Next Article in Journal
Bosonic Representation of Matrices and Angular Momentum Probabilistic Representation of Cyclic States
Next Article in Special Issue
Radio Frequency Fingerprint Identification for 5G Mobile Devices Using DCTF and Deep Learning
Previous Article in Journal
An Entropy Generation Rate Model for Tropospheric Behavior That Includes Cloud Evolution
Previous Article in Special Issue
Nested Variational Chain and Its Application in Massive MIMO Detection for High-Order Constellations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Analysis of Artificial Noise-Assisted Location-Based Beamforming in Rician Wiretap Channels

1
School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China
2
Purple Mountain Laboratories for Network and Communication Security, Nanjing 211111, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(12), 1626; https://doi.org/10.3390/e25121626
Submission received: 23 October 2023 / Revised: 1 December 2023 / Accepted: 4 December 2023 / Published: 6 December 2023
(This article belongs to the Special Issue Wireless Communications: Signal Processing Perspectives)

Abstract

:
This paper studies the performance of location-based beamforming with the presence of artificial noise (AN). Secure transmission can be achieved using the location information of the user. However, the shape of the beam depends on the number of antennas used. When the scale of the antenna array is not sufficiently large, it becomes difficult to differentiate the performance between the legitimate user and eavesdroppers nearby. In this paper, we leverage AN to minimize the area near the user with eavesdropping risk. The impact of AN is considered for both the legitimate user and the eavesdropper. Closed-form expressions are derived for the expectations of the signal to interference plus noise ratios (SINRs) and the bit error rates. Then, a secure beamforming scheme is proposed to ensure a minimum SINR requirement for the legitimate user and minimize the SINR of the eavesdropper. Numerical results show that, even with a small number of antennas, the proposed beamforming scheme can effectively degrade the performance of eavesdroppers near the legitimate user.

1. Introduction

Due to the broadcast nature of wireless networks, they face a variety of security threats. Passive eavesdropping is difficult to detect and prevent in wireless communication systems. Although legitimate users can engage in encrypted communication, the cost of secret key distribution is also significant. Physical layer security is promising to achieve secure transmission without key distribution. Physical layer security techniques include artificial noise, security-oriented beamforming, diversity-assisted security approaches, etc. [1,2,3]. Their security is independent of the computational capability of eavesdroppers. The multiple-input multiple-output (MIMO) technique can be used to enhance transmission security thanks to the diversity gain of beamforming.
Based on the channel state information (CSI) of the legitimate user, beamforming can be achieved towards the desired user, with a power gain higher than that of other users in different locations [4,5]. As more antennas are used at the base station, the beam becomes more concentrated. Moreover, artificial noise (AN) can be applied in the null space of the channel of the legitimate user to prevent potential eavesdropping [6,7,8,9]. Closed-form expressions for the secure transmission probability and the effective secrecy throughput are derived in [10] for a Rayleigh fading channel. The impact of the imperfect CSI is considered in [11]. A two-phase transmission scheme with AN injection is proposed in [12] to achieve zero secrecy outage probability under imperfect channel estimation. By assuming that the statistical CSI of the eavesdropper is also available at the base station [13,14,15,16], secure beamforming schemes have been proposed where the secrecy rate is maximized. Moreover, under the assumption that the CSIs of both the legitimate user and the eavesdropper are available at the base station, a secrecy capacity optimization artificial noise is proposed in [17], which is not aligned into the null space of the legitimate channel.
However, the CSI of the user is difficult to obtain by the base station in certain scenarios, such as when the user has not yet connected to the network. In addition, after the user has connected to the network, an eavesdropper can also disrupt beamforming and achieve eavesdropping through pilot contamination attacks [18,19,20]. For millimeter wave (mmWave) systems, the estimation of CSI requires a huge overhead for channel training [21].
Therefore, some works consider using alternative user information for beamforming, such as statistical CSI [13,15,16] and location information [21,22,23,24,25]. In certain scenarios, the location information of the user could be available. For example, the legitimate user is within a confidential area and dedicated networks can only be accessed within this area. We hope that users outside the confidential area cannot eavesdrop on the information of the dedicated network, because attackers can launch jamming, spoofing [26], or distributed denial-of-service attacks based on the network information. Location-based beamforming can be used to protect the dedicated networks.
The performance of location-based beamforming has been studied in [22] in Rician wiretap channels. Based on the location information of the legitimate user and the eavesdropper, the optimal location-based beamformer has been determined for the legitimate user through a grid search algorithm, which minimizes the secrecy outage probability of the system. Due to the absence of AN, eavesdroppers near legitimate users have a high secrecy outage probability when the number of antennas at the base station is small. The authors in [23] considered a wiretap system with the presence of a jammer. By assuming that the CSI of the legitimate user is known to the base station and the jammer, while the location of the eavesdropper is also available at the base station, the optimal beamformer that minimizes the secrecy outage probability has been proposed. Because the CSI between the legitimate user and the jammer is known, the AN signal is transmitted in the null space of the channel of the legitimate user. The authors of [25] studied the covert threat region of three-dimensional (3D) location-based beamforming, and the covertness performance for resisting detection from a location-unknown warden has been evaluated and compared with that of the conventional maximal ratio transmitting scheme.
In this paper, we study the performance of location-based beamforming with the assistance of AN. Based on the location information of the legitimate user, we minimize the area near the user that has eavesdropping risks. Hence, the eavesdropping performance of eavesdroppers at different locations next to the user has been studied. The impact of AN has been considered for both the legitimate user and the eavesdropper. The main contributions of this paper can be summarized as follows:
  • Based on the location information of the legitimate user and the eavesdropper, the signal to interference plus noise ratio (SINR) expressions have been derived for both the user and the eavesdropper, and the impact of AN has been considered. Close approximations of the probability density functions (PDFs) of SINRs have been proposed for Rician channels.
  • The expectations of SINRs have been derived in closed-form expressions. Moreover, the bit error rate (BER) expressions are derived using Gaussian-Laguerre (GL) approximation.
  • A quality of service (QoS)-based beamforming scheme is proposed to minimize the SINR of the eavesdropper and ensure the minimum SINR requirement of the legitimate user. Simulation results show that, when eight antennas are used at the base station, the block error rate (BLER) of eavesdroppers located 5° away from the legitimate user reaches 1.
Some works in the literature considered using ergodic secrecy rate [16,27] or secrecy outage probability [22,28] to design a secure transmission strategy. The ergodic secrecy rate refers to the difference in ergodic rate between the legitimate user and the eavesdropper. Ref. [16] proposed a power allocation algorithm for a discrete Fourier transform (DFT) beamforming matrix to maximize the ergodic secrecy rate. A deep neural network (DNN)-based secure precoding scheme is proposed in [29] to jointly design the precoder and AN signal when the channel estimation is imperfect and the channels are spatially correlated. Because the secrecy rate cannot be arbitrary values in real systems, the authors in [22,28] minimize the secrecy outage probability when a specific target secrecy rate is chosen. However, maximizing the secrecy rate does not imply that the capacity of the eavesdropper is sufficiently small. Due to the application of error correcting code (ECC) in the communication systems, an eavesdropper can successfully decode the information when the minimum SINR requirement is satisfied. To reduce the risk of eavesdropping, we consider maximizing the BLER of the eavesdropper by minimizing the SINR of the eavesdropper. QoS-based transmit beamforming has proven to be a viable and versatile approach [30]. The QoS is measured by the average SINR. Two design formulations are proposed in [30] for AN-aided secret transmit beamforming, namely a total power minimization formulation and a user’s SINR maximization formulation. The signal-to-noise ratio (SNR) outage probability criterion is proposed in [31]. In this paper, based on the error correction capability of ECC, a beamforming design scheme is proposed to minimize the SINR of an eavesdropper and maintain the minimum SINR requirement of the legitimate user. The performance of the proposed scheme is verified through simulations using Polar code [32].
Location-based beamforming can be implemented with low-cost at an analog beamforming module. Analog circuits can significantly improve the power efficiency of the device compared to digital circuits [33]. Due to the non-linear characteristics of power amplifiers, it is not suggested to adjust the amplitude of the signals for beamforming use at the radio frequency (RF) module [34]. The location-based beamformer only shifts the phase of the signal without changing its modulus, which can be considered as a phase-adjusted DFT beamformer. DFT codebook can be embedded on field-programmable analog arrays [33] with reduced power consumption. We note that when the system operates at mmWave band with an extremely large-scale antenna array (ELAA), near-field propagation needs to be considered [35]. Due to the spherical wavefront of near-field radiation, the DFT type beamforming is no longer applicable [36,37]. Secure beamforming with ELAA can be considered for our future work.
The rest of this paper is organized as follows. Section 2 introduces the system model, where the SINR expressions of the legitimate user and the eavesdropper are derived. In Section 3, the approximate PDFs of the SINRs are derived, and then the expectations of the SINRs and the BERs are deduced. In Section 4, the beamforming design scheme is proposed to minimize the SINR of the eavesdropper. The simulation results are presented in Section 5. Section 6 concludes this paper.

