireless transmission with low probability of
interception (LPI) for MIMO systems without relying on upper- interception (LPI). Recently, an innovative method has been
layer data encryption. The proposed scheme utilizes antenna
array redundancy to deliberately randomize the transmitted proposed by Li, Hwu and Ratazzi to achieve LPI without
signals to prevent eavesdropping. Motivated by their idea, in this relying on upper-layer data encryption for MIMO systems [6],
paper we design a physical-layer transmission scheme to achieve [7]. The proposed method utilizes antenna array redundancy
LPI in cooperative systems. There are two major differences to deliberately randomize the transmitted signals to prevent
in cooperative systems: 1) each relay node may have only one eavesdropping. In this method, training signals are not trans-
antenna that can not provide antenna array redundancy for
signal randomization; 2) there may exist timing errors due to mitted from the transmitter but from the authorized receiver,
the asynchronous nature of cooperative systems. Considering the thus the transmitter knows the channel while the authorized
two differences, we propose a distributed differentially encoded receiver does not. On the other hand, the eavesdropper may
OFDM transmission scheme with deliberate signal randomization use multiple antennas to obtain better received signal quality
to prevent eavesdropping and exploit the available spatial and than the authorized receiver does and knows all the trans-
frequency diversities in asynchronous cooperative systems. We
use diagonal unitary codes to perform the differential encoding mission protocols. For this reason, the scheme in [6], [7]
in the frequency domain over subcarriers within each OFDM uses a deliberate signal randomization technique to randomize
block, or we use general (not necessarily diagonal) unitary the eavesdropper’s received signals but not the authorized
codes to perform the differential encoding in the frequency receiver’s received signals. Thus, the eavesdropper can neither
domain across several OFDM blocks. By some deliberate signal implement channel estimation [8] for non-blind detection
randomization, the eavesdropper can not detect the transmitted
symbols, while the authorized receiver can perform differential without training signals nor implement blind deconvolution
decoding successfully without the knowledge of the channels or [9] due to the randomized received signals.
the timing errors. In this paper, we are interested in designing a physical-layer
Index Terms—Differential space-time-frequency coding, asyn- transmission scheme to achieve LPI in cooperative systems.
chronous cooperative diversity, unitary codes, OFDM, wireless We propose a deliberate signal randomization technique to
security, low probability of interception.
randomize the eavesdropper’s received signals but not the
authorized receiver’s received signals. However, in cooperative
I. I NTRODUCTION systems, there are two major differences from MIMO systems:
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:38 from IEEE Xplore. Restrictions apply.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 7, JULY 2009 3373
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:38 from IEEE Xplore. Restrictions apply.
3374 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 7, JULY 2009
at the kth (0 ≤ k ≤ N − 1) subcarrier at the mth (1 ≤ m ≤ M) received signals are randomized to prevent eavesdropping.
antenna of the eavesdropper E can be written as: We first describe the distributed differentially space frequency
J coded scheme using diagonal unitary codes, and then we
√ design the random weighting coefficients at the relay nodes.
Ym (k) = ρ Xi (k)Hi,m (k)f τi,m (k) + Zm (k) (3)
i=1
Moreover, we use general (not necessarily diagonal) unitary
codes to construct the distributed differentially space-time-
where Hi,m (k) is the channel frequency response at the kth frequency coded scheme to achieve better performance.
subcarrier between the ith relay node and the mth antenna of
E, and Zm (k) is the AWGN with zero mean and unit variance.
Similarly, Hi,m (k) can be specified as
L−1
A. A Distributed Differentially Space Frequency Coded
Hi,m (k) = αi,m (l)e−j2πkΔf τi,m (l)
Scheme Using Diagonal Unitary Codes
i=0
where αi,m (l) and τi,m (l) are the multipath channel coefficient Our distributed differentially space frequency coded scheme
of the lth path and the delay of the lth path, respectively. And is based on the space frequency codes in [14], [15] and
τi,m is the timing error between the ith relay and the mth the corresponding differential scheme in [16]. The major
antenna of E. Note that, for equation (3), it has assumed that difference of the scenario here from [16] is that the un-
the length of CP is not less than maxi,l,m {τi,m (l) + τi,m }. known channel at the receiver D is caused by our deliberate
From the above equation, it is obvious that E can try randomized weighting coefficients and the unknown timing
to detect the transmitted symbols based on better received errors, which motivates our following new transceiver design.
