Mathematical Problems in Engineering

Volume 2013 (2013), Article ID 686403, 7 pages

http://dx.doi.org/10.1155/2013/686403

## Securing Communication via Transmission of Artificial Noise by Both Sides: Bipolar-Beamforming Optimization

^{1}Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai 200240, China^{2}Department of Electronic Engineering, Ohio State University, Columbus, OH 43210, USA

Received 30 August 2013; Accepted 8 November 2013

Academic Editor: Hao Shen

Copyright © 2013 Yongkai Zhou et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

#### Abstract

The paper considers the secure transmission in a wireless environment in which both the transmitter (Alice) and the legitimate receiver (Bob) send artificial noise (AN) to interfere with the eavesdropper (Eve). Optimal design is analyzed in detail for this AN-by-both-side model to deal with Eve’s stochastic channel condition and random spatial distribution. Bipolar-beamforming is first proposed to jointly design Alice and Bob’s transmitting signals. By optimally assigning the transmitting antenna for Bob and allocating the power ratio between Alice’s information and the AN signal, maximum secrecy capacity can be achieved. Simulation is done to illustrate the process of bipolar-beamforming optimization. Results show that the AN-by-both-side model has good secrecy performance on both average and extreme conditions as Eve approaches Alice or Bob.

#### 1. Introduction

In wireless communication, a malicious intruder can easily overhear messages transmitted between two nodes. Traditional security problems involve three parties: transmitter (Alice), legitimate receiver (Bob), and a passive eavesdropper (Eve). Wyner [1] first studied the wiretap channel and introduced the notion of secrecy capacity. After that, Csiszár and Körner [2] extended this work to the nondegraded discrete memoryless broadcast channel. Their work showed that if Bob’s channel is more capable than Eve’s, perfect secrecy can be achieved. Secrecy capacity in MIMO (multiple-input and multiple-output) wiretap channel and fading channel is studied in [3, 4]. Recently, the problem of stochastic system modeling has also been considered in [5–11].

The method of adopting artificial noise (AN) to increase secrecy capacity was first proposed by Goel and Negi [12, 13]. In their model, Alice uses multiple transmitting antennas or cooperates with the helper nodes to generate the AN, shown in Figure 1(a). This degrades Eve’s channel, without affecting Bob, by projecting the AN into the null space of Bob’s channel. Authors in [14–17] adopted an iterative waterfilling algorithm to allocate the power ratio between AN and the information signal, thus solving the optimal design problem of this model.

Li et al. proposed another AN based approach [18], in which AN is generated by Bob, shown in Figure 1(b). Such a kind of AN impairs Eve’s channel but can be cancelled by Bob himself by applying the self-interference cancellation techniques [19–21]. In their model, Bob adopts one antenna for receiving information and another for transmitting AN. Outage secrecy capacity region (OSR) is analyzed for such a configuration. Li et al. also mentioned a model in the discussion part of their paper in which both Alice and Bob send AN. As shown in Figure 1(c), this is a combination of the above two models. However, no detailed optimization analysis is available yet for this AN-by-both-side model.

In this paper, we will generalize the above AN-by-both-side model from Alice equipped with 2 antennas, Bob with 2 antennas, and Eve with 1 antenna to a model that all of them are equipped with multiple antennas. Optimal design will be studied for such a configuration to best utilize Alice and Bob’s antenna and power resources. In order to achieve optimal secrecy performance, many design-specific issues need to be addressed to deal with a stochastic Eve with random channel condition and spatial distribution. These include the assignment of Bob’s antennas, the optimal power allocation ratio for Alice, and the beamforming design. In this work, we will propose an efficient scheme, called “bipolar-beamforming optimization,” to design Alice and Bob’s transmitting signals and allocate their antenna and power resources so that maximum secrecy capacity can be achieved.

The paper is organized as follows. The system model will be described in Section 2. Sections 3–5 will then focus on the efficient computation of secrecy capacity and optimal parameter design for the proposed model. Simulation results will be presented in Section 6, and the conclusion will be given in Section 7.

Throughout this paper, the following notations will be used: bold symbols (e.g., and ) in capital letter and small letter denote matrices and vectors, respectively. is the -dimension vector space over the complex field. denotes the conjugate transpose and . is the determinant of a square matrix while is the norm of a vector. stands for the expectation over the random variate .

