Security over OFDM Fading Channels with Friendly Jammer

In this paper, we investigate the effect of friendly
jamming power allocation strategies on the achievable average
secrecy rate over a bank of parallel fading wiretap channels.
We investigate the achievable average secrecy rate in parallel
fading wiretap channels subject to Rayleigh and Rician fading.
The achievable average secrecy rate, due to the presence of a
line-of-sight component in the jammer channel is also evaluated.
Moreover, we study the detrimental effect of correlation across the
parallel sub-channels, and evaluate the corresponding decrease in the
achievable average secrecy rate for the various fading configurations.
We also investigate the tradeoff between the transmission power
and the jamming power for a fixed total power budget. Our
results, which are applicable to current orthogonal frequency division
multiplexing (OFDM) communications systems, shed further light on
the achievable average secrecy rates over a bank of parallel fading
channels in the presence of friendly jammers.


Authors:



References:
[1] M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin, “Wireless
information-theoretic security,” IEEE Transactions on Information
Theory, vol. 54, no. 6, pp. 2515–2534, Jun. 2008.
[2] Y. Liang, H. V. Poor and S. Shamai (Shitz), Information theoretic
security. Dordrecht, The Netherlands: Now Publishers, 2009.
[3] C. E. Shannon, “Communication theory of secrecy systems,” Bell System
Technical Journal, vol. 28, pp. 656–715, 1949.
[4] A. D. Wyner, “The wire-tap channel,” Bell System Technical Journal,
vol. 54, pp. 1355–1387, 1975.
[5] I. Csiszr and J. Krner, “Broadcast channels with confidential messages,”
IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339–349,
May 1978.
[6] F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap
channel,” IEEE Transactions on Information Theory, vol. 57, no. 8, pp.
4961–4972, Aug. 2011.
[7] S. Leung-Yan-Cheong and M. Hellman, “The Gaussian wire-tap
channel,” IEEE Transactions on Information Theory, vol. 24, no. 4, pp.
451–456, Jul. 1978.
[8] P. Gopala, L. Lai, and H. El Gamal, “On the Secrecy Capacity of Fading
Channels,” IEEE Transactions on Information Theory, vol. 54, no. 10,
pp. 4687–4698, Oct. 2008.
[9] M. Bloch and J. Barros, Physical-Layer Security: From Information
Theory to Security Engineering. Cambridge University Press, 2011.
[10] J. Vilela, M. Bloch, J. Barros, and S. McLaughlin, “Wireless secrecy
regions with friendly jamming,” IEEE Transactions on Information
Forensics and Security, vol. 6, no. 2, pp. 256–266, Jun. 2011.
[11] G. Zheng, L.-C. Choo, and K.-K. Wong, “Optimal cooperative jamming
to enhance physical layer security using relays,” IEEE Transactions on
Signal Processing, vol. 59, no. 3, pp. 1317–1322, Mar. 2011.
[12] S. Luo, J. Li, and A. Petropulu, “Outage constrained secrecy rate
maximization using cooperative jamming,” in Proc. of IEEE Statistical
Signal Processing Workshop (SSP), 2012 IEEE, Aug. 2012, pp. 389–392.
[13] Z. Han, N. Marina, M. Debbah, and A. Hjorungnes, “Physical
layer security game: Interaction between source, eavesdropper, and
friendly jammer,” EURASIP Journal on Wireless Communications and
Networking, vol. 2009, no. 1, 2009.
[14] Pinto, P.C. and Barros, J. and Win, M.Z., “Wireless physical-layer
security: The case of colluding eavesdroppers,” in Proc. of IEEE
International Symposium on Information Theory (ISIT), Seoul, Korea,
2009, pp. 2442–2446, Jun.28-Jul.3 2009.
[15] J. A. C. Bingham, “Multicarrier modulation for data transmission: an
idea whose time has come,” IEEE Communications Magazine, vol. 28,
no. 5, pp. 5–14, May 1990.
[16] W. Y. Zou and W. Yiyan, “COFDM: an overview,” IEEE Transactions
on Broadcasting, vol. 41, no. 1, pp. 1–8, Mar. 1995.
[17] Ramjee Prasad, OFDM for wireless communication system. Bosto,
London: Artech House, Inc., 2004.
[18] N. Romero-Zurita, M. Ghogho and D. McLernon1, “Physical Layer
Security of MIMO Frequency Selective Channels by Beamforming
and Noise Generation,” 19th European Signal Processing Conference,
Barcelona, Spain, 2011.
[19] F. Renna, N. Laurenti and Poor, H.V., “Physical-Layer Secrecy for
OFDM Transmissions Over Fading Channels,” IEEE Transactions on
Information Forensics and Security, vol. 7, no. 4, pp. 1354–1367, Aug.
2012.
[20] Z. Li, R. Yates, and W. Trappe, “Secrecy capacity of independent parallel
channels,” 44th Annual Allerton Conference on Communication, Control,
and Computing. Monticello, Illinois, Sept.27-29 2006.
[21] S. Shafiee and S. Ulukus, “Correlated jamming in multiple access
channel,” in Proc. Conference in Information Science and Systems
(CISS), The Johns Hopkins University, Mar.16-18. 2005.
[22] L. Lai and H. E. Gamal, “The relay-eavesdropper channel: cooperation
for secrecy,” IEEE Transaction on Information Theory, vol. 54, no.9,
pp. 4005–4019, 2008.
[23] X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, “The Gaussian wiretap
channel with a helping interferer,” in Proc. of IEEE International
Symposium on Information Theory (ISIT), Toronto, Canada, pp.
389–393, Jul. 2008.
[24] M. Ara, H. Reboredo, F. Renna, and M. R. D. Rodrigues, “Power
allocation strategies for OFDM Gaussian wiretap channels with a
friendly jammer,” in Proc. of IEEE International Conference on
Communications (ICC), Budapest, Hungrary, Jun. 2-5 2013.
[25] G. L. Stber, Principles of Mobile Communications. 2nd. ed. Kluwer
Academic Publisher, 2002.
[26] Andrea Goldsmith, Wireless Communications. Cambridge University
Press, 2005.