吉林大学学报(工学版) ›› 2016, Vol. 46 ›› Issue (3): 955-963.doi: 10.13229/j.cnki.jdxbgxb201603042

• Orginal Article • Previous Articles     Next Articles

Secure transmission protocol for relay MIMO wiretap channel based on interference alignment

LEI Wei-jia, ZHU Mao-juan, XIE Xian-zhong   

  1. Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
  • Received:2014-11-23 Online:2016-06-20 Published:2016-06-20

Abstract: This paper considers the secure transmission for MIMO wireless relay network. Each node is equipped with multiple antennas, and can acquire the global channel state information. The scheme combines the interference alignment and collaboration interference. Using precoding scheme the interference signal sent by jammer is aligned with the artificial noise sent by transmitter at the receiver, and it is independent of confidential signal subspace; then the receiver can eliminate the interference signal and artificial noise. The eavesdropper can also receive the transmitted signal, but it can not eliminate the interference signal and artificial noise as they are in the same subspace with the confidential signal. So its eavesdropping capacity is greatly suppressed. The signal transmission and precoding schemes for the transmitter, relay and jammer are designed, and the interference cancellation scheme for receiver is given. The secrecy performance is analyzed from secrecy rate and secrecy outage probability. Simulation results show that the proposed scheme can improve the secrecy rate and decrease the outrage probability compared with other systems.

Key words: communication technology, secure transmission, interference alignment, jammer-assisted, secrecy rate

CLC Number: 

