A Chaos MIMO Transmission Scheme for Secure Communications on Physical Layer

Author(s):  
Eiji Okamoto
Author(s):  
Yong Jin ◽  
Zhentao Hu ◽  
Dongdong Xie ◽  
Guodong Wu ◽  
Lin Zhou

AbstractAiming at high energy consumption and information security problem in the simultaneous wireless information and power transfer (SWIPT) multi-user wiretap network, we propose a user-aided cooperative non-orthogonal multiple access (NOMA) physical layer security transmission scheme to minimize base station (BS) transmitted power in this paper. In this scheme, the user near from BS is adopted as a friendly relay to improve performance of user far from BS. An energy harvesting (EH) technology-based SWIPT is employed at the near user to collect energy which can be used at cooperative stage. Since eavesdropper in the downlink of NOMA system may use successive interference cancellation (SIC) technology to obtain the secrecy information of receiver, to tackle this problem, artificial noise (AN) is used at the BS to enhance security performance of secrecy information. Moreover, semidefinite relaxation (SDR) method and successive convex approximation (SCA) technique are combined to solve the above non-convex problem. Simulation results show that in comparison with other methods, our method can effectively reduce the transmitted power of the BS on the constraints of a certain level of the secrecy rates of two users.


2020 ◽  
Vol 2020 ◽  
pp. 1-14 ◽  
Author(s):  
Xujun Shen ◽  
Qingchun Chen ◽  
Yulong Nie ◽  
Keming Gan

The MIMO transmission against a smart attacker has recently been formulated as a noncollaborative game, in which both the MIMO transmitter and the malicious attacker try to maximize their predefined utilities. In this paper, by carefully analyzing the Nash Equilibrium (NE), we focus on the conditions, in which the gaming results incline to the malicious attacker instead of the MIMO transmitter. In this adverse case, it is highly desirable to develop an effective mechanism to suppress the attack intention by the attacker for better secure communication. Motivated by this, an adaptive secure MIMO transmission scheme was proposed to make the MIMO transmitter better resist malicious attackers in adverse channel conditions. Compared with the existing gaming-based strategy, not only the transmit power of the MIMO transmitter but also the transmission probability will be adjusted in the proposed adaptive secure transmission scheme. Our analysis results show that the proposed scheme can be regarded as a generalized adaptive transmission one, i.e., when the adaptive transmit power policy is enough to suppress the attack motivation, the proposed scheme will be reduced to the adaptive power control scheme; otherwise, both the adaptive transmit power and the adaptive probabilistic transmission can be employed to suppress the attack motivation. The analysis results confirm us that the proposed adaptive transmission scheme provides us a choice to enhance the secure MIMO transmission performance in adverse conditions.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Liuguo Yin ◽  
Wentao Hao

Due to the broadcast and time-varying natures of wireless channels, traditional communication systems that provide data encryption at the application layer suffer many challenges such as error diffusion. In this paper, we propose a code-hopping based secrecy transmission scheme that uses dynamic nonsystematic low-density parity-check (LDPC) codes and automatic repeat-request (ARQ) mechanism to jointly encode and encrypt source messages at the physical layer. In this scheme, secret keys at the transmitter and the legitimate receiver are generated dynamically upon the source messages that have been transmitted successfully. During the transmission, each source message is jointly encoded and encrypted by a parity-check matrix, which is dynamically selected from a set of LDPC matrices based on the shared dynamic secret key. As for the eavesdropper (Eve), the uncorrectable decoding errors prevent her from generating the same secret key as the legitimate parties. Thus she cannot select the correct LDPC matrix to recover the source message. We demonstrate that our scheme can be compatible with traditional cryptosystems and enhance the security without sacrificing the error-correction performance. Numerical results show that the bit error rate (BER) of Eve approaches 0.5 as the number of transmitted source messages increases and the security gap of the system is small.


Sign in / Sign up

Export Citation Format

Share Document