2. System Model

We consider a typical wiretap scenario, where a base station Alice and an eavesdropper Eve are equipped with uniform linear arrays (ULA) with M and N antenna elements, respectively. A legitimate user Bob is equipped with a single antenna. To facilitate the presentation of location for the users, we adopt the polar coordinate system and Alice is considered as the origin [22]. Then, the locations of Bob and Eve can be denoted as ( d a b , θ b ) and ( d a e , θ e ) , respectively. We assume that the location of Bob is known to Alice. To investigate the impact of Eve’s location on eavesdropping performance, we assume that the location of Eve is also known to Alice. Then, an optimal beamforming scheme can be designed using AN. In the case where the location of Eve is unknown to Alice, the beamforming scheme can still be used to minimize the area with eavesdropping risk. We note that the CSIs of Bob and Eve are unknown to Alice. Based on the location information of Bob, Alice is able to transmit confidential information via a beam aiming to Bob. Moreover, Alice may transmit a jamming signal via another beam aiming to Eve. We assume that all of the channels are subject to quasi-static independent and identically distributed (i.i.d) Rician fading with different Rician K-factors, and that the K-factors are known to Alice via some a priori measurement campaigns. Hence, the channel vector from Alice to Bob, denoted as H b C 1 × M , can be written as  
H b = K b 1 + K b H b o + 1 1 + K b H b r
where K b is the Rician K-factor of H b , H b o C 1 × M denotes the LOS component, and H b r C 1 × M denotes the scattered component, the elements of which are assumed to be i.i.d. complex Gaussian random variables with zero mean and unit variance, i.e., H b r CN 0 , I M . Moreover, H b o can be written as
H b o = 1 , e j τ a cos θ b , . . . , e j M 1 τ a cos θ b
where τ a = 2 π f 0 ρ a c , f 0 is the carrier frequency, ρ a is the space between two adjacent antenna elements of the ULA of Alice, and c is the speed of propagation of the plane wave. When ρ a is equal to a half wavelength, i.e., ρ a = c 2 f 0 , we have τ a = π .
Likewise, the channel matrix from Alice to Eve, denoted as H e C N × M , can be written as
H e = K e 1 + K e H e o + 1 1 + K e H e r
where K e is the Rician K-factor of H e , H e o C N × M denotes the LOS component, and H e r C N × M denotes the scattered component with i.i.d circularly-symmetric complex Gaussian random variables with zero mean and unit variance. Moreover, H e o can be written as
H e o = h e T h a e
where h e and h a e are the array responses at Eve and Alice, respectively, which can be written as
h e = 1 , e j τ e cos ϕ e , . . . , e j N 1 τ e cos ϕ e
h a e = 1 , e j τ a cos θ e , . . . , e j M 1 τ a cos θ e
where τ e = 2 π f 0 ρ e c , ρ e is the space between two adjacent antenna elements of the ULA of Eve and ϕ e is the direction of arrival from Alice to Eve.
The signal transmitted at Alice can be expressed as
x a = g b w b s b + g AN w AN s AN
where s b is the normalized information signal, s AN is the normalized jamming signal, i.e., E | s b | 2 = E | s AN | 2 = 1 , w b C M × 1 is the normalized beamformer for Bob, w AN C M × 1 is the normalized beamformer for jamming signal, i.e., w b 2 = w AN 2 = 1 , g b is the power allocated to the information signal, and g AN is the power allocated to the jamming signal. Without loss of generality, the total transmit power of Alice is normalized to 1 and hence we have g b + g AN = 1 .
Therefore, the signal received at Bob can be expressed as
y b = g b H b w b s b + g AN H b w AN s AN + n b
where n b represents the complex baseband thermal noise at Bob, such that n b CN 0 , σ b 2 .
Likewise, the signal received at Eve can be expressed as
y e = g b H e w b s b + g AN H e w AN s AN + n e
where n e represents the complex baseband thermal noise at Eve, such that n e CN 0 , σ e 2 I N .
Then, the SINR at Bob can be written as
SINR b = g b | H b w b | 2 g AN | H b w AN | 2 + σ b 2 = g ¯ b | H b w b | 2 g ¯ AN | H b w AN | 2 + 1
where g ¯ b = g b σ b 2 and g ¯ AN = g AN σ b 2 .
Moreover, assuming Eve applies maximum ratio combining (MRC) to combine the signals received from different antennas, the SINR at Eve can be written as
SINR e = g b H e w b 2 g AN H e w AN 2 + σ e 2 = g ˜ b H e w b 2 g ˜ AN H e w AN 2 + 1
where g ˜ b = g b σ e 2 and g ˜ AN = g AN σ e 2 , · 2 denotes the square of the norm of a vector.