  • TN925
[1] Cadambe V R, Jafer S A. Interference alignment and degrees of freedom of the K-user interference channel[J]. IEEE Transactions on Information Theory, 2008, 54(8): 3425-3441.
[2] 张金波, 袁超伟, 王秋才, 等. 一种多小区多用户THP的干扰对齐方案[J]. 吉林大学学报:工学版, 2014, 44(2): 531-537.
Zhang Jin-bo, Yuan Chao-wei, Wang Qiu-cai, et al. Interference alignment scheme for multicell multiuser system through THP[J]. Journal of Jilin University(Engineering and Technology Edition), 2014, 44(2): 531-537.
[3] Koyluoglu O O, El Gamal H, Lai Li-feng , et al. Interference alignment for secrecy[J]. IEEE Transactions on Information Theory, 2011, 57(6): 3323-3332.
[4] 朱茂娟, 雷维嘉, 谢显中, 等. 基于实干扰对齐技术的两用户中继辅助信道的安全自由度分析[J]. 重庆邮电大学学报:自然科学版, 2014, 26(4): 445-450.
Zhu Mao-juan, Lei Wei-jia, Xie Xian-zhong, et al. Secure degrees of freedom of two-user relay-assisted channel based on real interference alignment[J]. Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition), 2014,26(4): 445-450.
[5] Sasaki S, Shimizu T, Iwai H, et al. Secure communications using interference alignment in MIMO interference channels[C]∥2012 International Symposium on Antennas and Propagation (ISAP). Nagoys, 2012: 762-765.
[6] Goel S, Negi R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180-2189.
[7] Lai S H, Lin P H, Lin S C, et al. On optimal artificial-noise assisted secure beamforming for the multiple-input multiple-output fading eavesdropper channel[C]∥2012 IEEE Wireless Communications and Networking Conference (WCNC). Shanghai, China, 2012: 513-517.
[8] Lin P H, Lai S H, Lin S C,et al. On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1728-1740.
[9] Xie Ke, Chen Wen, Wei Li-li. Increasing security degree of freedom in multiuser and multieve systems[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3): 440-449.
[10] Bassily R, Ulukus S. Ergodic secret alignment[J]. IEEE Transactions on Information Theory, 2012, 58(3): 1594-1611.
[11] Lee J H,Chae S H, Wan C. Opportunistic jammer selection for secure degrees of freedom[C]∥2012 IEEE Global Communications Conference (GLOBECOM). Anaheim, CA, 2012: 4862-4867.
[12] Fakoorian S A A, Swindlehurst A A. Solutions for the MIMO gaussian wiretap channel with a cooperative jammer[J]. IEEE Transactions on Signal Processing, 2011, 59(10): 5013-5022.
[13] Sun C C, Chen Z, An S W. Interference alignment for the MIMO wiretap channel with a hostile jammer[C]∥2012 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). Shanghai, China, 2012: 1-5.
[14] Lin M, Ge J, Yang Y, et al. Joint cooperative beamforming and artificial noise design for secrecy sum rate maximization in two-way AF relay networks[J]. IEEE Communications Letters, 2014, 18(2): 380-383.
[15] Wang H, Liu F, Xia X. Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(8): 1240-1250.
[16] Ding Z, Peng M, Chen H H. A general relaying transmission protocol for MIMO secrecy communications[J]. IEEE Transactions on Communications, 2012, 60(11): 3461-3471.
[17] 雷维嘉,左莉杰,谢显中.部分信道状态信息下抗窃听协作中继传输方案[J].吉林大学学报:工学版,2015,45(5):1658-1664.
Lei Wei-jia,Zuo Li-jie,Xie Xian-zhong.Eavesdropping-resistant cooperative relay transmission scheme with partial channel state information[J].Journal of Jilin University(Engineering and Technology Edition),2015,45(5):1658-1664.
[1] ZHOU Yan-guo,ZHANG Hai-lin,CHEN Rui-rui,ZHOU Tao. Two-level game approach based resource allocation scheme in cooperative networks [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1879-1886.
[2] SUN Xiao-ying, HU Ze-zheng, YANG Jin-peng. Assessment method of electromagnetic pulse sensitivity of vehicle engine system based on hierarchical Bayesian networks [J]. 吉林大学学报(工学版), 2018, 48(4): 1254-1264.
[3] DONG Ying, CUI Meng-yao, WU Hao, WANG Yu-hou. Clustering wireless rechargeable sensor networks charging schedule based on energy prediction [J]. 吉林大学学报(工学版), 2018, 48(4): 1265-1273.
[4] MOU Zong-lei, SONG Ping, ZHAI Ya-yu, CHEN Xiao-xiao. High accuracy measurement method for synchronous triggering pulse transmission delay in distributed test system [J]. 吉林大学学报(工学版), 2018, 48(4): 1274-1281.