#### 2. System Model

Suppose Alice is equipped with () antennas. Bob has () antennas. He will choose the th antenna as receiving antenna, and the remaining ones as AN-emitting antennas. Eve will have () antennas for eavesdropping on the transmission signal between Alice and Bob. It is assumed that the channel between Alice and Bob is known to all parties, but they do not hold channel state information (CSI) of Eve.

As shown in Figure 1(c), when both Alice and Bob send AN, the signal received by Bob can be expressed as where denotes the channel between Alice and the th receiving antenna of Bob, which is a vector. is the channel between the receiving and the transmitting antennas of Bob, with size . is the Gaussian noise at Bob, with noise power . The signal transmitted by Alice is , while stands for the artificial noise emitted by Bob.

Similarly, the signal received by a stochastic Eve is given by where is the Gaussian noise at Eve. is the random channel between Alice’s transmitting antennas and Eve. is the random channel between Bob’s transmitting antenna set and Eve. The elements of and are modeled as i.i.d. zero-mean circularly symmetric complex Gaussian (ZMCSCG) random variables.

The total transmission power of Alice and Bob are and , respectively. For , a proportion of () is allocated to the information signal, with others left for AN. Therefore, the power used for transmitting information and emitting AN is

#### 3. Beamforming and Secrecy Capacity

In this section, the beamforming of Alice and Bob’s transmission signal is first studied. Secrecy capacity of the proposed AN-by-both-side model can therefore be obtained based on the signals received by Bob and Eve.

##### 3.1. Bipolar Beamforming

For Bob, since the location and channel condition of Eve is unknown to him, the beamforming of is just to generate random Gaussian noise. Therefore, becomes an complex random Gaussian vector with covariance matrix .

For Alice, the transmitted signal can be decomposed into the information part, , and the AN part, as follows: According to the beamforming scheme by [13], forms an orthogonal basis of , and . spans the null space of . stands for the information symbol with power ; and is a complex Gaussian vector with zero mean and covariance matrix . Thus, (1) and (2) can be further expanded as where we denote and for simplicity. Note that due to the orthonormality of , and also have i.i.d. ZMCSCG entries as .

##### 3.2. Secrecy Capacity

Based on the work of [4, 13], the lower bound of the secrecy capacity can be calculated in terms of (5), as follows:

where and . (a) holds due to the determinant identity .

Note that in (7), there is no item in the calculation of because it is possible for Bob to cancel the AN exerted on himself by adopting full duplex wireless communication techniques [20], and the problem of self-interference cancellation has also been discussed in depth in [18, 21].

In (8), the worst case situation, , is considered. Therefore, is the upper bound of the information tapped by Eve; and in (6) is the minimum guaranteed secrecy capacity that can be ensured in this scenario.

#### 4. Optimization for Secrecy Capacity

Through the secrecy capacity () analyzed in (6)–(8), the optimization problem can be formalized as In order to maximize this secrecy capacity, the following 2 key parameters need to be optimized: (1), with the th antenna selected as Bob’s receiving antenna, and the others left as AN transmitting antennas;(2), the power allocation ratio between Alice’s information signal and AN.

As it can be seen from (6)–(8), it is hard to analyze due to the existence of 3 random matrices in : , and . In the following part, we will exploit the random characteristics of Eve to optimize the above 2 parameters.

##### 4.1. Antenna Assignment for Bob

We first exam . In (8), the item related to is . Because the channel between Bob and Eve is unknown to Bob and considered to be randomized, any combination of Bob’s AN transmitting antennas will result, on average, in the same effect. Hence, is irrelevant to the selection of antenna .

On the other hand, for (7), it is simple to check that is monotonically increasing with . Therefore, this item needs to be maximized.

Finally; the assignment of Bob’s antenna resources has a relatively simple solution, that is,

##### 4.2. Power Allocation Ratio for Alice

The form of in (6)–(8) is hard to be computed due to the existence of 3 random matrices in : , and . In fact, they are related to Eve’s stochastic channel condition and spatial distribution. In the following section, we will first derive and explore an efficient method to compute the secrecy capacity based on Eve’s random characteristics. The optimal power allocation ratio, , can be obtained thereafter.