3. Performance Analysis

In this section, we first derive the PDF of the SINR for Bob and Eve, and then the expectation of the SINR and the BER performance can be deduced.

3.1. Distribution of the SINR

According to (1), we have
H b w b = K b 1 + K b H b o w b + 1 1 + K b H b r w b .
The distribution of | H b w b | has been analyzed in [22] for a general w b . It has been shown that H b o w b is deterministic and H b r w b is a complex Gaussian random variable with zero mean and unit variance. Hence, | H b w b | follows a Rician distribution with the parameters [22]:
K ¯ b = K b | H b o w b | 2
Ω ¯ b = 1 + K b | H b o w b | 2 1 + K b
The PDF of the Rician distribution involves the modified Bessel function of the first kind, which is difficult to derive. However, the Rician distribution can be closely approximated by Nakagami distribution [38], with the parameters m b = ( K ¯ b + 1 ) 2 / ( 2 K ¯ b + 1 ) and ω b = Ω ¯ b . Hence, g ¯ b | H b w b | 2 can be approximated by a gamma distribution with the PDF written as
p g ¯ b | H b w b | 2 ( x ) = β b α b Γ α b x α b 1 e β b x
where α b = m b , β b = m b g ¯ b ω b and Γ ( · ) is the gamma function.
Furthermore, we have
H b w AN = K b 1 + K b H b o w AN + 1 1 + K b H b r w AN .
Similarly, we can obtain that g ¯ AN | H b w AN | 2 can also be approximated by a gamma distribution, with the parameters α b , AN = m b , AN and β b , AN = m b , AN g ¯ AN ω b AN where  
m b , AN = ( K b | H b o w AN | 2 + 1 ) 2 2 K b | H b o w AN | 2 + 1
ω b , AN = 1 + K b | H b o w AN | 2 1 + K b .
Because w b and w AN are independent, | H b w b | and | H b w AN | can be considered as independent. Hence, the PDF of SINR b can be obtained following a similar derivation as in [39]
p SINR b ( γ ) = 0 + 1 + x p g ¯ b | H b w b | 2 1 + x γ p g ¯ AN | H b w AN | 2 x d x = β b α b β b , AN α b , AN γ α b 1 e β b γ Γ α b Γ α b , AN 0 + 1 + x α b x α b , AN 1 e x β b γ + β b , AN d x = β b α b β b , AN α b , AN γ α b 1 e β b γ Γ α b U α b , AN ; α b + α b , AN + 1 ; β b γ + β b , AN
where U ( a ; b ; x ) is the confluent hypergeometric function of the second kind, which is defined as [39]
U ( a ; b ; x ) = 1 Γ ( a ) 0 + t a 1 ( 1 + t ) b a 1 e x t d t
For the case g AN = 0 , we have p SNR b ( γ ) = p g ¯ b | H b w b | 2 ( γ ) .  
For the SINR of the eavesdropper in (11), we have
H e w b 2 = n = 1 N | H e , n w b | 2
where H e , n is the n t h row of H e which can be written as
H e , n = K e 1 + K e H e , n o + 1 1 + K e H e , n r = K e 1 + K e h e , n h a e + 1 1 + K e H e , n r
where h e , n is the n t h element of h e , i.e., h e , n = e j n 1 τ e cos ϕ e and H e , n r is the n t h row of H e r . Hence, | h e , n h a e w b | = | h a e w b | , the PDF of | H e , n w b | 2 can be approximated by a gamma distribution with the parameters α e , n = m e and β e , n = m e / ω e where
m e = ( K e | h a e w b | 2 + 1 ) 2 2 K e | h a e w b | 2 + 1
ω e = 1 + K e | h a e w b | 2 1 + K e .
Because the rows of H e are independent from each other, the PDF of term g ˜ b H e w b 2 can also be approximated by a gamma distribution with the parameters α e = N m e and β e = m e g ˜ e ω e . Moreover, the PDF of term g ˜ AN H e w AN 2 can also be approximated by a gamma distribution with the parameters α e , AN = N m e , AN and β e , AN = m e , AN g ˜ e ω e , AN where
m e , AN = ( K e | h a e w AN | 2 + 1 ) 2 2 K e | h a e w AN | 2 + 1
ω e , AN = 1 + K e | h a e w AN | 2 1 + K e .
Therefore, the PDF of SINR e , denoted as p SINR e ( γ ) , can be expressed by replacing α b , β b , α b , AN , and β b , AN with α e , β e , α e , AN , and β e , AN in (19).