signal quality. In the following section, we will design a In the following, we assume the frequency-selective channels
physical-layer secure transmission scheme to prevent E from keep unchanged within each OFDM block, and may change
eavesdropping under the assumption that the relay nodes and independently from one OFDM block to another OFDM block,
D share no additional information such as secret keys [3] i.e., it may be fast fading.
beforehand and know nothing about the eavesdropper E.
Notice that in the frequency domain phase change vector
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:38 from IEEE Xplore. Restrictions apply.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 7, JULY 2009 3375
information symbols and it has a diagonal form: From the conjugation property, we have fτpD = (fτ D ∗
p ) , thus
⎡ ⎤ we can rewrite (5) as
X1 (Bp + 1)
⎢ .. ⎥ √
⎢ . ⎥ Y∗
p = ρIΓJ W∗ ∗ τD ∗
p ◦ Hp ◦ fp + Zp , p = 1, 2, ..., P (6)
⎢ ⎥
⎢ X (B p + Γ) ⎥
⎢ 1 ⎥ From (4) and (6), if Wp ◦ Hp = W∗ ∗
⎢ .. ⎥ p ◦ Hp , we have
Xp = ⎢ . ⎥,
⎢ ⎥
⎢ XJ (Bp + (J − 1)Γ + 1) ⎥ Yp = Xp Y∗
p + Z̃p (7)
⎢ ⎥
⎢ .. ⎥
⎣ . ⎦
where Z̃p = Zp − Xp Z∗ p is a noise vector where each entry
XJ (Bp + (J − 1)Γ + Γ) is a Gaussian random variable with mean zero and variance
√
where Xi (k) is what is transmitted for the ith relay at the kth 2. Since Xp = IΓJ , so Xp = Vp . Without the CSI, the
subcarrier and otherwise there is no tranmission. For group maximum-likelihood (ML) decoding can be performed as
p in the second P groups, the transmission matrix Xp is a
ΓJ × ΓJ signal matrix including the corresponding reference
symbols. Xp also has a diagonal form which can be expressed X̂p = argmin ||Yp − Xp Y∗ 2
p ||F . (8)
Xp ∈Λ
as
⎡ ⎤ We now look at the condition Wp ◦ Hp = W∗ ∗
p ◦ Hp we
X1 (N − (Bp + 1))
⎢ .. ⎥ made for the ML decoding in (8), which is, in fact, easy to
⎢ . ⎥ satisfy since each relay node knows its own channel in the
⎢ ⎥
⎢ X
(N − (B + Γ)) ⎥ scenario in this paper. Since its own channel is known at a
⎢ 1 p ⎥
⎢ . .. ⎥ relay node, the relay node can then design random weighting
Xp = ⎢ ⎥
⎢ ⎥ coefficients so that Wp ◦ Hp = W∗ ∗
⎢
XJ (N − (Bp + (J − 1)Γ + 1)) ⎥ p ◦ Hp for the authorized
⎢ ⎥ user D, while the received signals are changing randomly on
⎢ .. ⎥
⎣ . ⎦ each subcarrier in each OFDM block for the eavesdropper E
as we shall explain below.
XJ (N − (Bp + (J − 1)Γ + Γ))
entry of fτ D
is f τi,D (N − (Bp + (i − 1)Γ + γ)), Zp is the |wi (k)||Hi,D (k)| = |wi∗ (N − k)||Hi,D
∗
(N − k)| = C
p
corresponding noise vector. |wi (k)|2 + |wi∗ (N − k)|2 = 2.
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:38 from IEEE Xplore. Restrictions apply.