###### 4.2.1. Eve’s Stochastic Channel Condition

As it can be seen in (8), is the expectation over the channel condition of Eve; that is, and . When taking into account the path-loss effect, can be expanded as the product of a path-loss component, , and a Gaussian fading component, as follows: In (11), is a coefficient and is the distance between Alice and Eve. stands for the pass-loss exponent. The Gaussian fading component, , is a unit random Gaussian matrix, and the elements of are normalized to be i.i.d. zero-mean unit-covariance circularly symmetric complex Gaussian random variables.

This is similar for , **,** and ; that is,
where , , and are all normalized random Gaussian matrices, the same as .

Therefore, by substituting (11)-(12), (8) can be further derived as (13) consider the following:

In (13), the normalized Gaussian vector, (), (), and () are the column vectors of , , and , with the following coefficients:

As a result, the item in (13) is equivalent to the signal-to-interference ratio of an -branch MMSE diversity combiner having interfers with covariance matrix . The complementary cumulative distribution function of is given in [22] (Equation (18) in that paper), as where is the coefficient of in the polynomial, . Hence, the probability density function of is . We can rewrite the expectation in (13) into integral form as () is obtained using integration by parts. Note that for a given and , the integrand in (16) corresponds to a rational function. The improper integral, therefore, can be easily computed by adopting partial fraction decomposition.

Also, note that the second term in () equals , because . If the size constraint in Section 5.1 is fulfilled; that is, ,

###### 4.2.2. Spatial Distribution of Eve

In (16), is still the expectation over and , which is in turn related to the spatial location of Eve. Therefore, some geometry distribution could be prespecified for this imaginary attacker. For example, in [16, 23], the location of Eve follows a Poisson point process.

In our simulation (see Section 6, Figure 4), however, a certain region of area within a radius of is delimited around Alice and Bob. The probability density function of Eve’s location can be expressed as where is the coordinate of Eve’s location and . We refer to as the “Protected Zone,” and is the area of such a region. points are sampled uniformly and symmetrically in this region to approximately compute the expectation in (16). Outside this region, Eve is considered to have little impact on the secure communication because the relatively high pass-loss and low-SNR makes it difficult to decode the information signal.

###### 4.2.3. Searching for Optimal

Through the above derivation, can be computed efficiently given a specified . Therefore, the optimal power allocation ratio, , can be obtained by some searching techniques.

Analytically, it is hard to prove the concavity of in the form of (16). However, it can be checked from Figure 2 that the resulted curve is concave. Although not strict, it can still be empirically treated as a concave problem in practical engineering. Therefore, one-dimension search technique such as binary search can be applied to find the optimal .

#### 5. Discussion and Extension

##### 5.1. Constraints on Antenna Numbers

There are some size constraints on the number of antennas for Alice, Bob, and Eve in the proposed AN-by-both-side scenario.

First, as can be seen from (8), to avoid being singular, has to be ensured.

Second, for Eve’s antenna number, , it is related to an assumption on the capability of Eve. is typically assumed to mean that Eve has the same capability as Bob. can also be considered as the number of colluding eavesdroppers, each equipped with one antenna.

##### 5.2. Multiple Receiving Antennas for Bob

In this paper, the transmission between Alice and Bob adopts the MISO strategy; that is, Bob only uses one antenna for information receiving. In fact, Bob can use more than one antenna to receive information signals, because he has antennas. Although authors in [13] have pointed out that the secrecy capacity, , does not necessarily grow linearly with the number of receive dimensions, it still might result in a better performance than the MISO strategy. For such MIMO cases, it tends to be more difficult to analyze the statistical expectation of . Furthermore, the antenna selection problem becomes combinatorial NP hard for Bob with multiple receiving antennas. In future work, further efforts need to be made to solve these problems.

#### 6. Simulation Results

In the simulation scenario (see Figure 4), topology is set as . Alice and Bob are located at and , respectively, with and . Simulation parameters are set to the following values: W, , and . The noise power density is −180 dBm/Hz, which gives a noise power of W within a bandwidth of MHz. Such configurations result in an SNR of 4.77 dB at Bob. The channel fading between Alice and Bob is generated randomly.

Optimal design of this scenario is analyzed first. According to the antenna assignment method in Section 4.1, () is computed for each of Bob's antennas, shown in Table 1.