3.2. Expectation of SINR

The expectation of SINR can be used to design a QoS-based beamforming scheme [30]. Using the PDF of SINR in (19), the expectation of SINR for Bob can be derived as
E SINR b = 0 + γ p SINR b ( γ ) d γ = 1 Γ α b β b α b β b , AN α b , AN 0 + γ α b e β b γ U α b , AN ; α b + α b , AN + 1 ; β b γ + β b , AN d γ
According to [40], we have the equation
e x U ( a ; b ; x ) = G 1 , 2 2 , 0 x | a b + 1 , 0 , 1 b
where G p , q m , n x a 1 , , a p b 1 , , b q is the Meijer’s G-function ([41], 9.301). Then, by performing a change of variable t = β b γ + β b , AN , a closed-form expression for expectation of SINR for Bob can be derived using [42]
E SINR b = 1 Γ α b β b α b β b , AN α b , AN e β b , AN 0 + γ α b G 1 , 2 2 , 0 β b γ + β b , AN | α b , 0 , α b α b , AN d γ = β b , AN α b , AN β b Γ α b e β b , AN β b , AN + t β b , AN α b G 1 , 2 2 , 0 t | α b , 0 , α b α b , AN d t = α b β b β b , AN α b + α b , AN + 1 e β b , AN G 2 , 3 3 , 0 β b , AN | α b , 0 α b 1 , 0 , α b α b , AN
For the case g AN = 0 , the expectation of SINR for Bob can be derived using ([41], 3.326), such that
E SNR b = 0 + γ p g ¯ b | H b w b | 2 ( γ ) d γ = β b α b Γ α b 0 + γ α b e β b γ d γ = α b β b .
Moreover, the expectation of SINR for Eve can be obtained by replacing α b , β b , α b , AN , and β b , AN with α e , β e , α e , AN , and β e , AN in (29) and (30).

3.3. BER Analysis

BER is an important metric for transmission performance. Based on the PDF of SINR in (19), the BER expression of Bob can be written as [39]
P e , b = 0 + 1 2 erfc γ p SINR b ( γ ) d γ
The closed-form BER expression has been derived in [39] when the parameters α b and α b , AN are integers. Otherwise, the integration P e , b cannot be expressed in closed-form. In this paper, we use GL quadrature sum [43] to approximate the value of P e , b . GL quadrature sum approximation can be expressed as
0 + e t f t d t n = 1 N G L w n f t n
where t n and w n are the abscissas and weight factors for the GL integration, which can be tabulated ([44], eq. (25.4.45)) or can be generated efficiently in software such as MATLAB R2020b. The accuracy of the GL quadrature sum increases with the number of terms N G L  [44].
Hence, with a change of variable γ = t β b , the integration P e , b can be expressed as
P e , b = 1 2 Γ α b β b α b β b , AN α b , AN 0 + erfc γ γ α b 1 e β b γ U α b , AN ; α b + α b , AN + 1 ; β b γ + β b , AN d γ = 1 2 Γ α b β b , AN α b , AN 0 + e t t α b 1 erfc t β b U α b , AN ; α b + α b , AN + 1 ; t + β b , AN d t
The integration P e , b can be approximated by P e , b , G L , which can be expressed as
P e , b , G L = 1 2 Γ α b β b , AN α b , AN n = 1 N G L w n t n α b 1 erfc t n β b U α b , AN ; α b + α b , AN + 1 ; t n + β b , AN .
It is shown in Section 5 that the approximation curves perfectly match numerical results for N G L = 300 .
For the case g AN = 0 , the BER expression can be derived using [45], such that
P e , b = β b α b 2 Γ α b 0 + γ α b 1 e β b γ erfc γ d γ = 1 + 1 β b α b Γ α b + 1 2 2 π Γ α b + 1 2 F 1 α b , 1 2 ; α b + 1 ; 1 1 + 1 β b
where 2 F 1 ( a , b ; c ; x ) is the hypergeometric function ([41], Ch. 9.1).

4. Optimal Location-Based Beamforming

A location-based beamformer can be expressed as [22]
w ψ = 1 M 1 , e j τ cos ψ , . . . , e j M 1 τ cos ψ T
where ψ 0 , π is the beamforming direction. The optimal beamformers can be denoted as w b = w ψ b and w AN = w ψ AN where ψ b and ψ AN are the optimal beam directions for useful signal and AN, respectively.
In this paper, the beamforming scheme is designed based on the QoS of Bob and Eve. Because ECC has been widely used in wireless communication systems, the redundancy of code allows the receiver to correct a limited number of error bits. Hence, the receiver can successfully decode the message when the minimum SINR requirement is satisfied. On the other hand, AN needs to be strong enough at the eavesdropper side to make the BLER of the eavesdropper close to 1. When the scale of the antenna array is not sufficiently large at Alice, it is difficult to differentiate the performance between Bob and Eve nearby. In order to minimize the area near Bob with eavesdropping risk, it is necessary to increase the AN at Eve as much as possible without affecting the BLER of Bob. Hence, the beamforming design formulation ensures a minimum SINR requirement of Bob, denoted as γ ^ b , while minimizing the SINR of Eve. In this case, the BLER of Eve is maximized.
We note that for each ψ b , ψ AN pair, the resulted E SINR b monotonically increases with g b . Hence, when there exists values of ψ b , ψ AN , g b such that the corresponding E SINR b γ ^ b , the values of ψ b , ψ AN , g b can be approached through Algorithm 1.
Algorithm 1 Algorithm to Determine ψ b , ψ AN , g b for Location-based Beamforming
Require:  θ b , θ e
Ensure:  ψ b , ψ AN , g b
1: for  0 ψ b , ψ AN π with step size δ ψ  do
2:    calculate w b and w AN using (36).
3:    while  0 < g b 1 with step size δ g  do
4:        calculate E SINR b using (29)
5:        if  E SINR b γ ^ b  then
6:              g b , t m p = g b
7:             calculate E SINR e using (29) and the parameters of Eve
8:              γ e , t m p = E SINR e
9:             break
10:       end if
11:   end while
12: end for
13: Choose ψ b , ψ AN that achieve the minimum γ e , t m p , g b takes the value of the corresponding g b , t m p .

