PHYSICAL-LAYER SECURITY VIA DISTRIBUTED BEAMFORMING IN THE PRESENCE OF ADVERSARIES WITH UNKNOWN LOCATIONS

被引:5
|
作者
Savas, Yagiz [1 ]
Hashemi, Abolfazl [1 ]
Vinod, Abraham P. [2 ]
Sadler, Brian M. [3 ]
Topcu, Ufuk [1 ]
机构
[1] Univ Texas Austin, Austin, TX 78712 USA
[2] Mitsubishi Elect Res Labs, Cambridge, MA USA
[3] US Army Res Lab, Adelphi, MD USA
关键词
distributed beamforming; pyhsical-layer security; adversarial environment; WIRELESS NETWORKS; OPTIMIZATION;
D O I
10.1109/ICASSP39728.2021.9414861
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
We study the problem of securely communicating a sequence of information bits with a client in the presence of multiple adversaries at unknown locations in the environment. We assume that the client and the adversaries are located in the far-field region, and all possible directions for each adversary can be expressed as a continuous interval of directions. In such a setting, we develop a periodic transmission strategy, i.e., a sequence of joint beamforming gain and artificial noise pairs, that prevents the adversaries from decreasing their uncertainty on the information sequence by eavesdropping on the transmission. We formulate a series of nonconvex semi-infinite optimization problems to synthesize the transmission strategy. We show that the semi-definite program (SDP) relaxations of these nonconvex problems are exact under an efficiently verifiable sufficient condition. We approximate the SDP relaxations, which are subject to infinitely many constraints, by randomly sampling a finite subset of the constraints and establish the probability with which optimal solutions to the obtained finite SDPs and the semi-infinite SDPs coincide. We demonstrate with numerical simulations that the proposed periodic strategy can ensure the security of communication in scenarios in which all stationary strategies fail to guarantee security.
引用
收藏
页码:4685 / 4689
页数:5
相关论文
共 50 条
  • [1] Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks
    Wang, Hui-Ming
    Yin, Qinye
    Xia, Xiang-Gen
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (07) : 3532 - 3545
  • [2] Distributed Beamforming in the Presence of Adversaries
    Kong, Justin
    Dagefu, Fikadu T.
    Sadler, Brian M.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (09) : 9682 - 9696
  • [3] Characterizing Physical-Layer Secrecy with Unknown Eavesdropper Locations and Channels
    Ghogho, Mounir
    Swami, Ananthram
    2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2011, : 3432 - 3435
  • [4] Cooperative Beamforming With Artificial Noise Injection for Physical-Layer Security
    Jang, Geunyeong
    Kim, Donghyeon
    Lee, In-Ho
    Jung, Haejoon
    IEEE ACCESS, 2023, 11 : 22553 - 22573
  • [5] Physical-Layer Security for Multiantenna Satellite-UWOC Systems in the Presence of Spatially Random Locations
    Li, Shanghui
    Zhang, Jiliang
    Li, Jiang
    Xie, Yiyuan
    Pan, Gaofeng
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (16): : 27480 - 27493
  • [6] Beamforming and jamming for physical-layer security with different trust degrees
    Chan Dai Truyen Thai
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2021, 128
  • [7] Transmit beamforming with Imperfect CSIT in Spectrum Leasing for Physical-Layer Security
    Jeong, Seongah
    Lee, Keonkook
    Kang, Joonhyuk
    Baek, Youngseok
    Koo, Bontae
    2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 874 - 878
  • [8] On Transmit Beamforming for Physical-Layer Multicasting
    Li, Jiangyuan
    Petropulu, Athina P.
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [9] Transmit beamforming for physical-layer multicasting
    Sidiropoulos, Nicholas D.
    Davidson, Timothy N.
    Luo, Zhi-Quan
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (06) : 2239 - 2251
  • [10] Pseudo-Random Beamforming with Beam Selection for Improving Physical-Layer Security
    Son, Woong
    Jung, Bang Chul
    Kim, Choul-Young
    Kim, Jong Min
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 382 - 384