Sina Rezaei Aghdam under supervision of : Prof. Tolga M. Duman - - PowerPoint PPT Presentation

sina rezaei aghdam
SMART_READER_LITE
LIVE PREVIEW

Sina Rezaei Aghdam under supervision of : Prof. Tolga M. Duman - - PowerPoint PPT Presentation

Sina Rezaei Aghdam under supervision of : Prof. Tolga M. Duman Dept. of Electrical and Electronic Engineering, Bilkent University, Ankara, Turkey. Physical Layer Security Securing the communications at the physical layer; an alternative


slide-1
SLIDE 1

Sina Rezaei Aghdam

under supervision of : Prof. Tolga M. Duman

  • Dept. of Electrical and Electronic Engineering, Bilkent University,

Ankara, Turkey.

slide-2
SLIDE 2
  • Securing the communications at the physical layer;

an alternative to the conventional higher network-layer solutions for security

  • Basic principle:

to exploit the randomness of communications channels to allow a transmitter to deliver its message to an intended receiver while guaranteeing that a third party cannot maliciously infer any information about the transmitted message.

  • The attempt is to realize a transmission in such a way

so as to maximize the transmission rate over the main channel while keeping the eavesdropper ignorant about the message.

  • Secrecy Capacity:

The rate at which transmitter can use the main link so as to deliver its message to the legitimate receiver in a way that the eavesdropper cannot successfully decode the same information.

Physical Layer Security

2

Alice Eve

 

( )

max ( ; | ) ( ; | )

X

s B E P x

C I x y H I x z H  

1 2 M

x

B

H

E

H

Bob

1 2 Nt 1 2 Ne

y z

Input distribution Mutual information

  • ver Bob’s channel

Mutual information

  • ver Eve’s channel
slide-3
SLIDE 3

 A recently proposed transmission scheme for low-complexity implementation

  • f

MIMO wireless systems  Takes advantage of the location-specific property of the wireless channel  Channel coefficients are playing the role

  • f the “modulation unit“

 Each data block is mapped to a symbol which is then transmitted from the j ’th antenna.  With the knowledge of the channel state information (CSI), receiver can detect the activated channel and accordingly detect the transmitted data.  Spatial modulation (SM) is a more general form of SSK in which a conventional amplitude or phase modulation symbol is spatially modulated (similar to the SSK)

…01, 00, 11, 10

Space Shift Keying (SSK)

3

00 10 11 01

…01001110

j

x

m 

10

ˆ m 

slide-4
SLIDE 4
  • To obtain an achievable secrecy rate for SSK as

we first obtain the mutual information for SSK as: Precoding With an assumption that the perfect CSI of the main channel is available at the transmitter, an appropriate precoding can be applied so as to maximize

Physical Layer Security for SSK

4

 

1 ( )

( ; | ) ( ; | ) C

X

s B E S P x M

R I x y H I x z H

  

2 2 2 2 1 2 2 2 2 1 1

exp( / ) 1 ( ; | , ,..., ) exp( / ) log exp( / )

M m n M m n M m n y m n m

M y h I x y h h h y h dy M y h    

  

       

 

m

y h n  

| 1

( , | ,..., )

XY H M

P x y h h

| 1

( | ,..., )

X H M

P x h h

| 1

( | ,..., )

Y H m

P y h h

| 1

( | , ,..., )

Y XH M

P y x h h

2

( , )

m n

CN h  

2

1 ( , )

m n

CN h M    1M 

| 1 1

1 ( | , ,..., )

M Y XH m m

P y x h h M

1 2 1 2

H ( , ,..., ) H ( , ,..., )

b b b e e e

B M E M

h h h h h h       

2 2 1 2 2 ( , , ) 2

( ; | , ,..., ) log log(1 exp( )

ij M x y H j i n

d n n I x y h h h M E 

             

ij i j

d h h  

where

ij

d

  • Transmission rate is maximized over the main channel.
  • No gain from the eavesdropper’s perspective.
slide-5
SLIDE 5

Numerical Results

5

  • 1.5
  • 1
  • 0.5

0.5 1 1.5

  • 1.5
  • 1
  • 0.5

0.5 1 1.5

Quadrature In-Phase

Scatter plot

Precoded SSK Symbols Non-precoded SSK Symbols For A Given Channel Coefficients

0.2476 - 1.2376i

  • 0.1853 - 0.6924i

0.0162 - 0.5879i

  • 0.1853 - 0.6924i

Legitimate receiver’s SNR is varied while the eavesdropper’s SNR is fixed to 0 dB.

An Example for Precoding

5 10 15 20 25 30 0.2 0.4 0.6 0.8 1 1.2 1.4 SNR (dB) Secrecy Rate non-precoded, Nt = 2 precoded, Nt = 2 non-precoded, Nt = 4 precoded, Nt = 4 5 10 15 20 25 30 0.2 0.4 0.6 0.8 1 1.2 1.4 SNR (dB) Secrecy Rate (bits/s/Hz) non-precoded, Nr = 4 precoded, Nr = 4 non-precoded, Nr = 1 precoded, Nr = 1

Legitimate receiver’s SNR is varied while the eavesdropper’s SNR is fixed to 0, 12 and 21 dB.

10 20 30 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 SNR (dB) Secrecy Rate (bit/s/Hz)

a) SNR @ Eavesdropper = 0 dB

10 20 30 0.01 0.02 0.03 0.04 0.05 0.06 0.07 SNR (dB)

b) SNR @ Eavesdropper = 12 dB

10 20 30 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 x 10

  • 3

SNR (dB)

c) SNR @ Eve = 21 dB

MIMO, Nt = 4 SM, Nt = 4 SIMO, Nt = 1 MIMO, Nt = 4 SM, Nt = 4 SIMO, Nt = 1 MIMO, Nt = 4 SM, Nt = 4 SIMO, Nt = 1

SM is capable of achieving a better secrecy rate with respect to a single-antenna transmission. However, there is a gap between the secrecy rates of SM and a general MIMO system in which all transmit antennas are activated in each time instant. Effect of number of receive antennas

  • n the achievable secrecy rates

Effect of number of transmit antennas

  • n the achievable secrecy rates
slide-6
SLIDE 6

Conclusion

6

  • Derivation and evaluation of the secrecy capacity is one of the fundamental problems for

physical layer security using which we can quantify the maximum rate at which a transmitter can send a message to an intended receiver without being decoded by an eavesdropper.

  • An achievable secrecy rate, i.e. a lower bound on the secrecy capacity, was derived and

evaluated for SSK which is a recently proposed wireless transmission scheme for low-complexity implementation of MIMO wireless system.

  • A precoding scheme which maximizes the minimum Euclidean distance was proposed and the

performance improvement achieved by that was evaluated for different number of transmit and receive antennas.

  • The framework proposed in this poster can serve as a basis for future studies on SSK in

context of secure wireless communications.

References

[1] S. R. Aghdam, T. M. Duman, M. Di Renzo, “On Secrecy Rate Analysis of Spatial Modulation and Space Shift Keying,” submitted to IEEE BlackSeaCom 2015. [2] S. R. Aghdam, T. M. Duman, “Physical Layer Security in MIMO Wiretap Channels: A Survey

  • n Secrecy with Imperfect Channel State Information,” submitted to IEEE Commun. Mag.

[3] M. Di Renzo, H. Haas, and P. M. Grant, Spatial modulation for multiple antenna wireless systems – A survey, IEEE Commun. Mag., vol. 49, no. 12, pp. 182-191, Dec. 2011.