PHYSICAL-LAYER SECURITY VIA DISTRIBUTED BEAMFORMING IN THE PRESENCE OF ADVERSARIES WITH UNKNOWN LOCATIONS

被引:5
|
作者
Savas, Yagiz [1 ]
Hashemi, Abolfazl [1 ]
Vinod, Abraham P. [2 ]
Sadler, Brian M. [3 ]
Topcu, Ufuk [1 ]
机构
[1] Univ Texas Austin, Austin, TX 78712 USA
[2] Mitsubishi Elect Res Labs, Cambridge, MA USA
[3] US Army Res Lab, Adelphi, MD USA
关键词
distributed beamforming; pyhsical-layer security; adversarial environment; WIRELESS NETWORKS; OPTIMIZATION;
D O I
10.1109/ICASSP39728.2021.9414861
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
We study the problem of securely communicating a sequence of information bits with a client in the presence of multiple adversaries at unknown locations in the environment. We assume that the client and the adversaries are located in the far-field region, and all possible directions for each adversary can be expressed as a continuous interval of directions. In such a setting, we develop a periodic transmission strategy, i.e., a sequence of joint beamforming gain and artificial noise pairs, that prevents the adversaries from decreasing their uncertainty on the information sequence by eavesdropping on the transmission. We formulate a series of nonconvex semi-infinite optimization problems to synthesize the transmission strategy. We show that the semi-definite program (SDP) relaxations of these nonconvex problems are exact under an efficiently verifiable sufficient condition. We approximate the SDP relaxations, which are subject to infinitely many constraints, by randomly sampling a finite subset of the constraints and establish the probability with which optimal solutions to the obtained finite SDPs and the semi-infinite SDPs coincide. We demonstrate with numerical simulations that the proposed periodic strategy can ensure the security of communication in scenarios in which all stationary strategies fail to guarantee security.
引用
收藏
页码:4685 / 4689
页数:5
相关论文
共 50 条
  • [21] A Rateless Approach to Physical-Layer Security
    Johnson, Matthew H.
    Harrison, Willie K.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [22] Special Issue on Physical-Layer Security
    Bloch, Matthieu
    Debbah, Merouane
    Liang, Yingbin
    Oohama, Yasutada
    Thangaraj, Andrew
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2012, 14 (04) : 349 - 351
  • [23] Multilevel Coding for Physical-Layer Security
    Pfeiffer, Johannes
    Fischer, Robert F. H.
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (03) : 1999 - 2009
  • [24] Stopping Sets for Physical-Layer Security
    Harrison, Willie K.
    Almeida, Joao
    Klinc, Demijan
    McLaughlin, Steven W.
    Barros, Joao
    2010 IEEE INFORMATION THEORY WORKSHOP (ITW), 2010,
  • [25] Physical Layer Security Beamforming Design via Deep Unfolding
    Bilbao, Inigo
    Nguyen, Nhan T.
    Osorio, Diana P. Moya
    Tapio, Visa
    Juntti, Markku
    Iradier, Eneko
    Montalban, Jon
    Angueira, Pablo
    2024 IEEE INTERNATIONAL MEDITERRANEAN CONFERENCE ON COMMUNICATIONS AND NETWORKING, MEDITCOM 2024, 2024, : 251 - 256
  • [26] Techniques for Enhanced Physical-Layer Security
    Pinto, Pedro C.
    Barros, Joao
    Win, Moe Z.
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [27] Physical-Layer Security Analysis over M-Distributed Fading Channels
    Lin, Sheng-Hong
    Lu, Rong-Rong
    Fu, Xian-Tao
    Tong, An-Ling
    Wang, Jin-Yuan
    ENTROPY, 2019, 21 (10)
  • [28] A Pseudo-Random Beamforming Technique for Improving Physical-Layer Security of MIMO Cellular Networks
    Son, Woong
    Jang, Han Seung
    Jung, Bang Chul
    ENTROPY, 2019, 21 (11)
  • [29] Physical-Layer Security for RIS-V2V Networks With Different Eavesdropper Locations
    Chen, Linfei
    Zhu, Jiaxing
    Yang, Yang
    Boichenko, Sergii
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (22): : 35791 - 35801
  • [30] Physical-Layer Security for Proximal Legitimate User and Eavesdropper: A Frequency Diverse Array Beamforming Approach
    Lin, Jingran
    Li, Qiang
    Yang, Jintai
    Shao, Huaizong
    Wang, Wen-Qin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) : 671 - 684