Escolar Documentos
Profissional Documentos
Cultura Documentos
Transmitter CSI
T. Allen, Senior Member, IEEE, J. Cheng, Senior Member, IEEE, N. Al-Dhahir, Fellow, IEEE
AbstractA new technique is presented for securing a spacetime block code in the presence of an eavesdropper without
channel state information at the transmitter. Assuming channel
reciprocity between the transmitter and the intended receiver, we
use the receive signal strength indicator to randomly rotate the
information symbols at each transmit antenna without increasing
the transmit signals peak-to-average ratio. It is shown that the
proposed scheme guarantees full diversity to an intended
recipient while reducing the diversity order of an eavesdropper
to zero even in the presence of perfect channel state information.
I.
INTRODUCTION
Ensuring the confidentiality of communications is
fundamental to securing any network. This requirement
becomes particularly important for wireless networks where
eavesdropping is facilitated by the broadcast nature of the
wireless medium. Traditionally, security is viewed as an
independent feature addressed above the physical layer and
widely-used cryptographic protocols are typically designed
and implemented assuming an error-free physical layer.
Recently, there has been increased interest in using the
attributes of a wireless channel for security. A secret
communication technique using channel state information
(CSI) as secret key was described in [1] and generalized for
the mult-antenna scenario in [2]. In [3] secrecy was achieved
by adding artificially-generated noise to the information signal
in the null space of the intended receivers channel matrix to
degrade the eavesdroppers channel since its null space (if
any) will be different. The security provided by transmit
beamforming was shown in [4] to be highly sensitive to
inaccurate transmit CSI. In [5], a channel-dependent precoder
was used but it does not guarantee a zero diversity order for
the eavesdropper. All of the above approaches assume the
availability of transmit CSI which can be unrealistic due to the
limited resources on wireless devices. Finally, the cross-layer
approach of [6] expands the signal constellation and requires a
secret key from a higher-layer protocol.
In this letter, we propose a new technique to secure
orthogonal space-time block codes (STBC) using a shared key
obtained from RSSI and without requiring transmit CSI or
increasing the transmit signals peak-to-average ratio (PAR).
The proposed method preserves the linear detection
complexity of the orthogonal STBC while guaranteeing full
diversity order for the intended recipient and zero diversity
order for the eavesdropper.
II.
Alice
-S2*
S1
S2
S1
Bob
q1
-S2*ejq1 S1ejq1
Alamouti
STBC
Transmitter
(1)
ML
Receiver
S2 S1
Eve
S1*
S2
q2
jq2
jq2
S1*e S2 e
ML
Receiver
S2 S1
A. Encoding
The transmission is initiated by the exchange of a secret
key based on RSSI as follows: Alice and Bob, each
transmitting a known signal to each other. Alice initiates the
process and Bob responds. This two-way probing is performed
over two consecutive time slots (i.e. a duration of 2 symbol
periods which is well within the channel coherence time).
Ideally, Alice and Bob both should measure the RSSI at the
same time. However, they cannot both transmit and receive
the signals simultaneously. Thus, Alice and Bob must measure
the radio channel in one direction at a time. However, as long
as the time between two directional channel measurements is
much smaller than the channel coherence time, they will have
same RSSI estimates. A secret key is exchanged when the
communication session between Alice and Bob is established
and remains valid until the session is terminated. Once seeded,
the random generation of the parameters !,! and !,! is
known to Alice and Bob but unknown to Eve since her
channel experiences independent fading from Bobs channel.
The rotation angles !,! and !,! are chosen such that for
any choice of s!,! and s!,! from the original signal
constellation, the resulting transmitted signals are also from
the same constellation. For example, for L-PSK constellation
!"!!
symbols given by exp ! , l = 0, , 1 , we select
!
!,! = 2l/ where l = 0, , 1. In this case, the resulting
transmitted signals are also L-PSK and, therefore, the PAR is
not increased. Another benefit to the above transmission
scheme is that Alice is not required to know Bobs CSI,
eliminating the need for CSI feedback to the transmitter.
B. Decoding
The two received signal samples for the kth STBC
codeword are given by (assuming a single receive antenna)
,
, ,
=
,
,
,
, ,
,
,
(2)
(4)
r!,!
h! e!!!,!
=
r!,!
h! e!!!!,!
e!!!,!
h!
h! e!!!!,!
s!,!
s!,!
r! = s! + n!
n!,!
+ n
!,!
(3)
s!,!
e!!!,!
s!,!
e!!!,!
s!,! e!!!,!
s!,!
e!!!,!
s!,! e!!!,!
s!,!
e!!!,!
s!,!
e!!!,!
s!,!
e!!!,!
(7)
s!,! e!!!,!
!!
!,!
s!,! s!,! e
Bobs
Diversity
4
Eves
Diversity
3
Codewords w/
Minimum Rank
C! = 1, 1,1, , 0, 0, 0
C! = 1, 1, 1, 0, 0, 0, 0
C! = 1, 1,1, , , 0, 0
C! = 1, 1, 1, 0, 0, 0, 0
C! = 1, 1,1, , , , 0
C! = 1, 1, 1, 0, 0, 0, 0
C! = 1, 1,1, , , ,
C! = 1, 1, 1, 0, 0, 0, 0
REFERENCES
H. Koorapaty, A. A. Hassan, S. Chennakeshu Secure information
transmission for mobile radio, IEEE Trans. Wireless Communications,
pp. 52-55, July 2003
[2] A. E. Hero, Secure space-time communication, IEEE Trans.
Information Theory, pp. 3235-3249, Dec. 2003.
[3] R. Negi, S. Goel, Secret communication using artificial noise, IEEE
Vehicular Technology Conference, Fall 2005. vol. 3, pp. 1906 1910.
[4] A. Mukherjee and A. Swindlehurst, Robust beamforming for security
in MIMO wiretap channels with imperfect CSI, IEEE Trans. Signal
Processing, vol. 59, pp. 351 361, Jan. 2011.
[5] Fakoorian, S.A.A.; Jafarkhani, Hamid; Swindlehurst, A.L., "Secure
space-time block coding via artificial noise alignment," Signals, Systems
and Computers (ASILOMAR), Conference Record of the Forty Fifth
Asilomar Conference on , pp.651-655, Nov. 2011
[6] H. Wen, G. Gong and P.-H. Ho, ``MIMO cross-layer secure
communication architecture based on STBC,'' in Proc. of IEEE
Globecom conference, pp.1-5, Miami, FL, USA, Dec. 2010
[7] S. Alamouti, A simple transmitter diversity scheme for wireless
communications, IEEE JSAC, vol. 16, pp. 1451 1458, Oct. 1998.
[8] V. Tarokh, H. Jafarkhani, and A. R. Calderbank, Space-time block
codes from orthogonal designs, IEEE Trans. Information Theory, vol.
45, pp. 14561467, July 1999.
[9] S. Shahbazpanahi, A. Gershman, and A. Manton, Closed-form blind
MIMO channel estimation for orthogonal spacetime block codes,
IEEE Trans. Signal Procesing, vol. 53, pp 4506-4517, Dec. 2005
[10] S. Diggavi, N. Al-Dhahir, A. Stamoulis, A.R. Calderbank,Great
Expectations : The Value of Spatial Diversity in Wireless Networks,
Proceedings of the IEEE journal, vol. 92, pp 219-270, Feb. 2004
[1]