3376 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 7, JULY 2009
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:38 from IEEE Xplore. Restrictions apply.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 7, JULY 2009 3377
p ||F . (17)
10
Xp ∈Λ
We can see that (17) has the same form as (8) except
we utilize the nondiagonal unitary matrix Xp to carry the −2
BER
10
transmitted information. The received signal model and the
differential decoding for E can be similarly obtained as in
(10)-(13).
−3
10
E, Γ=1, 0.48 bits/s/Hz
IV. S IMULATION R ESULTS E,
D,
Γ=2, 0.47 bits/s/Hz
Γ=1, 0.48 bits/s/Hz
D, Γ=2, 0.47 bits/s/Hz
In this section, we present some simulation results to show
the effectiveness of the proposed transmission schemes by 10
−4
0 2 4 6 8 10 12 14 16 18 20
comparing the BERs of D and E. In the simulations, we ρ(dB)
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:38 from IEEE Xplore. Restrictions apply.
3378 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 7, JULY 2009
0
10 0.61 bits/s/Hz
0
10
−1
10 −1
10
BER
−2
10
BER
−2
10
−3
10 E, G2,8, 0.73 bits/s/Hz −3
10 E, G4,32
E, G2,16, 0.97 bits/s/Hz
E, P2,32
D, G2,8, 0.73 bits/s/Hz
D, G4,32
D, G2,16, 0.97 bits/s/Hz
D, P2,32
−4
10 −4
0 5 10 15 20 25 10
ρ(dB) 0 2 4 6 8 10 12 14 16 18 20
ρ(dB)
Fig. 3. BER comparison between D and E with higher information bit rate
Fig. 5. BER comparison between diagonal code and nondiagonal code when
using diagonal code.
Γ = 2.
1.23 bits/s/Hz
V. C ONCLUSION
0
10
−2
10
space-time-frequency) encoded OFDM transmission schemes.
The authorized receiver can implement the detection by the
differential decoding without the knowledge of the channels
−3
10 E, G
2,32
nor the timing errors. Meanwhile, the eavesdropper can hardly
E, P2,32
D, G2,32
implement the differential decoding and its blind deconvolu-
D, P2,32 tion capacity is also prevented. Although the proposed scheme
will cause rate loss, it is useful in some cases, such as wireless
−4
10
0 5 10 15 20 25 sensor networks for military use where security is of primary
ρ(dB)
concern.
Note that in this paper we have only considered the low
Fig. 4. BER comparison between diagonal code and nondiagonal code when probability of interception (LPI). The unique property of the
Γ = 1.
proposed schemes is combating the unknown timing errors
existed in the cooperative system as well as keeping the LPI.
Other problems of physical-layer security such as low prob-
Then we compare the performance when utilizing frequency ability of detection (LPD) or malicious relays in cooperative
diversity if Γ = 2. For the diagonal code, we choose the systems are certainly interesting but left for future research.
cyclic group code G4,32 = (4, 32, [1, 7, 9, 15]) in which each
signal matrix represents 5 information bits and this code is the R EFERENCES
optimal cyclic group code at the rate 1.25. For the nondiagonal [1] M. Shin, J. Ma, A. Mishra, and W. A. Arbaugh, “Wireless network
code, we still use the 2 × 2 parametric code V(30, 6, 0) and security and interworking," in Proc. IEEE, vol. 94, pp. 455-466, Feb.
repeat it across the subcarriers to construct a 4 × 4 block 2006.
[2] A. S. K. Pathan, H. W. Lee, and C. S Hong, “Security in wireless sensor
diagonal code to obtain frequency diversity. Thus it has the networks: issues and challenges," in Proc. International Conf. Advanced
same rate 1.25 as the diagonal code. The information bit rate Commun. Technology, 2006, vol. 2, pp. 1043-1048, Feb. 2006.
is 0.61 bits/s/Hz for both cases. As shown in Fig. 5, the [3] M. J. Mihaljevic and R. Kohno, “On wireless communications privacy
and security evaluation of encryption techniques," in Proc. IEEE WCNC
performance is almost the same for the two codes. However, 2002, vol. 2, pp. 865-868, Mar. 2002.
we may use the permutation techniques proposed in [15] to [4] Y. Chen and A. J. H. Vinck, “Wiretap channel with side information,"
further improve the performance of the nondiagonal unitary IEEE Trans. Inform. Theory., vol. 54, pp. 395-402, Jan. 2008.