5. Simulation Results

In this section, we first verify the analytical expressions derived above through simulations. Then, the performance of the proposed beamforming scheme Algorithm 1 is simulated for different θ e and M values. The channel parameters are set as K b = 10 dB and K e = 7 dB and the SNR of the system is SNR = 30 dB for both Bob and Eve.
The SINR expectation expression in (29) is tested at first assuming that θ b = 45 and θ e = 46 . Without beamforming optimization, we align the signal beam towards Bob and the AN beam towards Eve, i.e., w b = w θ b and w AN = w θ e . The expectation of SINR b and SINR e is simulated for different M and g AN values and the results are presented in Figure 1. The theoretical values of the expectation of SINR are also displayed in lines. It can be seen that the theoretical curves perfectly match the simulation results. Additionally, due to the close proximity of Bob and Eve, it can be observed that when the number of antennas is small, i.e., M 16 , the performance of Bob and Eve is almost the same, regardless of whether AN is used. This is because the beam is wide for these cases. As the number of antennas increases, the beam becomes more focused, and even without using AN, the performance of Bob and Eve becomes distinguishable. When AN is added, the performance of both Bob and Eve decreases, but the performance of Eve decreases more significantly. The simulation results show that, without beam optimization, a large number of antennas is required to differentiate the performance of Bob and Eve.
Moreover, based on the above assumptions, the BER performance of Eve is simulated for M = 64 and the results are presented in Figure 2 for different g AN values. The approximate BERs using GL quadrature sum with N G L = 300 are presented as continuous lines, which exhibit good accuracy compared to the simulation results. Moreover, it can be seen that as g AN increases, the BER of Eve increases rapidly.
Then, we test the performance of the proposed Algorithm 1 in preventing eavesdropping with a small scale of antennas. The locations of Bob and Eve remain unchanged. We set δ ψ = 1 , δ g = 0.01 and γ ^ b = 10   dB . We test the performance of Eve at different locations, such that θ e 46 , , 50 . Assuming M = 8 and N { 1 , 2 , 4 , 8 } , the expectations of SINR b and SINR e are simulated and the results are presented in Figure 3. We can see that the performance of Bob remains above the threshold γ ^ b = 10 dB, while the performance of Eve decreases when increasing the distance between Eve and Bob. Moreover, we note that when the number of antennas of Eve increases, the SINR of Eve actually decreases. This is because as the number of antennas N increases, the power of the desired signal and AN received by Eve both increase proportionally, resulting in a decrease in overall SINR. To clarify this point, the expectation of the power of the desired signal and AN received by Eve are displayed in Figure 4. It can be observed that as the number of receiving antennas doubles, the received power is also doubled. However, since the power of the desired signal and AN follow different distributions, the expected SINR changes with the number of receiving antennas.
The corresponding BERs are also simulated and the results are presented in Figure 5. It is shown that the BER of Bob fluctuates around 10 2 and the BER of Eve increases when increasing the distance between Eve and Bob. When there is 5° difference between Eve and Bob, the BER of Eve reaches 0.37 . Particularly, we note that the BER of the case N = 8 is lower than that of the case N = 1 . This is in contrast to the trend exhibited by the expectation of SINR e in Figure 3. This is because when a MRC receiver is used at Eve, an increase in the number of receive antennas reduces the fading of the equivalent channel. Therefore, even though the average SINR of the case N = 8 is smaller than that of the case N = 1 , its BER is still better than that of the N = 1 case, due to the diversity gain of the receive antenna array.
For comparison purposes, the expectation of SINR e without using AN is simulated in the function of the location of Eve θ e , as shown in Figure 6. The shape of the beam can be observed for different M values. We note that as more antennas are used, the beam becomes narrower and the sidelobes become smaller.
The BER performance of Eve without using AN is also simulated and the results are presented in Figure 7. It can be observed that when the number of antennas is relatively small, even if Bob and Eve are far apart, the BER of Eve remains at a low level, especially when Eve is on the peaks of the sidelobes. The results of this figure demonstrate the necessity of using AN to prevent eavesdropping.
Moreover, the strategy for maximizing the ergodic secrecy rate [16] has also been simulated. The power allocation factors are optimized. The expectations of SINR b and SINR e are presented in Figure 8 and the BER results are shown in Figure 9. It can be observed that the difference in SINR between Bob and Eve has increased compared to Figure 3, but the BER of Eve decreases as the location of Eve becomes farther. This is because this strategy does not directly degrade the SINR of Eve.
To clarify the impact of the Rician parameter, the case where K b = 14.8 dB is simulated to compare with the results of K b = 10 dB. The expectations of SINR b and SINR e are presented in Figure 10. We note that a higher K b value leads to a degradation in the performance of Eve. However, the trend of the eavesdropper’s SINR decreasing as the location moves away from the user remains unchanged. Hence, the proposed algorithm can be applied for LoS channels with different K-factors to degrade the SINR performance of an eavesdropper. An example of the K-factor for different scenarios can be found in ([46], Table 7.5–6).
To illustrate the effectiveness of the proposed algorithm for minimizing the QoS of the eavesdropper, the BLER of Bob and Eve are simulated in Figure 11 using Polar code as the ECC. Polar code [32] is an emerging channel coding technique for 5th generation (5G) mobile communication systems [47]. Polar code has been adopted for enhanced mobile broadband (eMBB) control channels. We set the rate of the code R = 4 , ϵ = 0.15 , and the length of information as 128. It can be seen from Figure 11 that the BLER of Bob remains 0 and the BLER of Eve increases with θ e . When M = 8 , the BLER of Eve reaches 1 for θ e = 50 , which means that eavesdroppers beyond 5° cannot decode the information. When the number of antennas reaches 32, eavesdroppers beyond 1° also cannot decode the message.
In the case where the location of Eve is unknown to Alice, Alice can design beamforming schemes using the location of Eve that results in a sufficiently low BLER for Eve. In this way, the chosen location of Eve and more distant areas are protected. For the region between Bob and the chosen location of Eve, additional surveillance measures can be employed to prevent eavesdropping.