Bob will therefore assign the 2nd antenna as the receiving antenna, and the remaining 3 ones for AN emission.

Figure 2 shows the power allocation ratio and the corresponding secrecy capacity computed according to Section 4.2. Eve’s antenna number, , varies from 1 to 4, and the optimal power allocation ratio, , is obtained for each condition. Secrecy capacity drops drastically with the increase of . also decreases so that a greater proportion of the power should be assigned to AN in order to resist a more powerful eavesdropper. For , the dashed-line also shows the secrecy capacity when AN is sent only by Alice, and is the optimal power allocation ratio for this condition.

Figure 3 compares the secrecy capacity for 3 AN strategies at different SNR levels. To be fair, model (b) and model (c) are configured under the same resource condition as follows: , , , and . As it can be seen from Figure 3, the strategy of model (c) has better performance. In addition, positive secrecy capacity can be achieved even when SNR is fairly low. For model (a), only Alice sends AN, therefore, , and the secrecy capacity is still taken under the optimal power allocation ratio, denoted as in Figure 3. The achieved secrecy capacity of model (c) still outperforms that of model (a), but at the cost of extra AN power emitted by Bob.

In Figure 4, rather than the average secrecy capacity, we turn to see the distribution details of secrecy capacity when the attacker appears at various locations of the topology. When the eavesdropper approaches Alice, the secrecy capacity is degraded greatly due to Eve’s superior channel condition compared with Bob. With the help of AN emitted by Alice, however, positive secrecy capacity is still possible. When Eve is located near Bob, high secrecy capacity is achieved, disregarding the fact that channel conditions for Eve and Bob are similar. This is a result of the strong interfering signal emitted by Bob, making it difficult for Eve to cancel the randomized AN.

#### 7. Conclusion

In this paper, artificial noise sent by both Alice and Bob was studied. We proposed an efficient scheme, called “bipolar-beamforming optimization,” to optimally configure the proposed model. Secrecy capacity was analyzed based on Eve’s stochastic channel condition and spatial distribution. Maximum secrecy capacity can be achieved by adopting the proposed optimization technique to allocate their antenna and power resources. Research work of this paper can be extended to a more general configuration where Bob adopts more than one antennas for receiving the information signals.

#### Acknowledgments

This work was supported in part by the Natural Science Foundation of China (NSFC) under Grant no. 60932003 and no. 61271220. Thanks for the Editor SHEN Hao’s dedicated work. The authors are also grateful to the anonymous reviewers for their helpful comments and constructive suggestions on the original submission manuscript. Professor LI Jianhua (e-mail: ljh888@sjtu.edu.cn) from the Department of Electronic Engineering, Shanghai Jiao Tong University, has provided useful instructions on the revision of our paper.