[5] P. Venkitasubramaniam, T. He, and L. Tong;, “Anonymous networking
codes. amidst eavesdroppers," IEEE Trans. Inform. Theory, vol. 54, pp. 2770-
As a remark, although we have only shown the simulation 2784, June 2008.
[6] X. Li, J. Hwu, and E. P. Ratazzi, “Array redundancy and diversity for
results for two receive antennas for E, similar results hold wireless transmissions with low probability of interception," in Proc.
when there are more than 2 receive antennas for E. IEEE ICASSP 2006, vol. 4, May 2006.
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:38 from IEEE Xplore. Restrictions apply.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 7, JULY 2009 3379
[7] X. Li, J. Hwu, and E. P. Ratazzi, “Using antenna array redundancy and frequency codes with optimum coding advantage," IEEE Trans. Inform.
channel diversity for secure wireless transmissions," J. Commun., vol. 2, Theory., vol. 51, pp. 229-249, Jan. 2005.
pp. 24-32, May 2007. [16] W. Su and K. J. R. Liu, “Differential space-frequency modulation via
[8] J. Q. Bao and L. Tong, “Protocol-aided channel equalization in wireless smooth logical channel for broadband wireless communications," IEEE
ATM," IEEE J. Select. Areas Commun., vol. 18, pp. 418-435, Mar. 2000. Trans. Commun., vol. 53, pp. 2024-2028, Dec. 2005.
[9] S. Haykin, Blind Deconvolution. Englewood Cliffs, NJ: Prentice Hall, [17] W. Zhang, X.-G. Xia, and K. B. Letaief, “Space-time/frequency coding
1994. for MIMO-OFDM in next generation broadband wireless systems," IEEE
[10] Y. Mei, Y. Hua, A. Swami, and B. Daneshrad, “Combating synchro- Wireless Commun., Special Issue Next Generation CDMA vs. OFDMA
nization errors in cooperative relays," in Proc. IEEE ICASSP 2005, vol. 4G Wireless Applications, vol. 14, no. 3, 2007.
3, pp. 369-372, Mar. 2005. [18] A. Shokrollahi, B. Hassibi, B. M. Hochwald, and W. Sweldens, “Repre-
[11] Z. Li and X.-G. Xia, “A simple Alamouti space-time transmission sentation theory for high-rate multiple-antenna code design," IEEE Trans.
scheme for asynchronous cooperative systems," IEEE Signal Processing Inform. Theory., vol. 47, pp. 2335-2367, Sept. 2001.
Lett., vol. 14, pp. 804-807, Nov. 2007. [19] X.-B. Liang and X.-G. Xia, “Unitary signal constellations for differential
space-time modulation with two transmit antennas: parametric codes,
[12] G. Xu and H. Liu, “An effective transmission beamforming scheme for
optimal designs, and bounds," IEEE Trans. Inform. Theory, vol. 48, pp.
frequency-division-duplex digital wireless communication systems," in
2291-2322, Aug. 2002.
Proc. IEEE ICASSP 1995, vol. 3, pp. 1729-1732, May 1995.
[20] B. M. Hochwald and W. Sweldens, “Differential unitary space-time
[13] J. Proakis, Digital Communications, 4th ed. New York: McGraw-Hill, modulation," IEEE Trans. Inform. Theory, vol. 48, pp. 2041-2052, Dec.
2000 2000.
[14] W. Su, Z. Safar, and K. J. R. Liu, “Systematic design of space-frequency [21] B. L. Hughes, “Optimal space-time constellations from groups," IEEE
codes with full rate and full diversity," in Proc. IEEE WCNC 2004, vol. Trans. Inform. Theory, vol. 49, pp. 401-410, Feb. 2003.
3, pp. 1436-1441, Mar. 2004.
[15] W. Su, Z. Safar, and K. J. R. Liu, “Full-rate full-diversity space-
Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 28, 2009 at 06:38 from IEEE Xplore. Restrictions apply.