6. Conclusions

This work investigated the performance of AN-assisted location-based beamforming in Rician wiretap channels. Assuming that the location information of the legitimate user and the eavesdropper is available at the base station, AN is used to interfere with eavesdroppers. The influence of the AN has been considered for both the legitimate user and the eavesdropper. Closed-form PDF approximations of the SINRs are derived. Moreover, the expressions of the expectations of the SINRs and the BERs are deduced. A secure beamforming scheme is proposed to ensure a minimum SINR requirement for the legitimate user and minimize the SINR of the eavesdropper. Numerical results show that the proposed beamforming scheme can effectively degrade the performance of nearby eavesdroppers even with a small number of antennas. When the base station has eight antennas, the BLER of the eavesdropper reaches 1 when the eavesdropper is located 5° away from the legitimate user, while the BLER of the legitimate user remains 0. In the case where the location of the eavesdropper is unknown to the base station, the proposed beamforming scheme can still be used to minimize the area near the legitimate user with eavesdropping risk. When more antennas are used at the base station, the area with eavesdropping risk can be further reduced.

Author Contributions

H.F.: Conceptualization, methodology, software, validation, formal analysis, resources, writing—original draft preparation; X.Z.: software, validation, investigation, resources, writing—review and editing; L.P.: writing—review and editing, project administration, funding acquisition. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key Research and Development Program of China under Grant 2022YFB4300300, the National Natural Science Foundation of China under Grants 62001106 and 62171120, the Guangdong Key Research and Development Program under Grant 2020B0303010001, the Jiangsu Provincial Key Laboratory of Network and Information Security No. BM2003201, and the Purple Mountain Laboratories for Network and Communication Security.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study, in the collection, analyses, or interpretation of data, in the writing of the manuscript, or in the decision to publish the results.

