Studies Of Beamforming Technique In Wireless Physical Layer Security  Posted on:20140331  Degree:Doctor  Type:Dissertation  Country:China  Candidate:Y Q Tang  Full Text:PDF  GTID:1108330479479567  Subject:Information and Communication Engineering  Abstract/Summary:  PDF Full Text Request  Physical layer security exploits the characteristic of the wireless channel to achieve secure communications. Unlike the typical techniques for secure communications, the physical layer security does not depend on the limited ability of the eavesdropper. Along with the rapid development of multiantenna systems, the beamformingbased physical layer security can efficiently exploit the spatial degree of freedom to enlarge the difference between the legitimate channel and the eavesdropperâ€™s channel. Thus, the physical layer security can achieve the reliability and the security for the wireless communications, and has been the research hotspot in the wireless communications. The lowcomplexity beamforming design under different criteria, the robust beamforming design for different channel uncertainty models, the secrecy performance analysis on the limited feedback beamforming and so on, these studies have been the key and difficult problems in the physical layer security. This thesis studies these problems under different cases for the channel state information(CSI) of the legitimate and the eavesdropperâ€™s channels.Firstly, for the perfect CSI case, this thesis studies the secrecy sum rate maximization problem and the signaltointerferenceplusnoise ratio(SINR) balancing problem in the multiantenna Gaussian multireceiver wiretap channel(MGMRWC) model, where the secrecy capacity region is difficult to obtain and the interuser interference(IUI) causes the crosstalk problem. The beamforming algorithms based on the thinkings of zero forcing(ZF) and signaltoleakageandnoise ratio(SLNR) are proposed. To demonstrate the validity of the SLNR metric, the secrecy performance is analyzed for different number of antennas in the multipleinput singleoutput multiantenna eavesdropper(MISOME) system. For the secrecy sum rate maximization problem in the MGMRWC model, three novel algorithms are presented: the first kind ZF(ZFI), the second kind ZF(ZFII) and the enhanced SLNR(ESLNR). Different with these two ZF algorithms, the ESLNR algorithm jointly considers the IUI and the leakage at the eavesdropper. And thus, the ESLNR algorithm does not rely on the number of antenna, and outperforms the ZF algorithms with lower complexity. For the SINR balancing problem in the MGMRWC model, the ZFSINR algorithm and the modified SLNR(MSLNR) algorithm are proposed for the purpose of the tradeoff between the complexity and the secrecy performance. The typical semidefinite relaxation(SDR) algorithm has high complexity because of random processing. The ZFSINR algorithm requires zero leakage at the eavesdropper so that the secrecy performance is limited. The MSLNR algorithm selects the model between the ESLNR algorithm based on equal power allocation(EPA) and the algorithm based on the sufficient condition according to the SINR requirement at the eavesdropper. When the SINR requirement is low, the ESLNR algorithm based on EPA is used. Otherwise, the algorithm based on the sufficient condition is adopted. The simulation results show that the MSLNR algorithm can achieve good secrecy performance with low complexity.Considering the case of imperfect CSI on the legitimate and the eavesdropperâ€™s channel in the multipleinput singleoutput singleantenna eavesdropper(MISOSE) model, the thesis proposes robust artificial noise aided beamforming algorithms, which improve the secrecy performance. In the existing literature, the artificial noise is exploited to withstand the effect of imperfect CSI on the eavesdropperâ€™s channel. However, for the case of imperfect CSI on the legitimate and the eavesdropperâ€™s channel, the artificial noise aided strategy has not been adopted. For the deterministic uncertainty model, a worstcase robust algorithm is proposed to solve the worstcase secrecy rate maximization(WCSRM) problem by transferring the initial nondeterministic polynomial hard(NPhard) problem into a singlevariable optimization problem along with a series of semidefinite program(SDP) problems. For the stochastic uncertainty model, a robust algorithm is presented to solve the outageprobability secrecy rate maximization(OPSRM) problem. This algorithm uses the mathematical relationship between the stochastic uncertainty model and the deterministic uncertainty model to convert the OPSRM problem into the WCSRM problem. Additionally, a robust algorithm based on average performance is proposed to solve the average secrecy rate maximization(ASRM) problem. The rank of the input covariance matrix is proved to be one. The simulation results demonstrate the effectiveness of these robust algorithms and show that the transmit power allocated for the artificial noise depends on the CSI uncertainty levels on the legitimate and the eavesdropperâ€™s channels. When the level of uncertainty on the legitimate channel is larger, it should be conservative on allocating transmit power to the artificial noise; whereas, when the level of uncertainty on the eavesdropperâ€™s channel is larger, more transmit power should be allocated for the artificial noise.Then, considering the case of statistical information on the eavesdropperâ€™s channel in the multiantenna Gaussian wiretap channel(MGWC) model, the transmit power allocation algorithm for the informationbearing signal and the artificial noise is proposed to minimize the total transmit power. After that, the achievable secrecy rate of the limited feedback beamforming is analyzed. In the MISOSE and the multipleinput multipleoutput multiantenna eavesdropper(MIMOME) models, the robust designs are considered for the cases of imperfect CSI on the legitimate channel under the deterministic uncertainty model and the stochastic uncertainty model. For the deterministic uncertainty model, the proposed algorithm can withstand the effect of the CSI error on the legitimate channel. For the stochastic uncertainty model, two robust algorithms are proposed, where the suboptimal algorithm exploits the mathematical relationship between the stochastic uncertainty model and the deterministic uncertainty model to transfer the probabilistically constrained problem into the deterministically constrained problem, and the other algorithm uses the Markov inequality to convert the probabilistically constrained problem into averageconstraint problem so that achieves the average performance with low complexity. In the MISOME model, the secrecy rate of the limited feedback beamforming is obtained. And then, a new feedback strategy is proposed. When the channel gain exceeds a fixed threshold, the legitimate receiver sends the index of the optimal beamforming vector and the secrecy rate back to the transmitter. Otherwise, the legitimate receiver just tells the transmitter to keep silent. By using this strategy, the throughput decreases. However, the secure communication is guaranteed with lower feedback spending. The impact of the number of antenna, the number of feedback bits and the signaltonoise ratio(SNR) gain on the secrecy rate is analyzed on the basis of approximate secrecy performance analysis. Thus, the condition of the positive secrecy rate and the requirement for the number of feedback bits with fixed secrecy rate loss is obtained.Finally, for the case where no channel information is known by the transmitter, a robust algorithm is proposed under the deterministic uncertainty model in the MGMRWC system. Compared with other robust designs, the worstcase robust design under the deterministic uncertainty model is more conservative. However, the worstcase robust design has effective solution and deterministic performance so that it has attracted much attention. Because the transmitter has no information about the eavesdropperâ€™s channel, the power minimization(PM) problem is studied, where the object is to minimize the transmit power of the informationbearing signal under the constraints of the mean square error(MSE) at the legitimate receiver and the fixed total transmit power. Thus, the remained transmit power is used to transmit the artificial noise isotropically. A robust transceiver design is proposed to solve the PM problem. The proposed algorithm uses the alternative optimization method to transfer the PM problem into two SDP problems, which can be solved by interiorpoint methods effectively. The simulation results demonstrate the effectiveness and the convergence of the proposed algorithm.  Keywords/Search Tags:  Physical Layer Security, Beamforming, Channel State Information, Robust Design, SignaltoLeakageandNoise Ratio, Artificial Noise, Deterministic Uncertainty Model, Stochastic Uncertainty Model, Limited Feedback  PDF Full Text Request  Related items 
 