[5] DING Ning, CHANG Yu-chun, ZHAO Jian-bo, WANG Chao, YANG Xiao-tian. High-speed CMOS image sensor data acquisition system based on USB 3.0 [J]. 吉林大学学报(工学版), 2018, 48(4): 1298-1304.
[6] CHEN Rui-rui, ZHANG Hai-lin. Performance analysis of 3D millimeter wave communications [J]. 吉林大学学报(工学版), 2018, 48(2): 605-609.
[7] ZHANG Chao-yi, LI Jin-hai, YAN Yue-peng. Improved Tong detection algorithm with double thresholds [J]. 吉林大学学报(工学版), 2018, 48(2): 610-617.
[8] GUAN Ji-shi, SHI Yao-wu, QIU Jian-wen, SHAN Ze-biao, SHI Hong-wei. New algorithm to estimate characteristic exponent of α-stable distribution [J]. 吉林大学学报(工学版), 2018, 48(2): 618-624.
[9] LI Wei, LI Ya-jie. Satisfactory integrated design between failure accommodation and communication for non-uniform transmission networked control system under discrete event-triggered communication scheme [J]. 吉林大学学报(工学版), 2018, 48(1): 245-258.
[10] SUN Xiao-ying, WANG Zhen, YANG Jin-peng, HU Ze-zheng, CHEN Jian. Electromagnetic susceptibility assessment of electronic throttle based on Bayesian network [J]. 吉林大学学报(工学版), 2018, 48(1): 281-289.
[11] WU Wei, WANG Shi-gang, ZHAO Yan, WEI Jian, ZHONG Cheng. Hexagonal elemental image array generation [J]. 吉林大学学报(工学版), 2018, 48(1): 290-294.
[12] YUAN Jian-guo, ZHANG Xi-ruo, QIU Piao-yu, WANG Yong, PANG Yu, LIN Jin-zhao. Non-iterative phase noise suppression algorithm utilizing cyclic prefix in OFDM systems [J]. 吉林大学学报(工学版), 2018, 48(1): 295-300.
[13] WANG Jin-peng, CAO Fan, HE Xiao-yang, ZOU Nian-yu. Multi carrier system joint receiving method based on MAI and ICI [J]. 吉林大学学报(工学版), 2018, 48(1): 301-305.
[14] SHI Wen-xiao, SUN Hao-ran, WANG Shao-bo. Joint channel allocation and routing algorithm in wireless mesh network [J]. 吉林大学学报(工学版), 2017, 47(6): 1918-1925.
[15] JIANG Lai-wei, SHA Xue-jun, WU Xuan-li, ZHANG Nai-tong. Novel joint user association and resource allocation method in LTE-A HetNets [J]. 吉林大学学报(工学版), 2017, 47(6): 1926-1932.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LIU Song-shan, WANG Qing-nian, WANG Wei-hua, LIN Xin. Influence of inertial mass on damping and amplitude-frequency characteristic of regenerative suspension[J]. 吉林大学学报(工学版), 2013, 43(03): 557 -563 .
[2] CHU Liang, WANG Yan-bo, QI Fu-wei, ZHANG Yong-sheng. Control method of inlet valves for brake pressure fine regulation[J]. 吉林大学学报(工学版), 2013, 43(03): 564 -570 .
[3] LI Jing, WANG Zi-han, YU Chun-xian, HAN Zuo-yue, SUN Bo-hua. Design of control system to follow vehicle state with HIL test beach[J]. 吉林大学学报(工学版), 2013, 43(03): 577 -583 .
[4] HU Xing-jun, LI Teng-fei, WANG Jing-yu, YANG Bo, GUO Peng, LIAO Lei. Numerical simulation of the influence of rear-end panels on the wake flow field of a heavy-duty truck[J]. 吉林大学学报(工学版), 2013, 43(03): 595 -601 .
[5] WANG Tong-jian, CHEN Jin-shi, ZHAO Feng, ZHAO Qing-bo, LIU Xin-hui, YUAN Hua-shan. Mechanical-hydraulic co-simulation and experiment of full hydraulic steering systems[J]. 吉林大学学报(工学版), 2013, 43(03): 607 -612 .
[6] ZHANG Chun-qin, JIANG Gui-yan, WU Zheng-yan. Factors influencing motor vehicle travel departure time choice behavior[J]. 吉林大学学报(工学版), 2013, 43(03): 626 -632 .
[7] MA Wan-jing, XIE Han-zhou. Integrated control of main-signal and pre-signal on approach of intersection with double stop line[J]. 吉林大学学报(工学版), 2013, 43(03): 633 -639 .
[8] YU De-xin, TONG Qian, YANG Zhao-sheng, GAO Peng. Forecast model of emergency traffic evacuation time under major disaster[J]. 吉林大学学报(工学版), 2013, 43(03): 654 -658 .
[9] XIAO Yun, LEI Jun-qing, ZHANG Kun, LI Zhong-san. Fatigue stiffness degradation of prestressed concrete beam under multilevel amplitude cycle loading[J]. 吉林大学学报(工学版), 2013, 43(03): 665 -670 .
[10] XIAO Rui, DENG Zong-cai, LAN Ming-zhang, SHEN Chen-liang. Experiment research on proportions of reactive powder concrete without silica fume[J]. 吉林大学学报(工学版), 2013, 43(03): 671 -676 .