#### References

- A. D. Wyner, “The wire-tap channel,”
*The Bell System Technical Journal*, vol. 54, no. 8, pp. 1355–1387, 1975. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - I. Csiszár and J. Körner, “Broadcast channels with confidential messages,”
*IEEE Transactions on Information Theory*, vol. 24, no. 3, pp. 339–348, 1978. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - Y. Liang, H. V. Poor, and S. Shamai, “Secure communication over fading channels,”
*IEEE Transactions on Information Theory*, vol. 54, no. 6, pp. 2470–2492, 2008. View at Publisher · View at Google Scholar · View at MathSciNet - F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap channel,”
*IEEE Transactions on Information Theory*, vol. 57, no. 8, pp. 4961–4972, 2011. View at Publisher · View at Google Scholar · View at MathSciNet - H. Shen, S. Xu, X. Song, and Y. Chu, “Delay-dependent ${H}_{\infty}$ filtering for stochastic systems with Markovian switching and mixed mode-dependent delays,”
*Nonlinear Analysis. Hybrid Systems*, vol. 4, no. 1, pp. 122–133, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - S. He and F. Liu, “Adaptive observer-based fault estimation for stochastic Markovian jumping systems,”
*Abstract and Applied Analysis*, vol. 2012, Article ID 176419, 11 pages, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - H. Shen, S. Xu, X. Song, and J. Luo, “Delay-dependent robust stabilization for uncertain stochastic switching systems with distributed delays,”
*Asian Journal of Control*, vol. 11, no. 5, pp. 527–535, 2009. View at Publisher · View at Google Scholar · View at MathSciNet - S. He and F. Liu, “Robust stabilization of stochastic Markovian jumping systems via proportional-integral control,”
*Signal Processing*, vol. 91, no. 11, pp. 2478–2486, 2011. View at Publisher · View at Google Scholar · View at Scopus - H. Shen, S. Xu, J. Lu, and J. Zhou, “Passivity-based control for uncertain stochastic jumping systems with mode-dependent round-trip time delays,”
*Journal of the Franklin Institute. Engineering and Applied Mathematics*, vol. 349, no. 5, pp. 1665–1680, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - Z.-G. Wu, P. Shi, H. Su, and J. Chu, “Passivity analysis for discrete-time stochastic markovian jump neural networks with mixed time delays,”
*IEEE Transactions on Neural Networks*, vol. 22, no. 10, pp. 1566–1575, 2011. View at Publisher · View at Google Scholar · View at Scopus - Z. Wu, H. Su, J. Chu, and W. Zhou, “Improved result on stability analysis of discrete stochastic neural networks with time delay,”
*Physics Letters A*, vol. 373, no. 17, pp. 1546–1552, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - R. Negi and S. Goel, “Secret communication using artificial
noise,” in
*Proceedings of the 62nd IEEE Vehicular Technology Conference (VTC '05)*, vol. 3, pp. 1501–1506, September 2005. - S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,”
*IEEE Transactions on Wireless Communications*, vol. 7, no. 6, pp. 2180–2189, 2008. View at Publisher · View at Google Scholar · View at Scopus - Y. Zhu, Y. Zhou, S. Patel, X. Chen, L. Pang, and Z. Xue, “Artificial noise generated in MIMO scenario: optimal power design,”
*IEEE Signal Processing Letters*, vol. 20, no. 10, pp. 964–967, 2013. View at Google Scholar - X. Zhou and M. R. McKay, “Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation,”
*IEEE Transactions on Vehicular Technology*, vol. 59, no. 8, pp. 3831–3842, 2010. View at Google Scholar - P. Huang and X. Wang, “Secrecy enhancement with artificial noise in decentralized wireless networks: a stochastic geometry perspective,” in
*Proceedings of the IEEE Wireless Communications and Networking Conference*, pp. 935–940, April 2013. - A. Mukherjee and A. L. Swindlehurst, “Robust beamforming for security in MIMO wiretap channels with imperfect CSI,”
*IEEE Transactions on Signal Processing*, vol. 59, no. 1, pp. 351–361, 2011. View at Publisher · View at Google Scholar · View at MathSciNet - W. Li, M. Ghogho, B. Chen, and C. Xiong, “Secure communication via sending artificial noise by the receiver: outage secrecy capacity/region analysis,”
*IEEE Communications Letters*, vol. 16, no. 10, pp. 1628–1631, 2012. View at Google Scholar - A. K. Khandani, “Methods for spatial multiplexing of wireless two-way channels,” US patent US7817641 B1, Application number US 11/581,427, 2010.
- M. Jain, J. I. Choi, T. Kim et al., “Practical, real-time, full duplex wireless,” in
*Proceedings of the 17th Annual International Conference on Mobile Computing and Networking (MobiCom '11)*, pp. 301–312, September 2011. View at Publisher · View at Google Scholar · View at Scopus - S. W. Kim, Y. J. Chun, and S. Kim, “Co-channel interference cancellation using single radio frequency and baseband chain,”
*IEEE Transactions on Communications*, vol. 58, no. 7, pp. 2169–2175, 2010. View at Publisher · View at Google Scholar · View at Scopus - H. Gao, P. J. Smith, and M. V. Clark, “Theoretical reliability of MMSE linear diversity combining in rayleigh-fading additive interference channels,”
*IEEE Transactions on Communications*, vol. 46, no. 5, pp. 666–672, 1998. View at Publisher · View at Google Scholar · View at Scopus - M. Ghogho and A. Swami, “Physical-layer secrecy of MIMO communications in the presence of a poisson random field of eavesdroppers,” in
*Proceedings of the IEEE International Conference on Communications Workshops (ICC '11)*, pp. 1–5, June 2011. View at Publisher · View at Google Scholar · View at Scopus