References

  1. Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef]
  2. Wu, Y.; Khisti, A.; Xiao, C.; Caire, G.; Wong, K.K.; Gao, X. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead. IEEE J. Sel. Areas Commun. 2018, 36, 679–695. [Google Scholar] [CrossRef]
  3. Sanenga, A.; Mapunda, G.A.; Jacob, T.M.L.; Marata, L.; Basutli, B.; Chuma, J.M. An Overview of Key Technologies in Physical Layer Security. Entropy 2020, 22, 1261. [Google Scholar] [CrossRef] [PubMed]
  4. Khisti, A.; Wornell, G.W. Secure transmission with multiple antennas I: The MISOME wiretap channel. IEEE Trans. Inf. Theory 2010, 56, 3088–3104. [Google Scholar] [CrossRef]
  5. Li, X.; Jin, S.; Suraweera, H.A.; Hou, J.; Gao, X. Statistical 3-D beamforming for large-scale MIMO downlink systems over Rician fading channels. IEEE Trans. Commun. 2016, 64, 1529–1543. [Google Scholar] [CrossRef]
  6. Goel, S.; Negi, R. Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 2008, 7, 2180–2189. [Google Scholar] [CrossRef]
  7. Zhang, X.; Zhou, X.; McKay, M.R. On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels. IEEE Trans. Veh. Technol. 2013, 62, 2170–2181. [Google Scholar] [CrossRef]
  8. Shang, P.; Yu, W.; Zhang, K.; Jiang, X.Q.; Kim, S. Secrecy enhancing scheme for spatial modulation using antenna selection and artificial noise. Entropy 2019, 21, 626. [Google Scholar] [CrossRef]
  9. Joung, J.; Choi, J.; Jung, B.C.; Yu, S. Artificial noise injection and its power loading methods for secure space-time line coded systems. Entropy 2019, 21, 515. [Google Scholar] [CrossRef]
  10. Yang, N.; Elkashlan, M.; Duong, T.Q.; Yuan, J.; Malaney, R. Optimal Transmission With Artificial Noise in MISOME Wiretap Channels. IEEE Trans. Veh. Technol. 2016, 65, 2170–2181. [Google Scholar] [CrossRef]
  11. Bai, J.; Dong, T.; Zhang, Q.; Wang, S.; Li, N. Coordinated Beamforming and Artificial Noise in the Downlink Secure Multi-Cell MIMO Systems Under Imperfect CSI. IEEE Wireless Commun. Lett. 2020, 9, 1023–1026. [Google Scholar] [CrossRef]
  12. Ta, H.Q.; Cao, L.; Oh, H. Novel Noise Injection Scheme to Guarantee Zero Secrecy Outage under Imperfect CSI. Entropy 2023, 25, 1594. [Google Scholar] [CrossRef]
  13. Zappone, A.; Lin, P.H.; Jorswieck, E. Energy efficiency of confidential multi-antenna systems with artificial noise and statistical CSI. IEEE J. Sel. Topics Signal Process. 2016, 10, 1462–1477. [Google Scholar] [CrossRef]
  14. Hu, L.; Wu, B.; Tang, J.; Pan, F.; Wen, H. Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 22–27 May 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–5. [Google Scholar]
  15. Wang, W.; Teh, K.C.; Li, K.H. Secrecy throughput maximization for MISO multi-eavesdropper wiretap channels. IEEE Trans. Inf. Forensics Secur. 2016, 12, 505–515. [Google Scholar] [CrossRef]
  16. Wang, W.; Chen, X.; You, L.; Yi, X.; Gao, X. Artificial noise assisted secure massive MIMO transmission exploiting statistical CSI. IEEE Commun. Lett. 2019, 23, 2386–2389. [Google Scholar] [CrossRef]
  17. Gu, Y.; Wu, Z.; Yin, Z.; Zhang, X. The Secrecy Capacity Optimization Artificial Noise: A New Type of Artificial Noise for Secure Communication in MIMO System. IEEE Access 2019, 7, 58353–58360. [Google Scholar] [CrossRef]
  18. Tugnait, J.K. Pilot spoofing attack detection and countermeasure. IEEE Trans. Commun. 2018, 66, 2093–2106. [Google Scholar] [CrossRef]
  19. Huang, K.W.; Wang, H.M.; Wu, Y.; Schober, R. Pilot spoofing attack by multiple eavesdroppers. IEEE Trans. Wirel. Commun. 2018, 17, 6433–6447. [Google Scholar] [CrossRef]
  20. Xiong, Q.; Liang, Y.C.; Li, K.H.; Gong, Y.; Han, S. Secure transmission against pilot spoofing attack: A two-way training-based scheme. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1017–1026. [Google Scholar] [CrossRef]
  21. Xing, Z.; Wang, R.; Yuan, X.; Wu, J. Location Information Assisted Beamforming Design for Reconfigurable Intelligent Surface Aided Communication Systems. IEEE Trans. Wirel. Commun. 2023, 22, 7676–7695. [Google Scholar] [CrossRef]
  22. Yan, S.; Malaney, R. Location-based beamforming for enhancing secrecy in Rician wiretap channels. IEEE Trans. Wirel. Commun. 2015, 15, 2780–2791. [Google Scholar] [CrossRef]
  23. Liu, C.; Malaney, R. Location-based beamforming and physical layer security in Rician wiretap channels. IEEE Trans. Wirel. Commun. 2016, 15, 7847–7857. [Google Scholar] [CrossRef]
  24. Abdelreheem, A.; Mohamed, E.M.; Esmaiel, H. Location-Based Millimeter Wave Multi-Level Beamforming Using Compressive Sensing. IEEE Commun. Lett. 2018, 22, 185–188. [Google Scholar] [CrossRef]
  25. Lin, Y.; Jin, L.; Huang, K.; Zhong, Z.; Han, Q. Covert Threat Region Analysis of 3-D Location-Based Beamforming in Rician Channel. IEEE Wirel. Commun. Lett. 2022, 11, 1253–1257. [Google Scholar] [CrossRef]
  26. Lichtman, M.; Rao, R.; Marojevic, V.; Reed, J.; Jover, R.P. 5G NR jamming, spoofing, and sniffing: Threat assessment and mitigation. In Proceedings of the 2018 IEEE International Conference on Communications Workshops (ICC Workshops), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
  27. Xu, W.; Li, B.; Tao, L.; Xiang, W. Artificial Noise Assisted Secure Transmission for Uplink of Massive MIMO Systems. IEEE Trans. Veh. Technol. 2021, 70, 6750–6762. [Google Scholar] [CrossRef]
  28. Hu, D.; Mu, P.; Zhang, W.; Wang, W. Minimization of Secrecy Outage Probability With Artificial-Noise-Aided Beamforming for MISO Wiretap Channels. IEEE Commun. Lett. 2020, 24, 401–404. [Google Scholar] [CrossRef]
  29. Yun, S.; Kang, J.M.; Kim, I.M.; Ha, J. Deep Artificial Noise: Deep Learning-Based Precoding Optimization for Artificial Noise Scheme. IEEE Trans. Veh. Technol. 2020, 69, 3465–3469. [Google Scholar] [CrossRef]
  30. Liao, W.C.; Chang, T.H.; Ma, W.K.; Chi, C.Y. QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach. IEEE Trans. Signal Process. 2010, 59, 1202–1216. [Google Scholar] [CrossRef]
  31. Wang, J.; Han, S.; Xu, S.; Li, J. SNR-Outage-Based Robust Artificial Noise-Aided Beamforming for Correlated MISO Wiretap Channels Under Gaussian Channel Uncertainties. IEEE Syst. J. 2023, 17, 1569–1580. [Google Scholar] [CrossRef]
  32. Arikan, E. Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels. IEEE Trans. Inf. Theory 2009, 55, 3051–3073. [Google Scholar] [CrossRef]
  33. Suh, S.; Basu, A.; Schlottmann, C.; Hasler, P.E.; Barry, J.R. Low-power discrete Fourier transform for OFDM: A programmable analog approach. IEEE Trans. Circuits Syst. 2011, 58, 290–298. [Google Scholar] [CrossRef]
  34. Han, Y.; Jin, S.; Zhang, J.; Zhang, J.; Wong, K.K. DFT-based hybrid beamforming multiuser systems: Rate analysis and beam selection. IEEE J. Sel. Topics Signal Process. 2018, 12, 514–528. [Google Scholar] [CrossRef]
  35. Cui, M.; Wu, Z.; Lu, Y.; Wei, X.; Dai, L. Near-Field MIMO Communications for 6G: Fundamentals, Challenges, Potentials, and Future Directions. IEEE Commun. Mag. 2023, 61, 40–46. [Google Scholar] [CrossRef]
  36. Lu, H.; Zeng, Y. Near-Field Modeling and Performance Analysis for Multi-User Extremely Large-Scale MIMO Communication. IEEE Commun. Lett. 2022, 26, 277–281. [Google Scholar] [CrossRef]
  37. Shen, D.; Dai, L.; Su, X.; Suo, S. Multi-Beam Design for Near-Field Extremely Large-Scale RIS-Aided Wireless Communications. IEEE Trans. Green Commun. Netw. 2023, 7, 1542–1553. [Google Scholar] [CrossRef]
  38. Goldsmith, A. Wireless Communications; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  39. Aalo, V.; Zhang, J. Performance analysis of maximal ratio combining in the presence of multiple equal-power cochannel interferers in a Nakagami fading channel. IEEE Trans. Veh. Technol. 2001, 50, 497–503. [Google Scholar] [CrossRef]
  40. Wolfram. HypergeometricU. Available online: http://functions.wolfram.com/07.33.26.0007.01 (accessed on 18 October 2023).
  41. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products, 7th ed.; Academic Press Inc.: Cambridge, MA, USA, 2007. [Google Scholar]
  42. Wolfram. MeijerG. Available online: http://functions.wolfram.com/07.34.21.0085.01 (accessed on 19 October 2023).
  43. Atapattu, S.; Tellambura, C.; Jiang, H. A mixture Gamma distribution to model the SNR of wireless channels. IEEE Trans. Wirel. Commun. 2011, 10, 4193–4203. [Google Scholar] [CrossRef]
  44. Abramowitz, M.; Stegun, I.A. (Eds.) Handbook of Mathematical Functions: With Formulas, Graphs, and Mathematical Tables; Dover Publications: Mineola, NY, USA, 1972. [Google Scholar]
  45. Shin, H.; Lee, J.H. On the error probability of binary and M-ary signals in Nakagami-m fading channels. IEEE Trans. Commun. 2004, 52, 536–539. [Google Scholar] [CrossRef]
  46. 3rd Generation Partnership Project (3GPP). Study on Channel Model for Frequencies from 0.5 to 100 GHz (Release 16); Technical Specification Group Radio Access Network; Technical Report (TR) 38.901; ETSI: Sophia Antipolis, France, 2019. [Google Scholar]
  47. Dong, L.; Zhao, H.; Chen, Y.; Chen, D.; Wang, T.; Lu, L.; Zhang, B.; Hu, L.; Gu, L.; Li, B.; et al. Introduction on IMT-2020 5G trials in China. IEEE J. Sel. Areas Commun. 2017, 35, 1849–1866. [Google Scholar] [CrossRef]
Figure 1. The expectation of SINR b and SINR e in the function of g AN for M { 8 , 16 , 32 , 64 , 100 } .
Figure 1. The expectation of SINR b and SINR e in the function of g AN for M { 8 , 16 , 32 , 64 , 100 } .
Entropy 25 01626 g001
Figure 2. The simulated and approximate BERs of Eve for M = 64 .
Figure 2. The simulated and approximate BERs of Eve for M = 64 .
Entropy 25 01626 g002
Figure 3. The expectation of SINR b and SINR e with optimal beamforming in the function of the location of Eve θ e .
Figure 3. The expectation of SINR b and SINR e with optimal beamforming in the function of the location of Eve θ e .
Entropy 25 01626 g003
Figure 4. The expectation of the power of the desired signal and AN received by Eve, with different numbers of receive antennas at Eve.
Figure 4. The expectation of the power of the desired signal and AN received by Eve, with different numbers of receive antennas at Eve.
Entropy 25 01626 g004
Figure 5. The simulated BERs of Eve in the function of the location of Eve θ e .
Figure 5. The simulated BERs of Eve in the function of the location of Eve θ e .
Entropy 25 01626 g005
Figure 6. The expectation of SINR e without using AN in the function of the location of Eve θ e .
Figure 6. The expectation of SINR e without using AN in the function of the location of Eve θ e .
Entropy 25 01626 g006
Figure 7. The simulated BERs of Eve without using AN in the function of the location of Eve θ e .
Figure 7. The simulated BERs of Eve without using AN in the function of the location of Eve θ e .
Entropy 25 01626 g007
Figure 8. The expectations of SINR b and SINR e when the ergodic secrecy rate is maximized in the function of the location of Eve θ e .
Figure 8. The expectations of SINR b and SINR e when the ergodic secrecy rate is maximized in the function of the location of Eve θ e .
Entropy 25 01626 g008
Figure 9. The simulated BERs when the ergodic secrecy rate is maximized in the function of the location of Eve θ e .
Figure 9. The simulated BERs when the ergodic secrecy rate is maximized in the function of the location of Eve θ e .
Entropy 25 01626 g009
Figure 10. The expectation of SINR b and SINR e for K b = { 10 , 14.8 } dB in the function of the location of Eve θ e .
Figure 10. The expectation of SINR b and SINR e for K b = { 10 , 14.8 } dB in the function of the location of Eve θ e .
Entropy 25 01626 g010
Figure 11. The simulated BLERs of Bob and Eve in the function of the location of Eve θ e .
Figure 11. The simulated BLERs of Bob and Eve in the function of the location of Eve θ e .
Entropy 25 01626 g011
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Fu, H.; Zhang, X.; Peng, L. Performance Analysis of Artificial Noise-Assisted Location-Based Beamforming in Rician Wiretap Channels. Entropy 2023, 25, 1626. https://doi.org/10.3390/e25121626

AMA Style

Fu H, Zhang X, Peng L. Performance Analysis of Artificial Noise-Assisted Location-Based Beamforming in Rician Wiretap Channels. Entropy. 2023; 25(12):1626. https://doi.org/10.3390/e25121626

Chicago/Turabian Style

Fu, Hua, Xiaoyu Zhang, and Linning Peng. 2023. "Performance Analysis of Artificial Noise-Assisted Location-Based Beamforming in Rician Wiretap Channels" Entropy 25, no. 12: 1626. https://doi.org/10.3390/e25121626

APA Style

Fu, H., Zhang, X., & Peng, L. (2023). Performance Analysis of Artificial Noise-Assisted Location-Based Beamforming in Rician Wiretap Channels. Entropy, 25(12), 1626. https://doi.org/10.3390/e25121626

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop