Next Article in Journal
Research on Application of Non-Isolated Three-Port Switching Boost Converter in Photovoltaic Power Generation System
Previous Article in Journal
DDTMS: Dirichlet-Distribution-Based Trust Management Scheme in Internet of Things
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Exploiting Array Pattern Synthesis for Physical Layer Security in Millimeter Wave Channels

1
School of Electronic Engineering, Soongsil University, Seoul 06978, Korea
2
Intel Labs, Intel Corporation, Santa Clara, CA 95054-1549, USA
3
Department of Communication Systems, KTH Royal Institute of Technology, 114 28 Stockholm, Sweden
4
School of Electrical Engineering, University of Ulsan, Ulsan 44610, Korea
*
Author to whom correspondence should be addressed.
Electronics 2019, 8(7), 745; https://doi.org/10.3390/electronics8070745
Submission received: 12 June 2019 / Revised: 27 June 2019 / Accepted: 27 June 2019 / Published: 1 July 2019
(This article belongs to the Section Microwave and Wireless Communications)

Abstract

:
In this paper, we propose a beamformer design scheme for wireless physical layer security using partial channel state information (CSI) in millimeter wave channels. The partial CSI used in this work is the range of angle-of-departure (AOD). Assuming that the AOD range of each node is available, we design a transmit beamformer using semidefinite programming based on array pattern synthesis. Numerical results are presented to verify the secrecy rates achieved by the proposed scheme.

1. Introduction

One inherent defect in wireless communication systems is their lack of security owing to the broadcast nature of wireless channels. To enable secure transmission over wireless channels, physical layer security schemes exploit the physical characteristics of wireless channels without relying on cryptography [1,2]. From an information-theoretic viewpoint, secrecy capacity is defined as the maximum achievable secrecy rate at which a source can send a confidential message to a destination without being overheard by eavesdroppers. To enlarge the secrecy rate in wireless channels, various approaches have been studied to exploit multiple-antenna techniques [3,4], relay-assisted secure transmission schemes [5], node cooperation strategies [6,7,8], and dirty paper coding (DPC) based information embedding approaches [9], where global channel state information (CSI) is assumed. In [10,11], secure communication with delayed CSI has been investigated from a secure degrees of freedom perspective.
To enhance wireless physical layer security even when global CSI is not available, beamforming with artificial noise has been widely investigated [12,13]. In [14], the artificial noise is placed in the null space of the destination’s channel to prevent artificial noise from leaking to the destination. Further, to decide what portion of available transmit power is allocated for sending artificial noise to interrupt eavesdroppers, the statistics of the eavesdroppers’ channels are exploited at the source in [15]. Since the exact CSI of the destination’s channel is required for the above techniques, the leakage of artificial noise to the destination is inevitable when the destination’s channel estimation is imperfect [16].
In this work, we propose a beamformer design scheme exploiting partial CSI in millimeter wave (mmWave) channels. The partial CSI exploited in this work is the range of angle-of-departure (AOD). We assume that even though the AOD of a dominant multipath between the BS and each node is not exactly known to the BS, it falls within a certain range and the AOD ranges of the destination and the eavesdroppers are available at the BS. Note that compound wiretap channels in [17] assume that the destination’s channel is perfectly known, while the eavesdroppers’ channels belong to a known set of channels characterized by partial CSI such as maximum channel gain. The AOD ranges for the eavesdroppers in this work can be considered as the known set of channels defined in compound wiretap channels. While the compound wiretap channel assumes the perfect knowledge on the destination’s channel, we consider only the AOD range for the destination. Using the AOD range information, we design a transmit beamformer for sending confidential messages based on array pattern synthesis using semidefinite programming [18].
Recently, array pattern synthesis has been utilized to design cluster beamformers in non-orthogonal multiple access systems. In [19], the cluster beamformer is designed to minimize inter-cluster interference under the constraint of maintaining the beamforming gain to the desired cluster exceeding a given threshold. Unlike the previous study in [19], we focus on maximizing the ratio of the beamforming gains at the destination and the eavesdroppers by considering that the secrecy rate is determined by the difference between rates at the destination and the eavesdroppers. Using numerical results, we show that the proposed approach using AOD ranges is efficient for physical layer security when the array antenna size is large and the channel estimation error is critical.

2. System Model and Secrecy Rate Evaluation

Consider a BS that sends secure information to a destination in the presence of I non-colluding eavesdroppers [20]. In a non-colluding scenario, each eavesdropper works independently and decodes the message solely based on its own observation. On the other hand, a colluding scenario considers that multiple eavesdroppers share their observations and jointly decode the message assuming the existence of communication links between eavesdroppers, which represents a worst-case scenario. The colluding eavesdroppers can be treated as a single eavesdropper with multiple antennas in [3]. Even though we propose a beamformer design scheme assuming non-colluding eavesdroppers, the secrecy rate achieved by the proposed beamformer is also evaluated in a colluding scenario, which will be presented in Section 4.
We assume that the BS has an antenna array with N antenna elements, whereas the destination D and each eavesdropper E i are equipped with a single antenna. Let y D and y E i be the received baseband signals at D and E i , respectively. The received signals can be expressed as
y D = h D w s + z D , y E i = h E i w s + z E i ,
where h D C 1 × N and h E i C 1 × N are vectors containing the complex channel coefficients from the BS to D and E i , respectively. Further, w = [ w 1 w 2 w N ] T C N denotes a transmit beamformer and s is the secure information with unit power. The noises z D and z E i are assumed to be complex additive white Gaussian with zero-mean and variance σ 2 . Here, we can compute the rates at D and E i as
R D = log 2 1 + | h D w | 2 σ 2 , R E i = log 2 1 + | h E i w | 2 σ 2 ,
respectively. Then, the achievable secrecy rate can be expressed as R = max R D max i R E i , 0 [21].
Assuming global CSI is available at the BS, we can find the optimal transmit beamformer, which maximizes the achievable secrecy rate, by solving the following optimization problem:
max w σ 2 + | h D w | 2 max i σ 2 + | h E i w | 2 , s . t . w w = P ,
where ( . ) denotes the conjugated transpose and P is the transmit power of the BS. The detailed derivation for solving (3) is highlighted in the Appendix. It is noteworthy that the beamformer design problem to minimize the transmit power with the secrecy rate constraint is also considered in [21].
Let us consider a uniform planar array (UPA) at the BS, where N antenna elements are placed in a two-dimensional grid pattern. When channel reciprocity is available, the channels from the BS to D and E i can be expressed as [22]
h D = A D g D , h E i = A E i g E i ,
respectively, where g D C K D and g E i C K E i are complex Gaussian vectors with zero mean and covariance matrices diag ( β D ( 1 ) , , β D ( K D ) ) and diag ( β E i ( 1 ) , , β E i ( K E i ) ) , respectively. Furthermore, K D denotes the number of multipaths between the BS and D, K E i is the number of multipaths between the BS and E i , and β D ( k ) and β E i ( k ) denote the average power gain for each radio path. The k-th columns of the matrix A D C N × K D and the matrix A E i C N × K E i are given as the steering vectors a D ( k ) and a E i ( k ) , respectively. Here, the n-th entries of a D ( k ) and a E i ( k ) are defined as 1 K D e j 2 π u D ( k ) x n + v D ( k ) y n and 1 K E i e j 2 π u E i ( k ) x n + v E i ( k ) y n , respectively, where x n and y n denote the location of the n-th antenna element in wavelengths, which can be arbitrary but fixed and known, and
u D ( k ) = sin ( θ D ( k ) ) cos ( φ D ( k ) ) , v D ( k ) = sin ( θ D ( k ) ) sin ( φ D ( k ) ) , u E i ( k ) = sin ( θ E i ( k ) ) cos ( φ E i ( k ) ) , v E i ( k ) = sin ( θ E i ( k ) ) sin ( φ E i ( k ) ) .
Here, ( θ D ( k ) , φ D ( k ) ) and ( θ E i ( k ) , φ E i ( k ) ) denote the AOD of the k-th multipath from D to the BS and from E i to the BS, respectively.
Considering the directional characteristics of mmWave channels and their poor scattering environments [23], we assume that ( u D ( 1 ) , v D ( 1 ) ) and ( u E i ( 1 ) , v E i ( 1 ) ) for dominant radio paths are within certain AOD regions S D and S E i in the horizontal and vertical (u-v) domain, respectively, and S D and S E = i = 1 I S E i are mutually exclusive. The AODs of the other multipaths, which are much weaker than the dominant multipath, are assumed to be unknown and distributed randomly in the u-v domain.

3. Secrecy Rate Maximization via Array Pattern Synthesis

Our approach to designing w with S D and S E is based on antenna pattern nulling to maximize the ratio between the minimum radiation to S D and the maximum radiation to S E . Considering only the dominant radio path, we approximate the objective function in (3) as σ 2 + β D ( 1 ) | a D ( 1 ) w | 2 max i σ 2 + β E i ( 1 ) | a E i ( 1 ) w | 2 . Note that a D ( 1 ) and a E i ( 1 ) can be determined only when ( u D ( 1 ) , v D ( 1 ) ) and ( u E i ( 1 ) , v E i ( 1 ) ) are given. Since only the partial CSI S D and S E are available, we assume that the average power gain for the dominant radio path to noise ratio is the same for D and E i (i.e., β D ( 1 ) σ 2 = β E i ( 1 ) σ 2 = 1 σ ˇ 2 ) and consider a worst-case scenario given as
max w min ( u , v ) S D σ ˇ 2 + w Γ ( u , v ) w max ( u , v ) S E σ ˇ 2 + w Γ ( u , v ) w , s . t . w w = P ,
where Γ ( u , v ) = a ( u , v ) a ( u , v ) and the n-th entry of the steering vector a ( u , v ) C N is given as e j 2 π u x n + v y n . Let us rewrite (6) as
max w min ( u , v ) S D w Γ ˜ ( u , v ) w max ( u , v ) S E w Γ ˜ ( u , v ) w , s . t . w w = P ,
where Γ ˜ ( u , v ) = I N + P σ ˇ 2 Γ ( u , v ) . Note that (7) can be rewritten as
max w , τ D , τ E τ D τ E s . t . w Γ ˜ ( u , v ) w τ D , ( u , v ) S D , w Γ ˜ ( u , v ) w τ E , ( u , v ) S E , w w = P .
It is obvious that (8) is equivalent to
max W , τ D , τ E , ρ ρ s . t . tr ( Γ ˜ ( u , v ) W ) τ D , ( u , v ) S D , tr ( Γ ˜ ( u , v ) W ) τ E , ( u , v ) S E , τ D ρ τ E = 0 , tr ( W ) = P , W 0 , rank ( W ) = 1 ,
where W = w w , tr(.) denotes the trace operation, and W 0 indicates that W is a Hermitian positive semidefinite matrix.
To solve (9), we first ignore the rank constraint based on semidefinite relaxation [24]. Then, the problem becomes quasi-convex. It is noteworthy that all the inequality constraints in (9) are convex [25]. We can solve this quasi-convex problem using the bisection technique [25,26]. In detail, let us first consider the following convex feasibility problem for any given value of ρ :
find W , τ D , τ E such that tr ( Γ ˜ ( u , v ) W ) τ D , ( u , v ) S D , tr ( Γ ˜ ( u , v ) W ) τ E , ( u , v ) S E , τ D ρ τ E = 0 , tr ( W ) = P , W 0 .
By using a semidefinite program solver such as SeDuMi [27] and Yalmip [28], we can check the feasibility of (10). The infeasibility of (10) indicates that the given ρ cannot be achieved, even though we ignored the rank constraint. Then, we conclude that the maximum value of ρ , denoted as ρ m a x , is less than the given ρ [26]. If (10) is feasible and the solution of (10), denoted as W 🟉 , τ D 🟉 , and τ E 🟉 , can be obtained, we should confirm that W 🟉 is of rank one because the rank constraint is ignored in our problem. When W 🟉 is of rank one, the given ρ can be achieved with the principal eigenvector of W 🟉 . In this case, we conclude that ρ m a x ρ .
If the rank of W 🟉 is higher than one, we have to determine whether any other rank-one solution to achieve the given ρ exists or not. Here, the penalty function method (PFM) in [7] is adopted. Using W 🟉 , τ D 🟉 , and τ E 🟉 , we first set W ( 0 ) = W 🟉 and perform the initialization step of the PFM. The initialization step of the PFM can provide W ( 0 ) with rank ( W ( 0 ) ) 1 . Then, W ( 0 ) is used as a starting point for the optimization step of the PFM. Both the initialization and optimization steps are iterative processes. At the j-th iteration, both steps solve the following semidefinite programming problem:
W ( j + 1 ) = argmin W ˜ tr ( W ˜ ) λ m a x ( W ( j ) ) tr ( w m a x ( j ) ( w m a x ( j ) ) ( W ˜ W ( j ) ) ) s . t . tr ( Γ ˜ ( u , v ) W ˜ ) τ D 🟉 , ( u , v ) S D , tr ( Γ ˜ ( u , v ) W ˜ ) τ E 🟉 , ( u , v ) S E , tr ( W ˜ ) = P , W ˜ 0 ,
where λ m a x ( W ( j ) ) and w m a x ( j ) are the maximum eigenvalue and the corresponding eigenvector of W ( j ) . If we obtain a rank-one solution via the PFM for the given ρ , we conclude that ρ m a x ρ . When a rank-one solution is not available even though the PFM is performed, we conclude ρ m a x < ρ .
Using the above results, we exploit the bisection technique with the initial interval [ L , U ] , which is assumed to include ρ m a x . At the midpoint of the interval ρ = L + U 2 , (10) is solved as we described above. If it is infeasible, we update the upper bound of the interval as U = ρ . If it is feasible, we confirm whether the rank of W 🟉 is one or not. The lower bound of the interval is updated as L = ρ when W 🟉 is of rank one. Otherwise, the PFM is performed whether a rank-one solution for the given ρ exists or not. If the solution provided by the PFM is of rank one, the lower bound of the interval is updated as L = ρ . Otherwise, we update U = ρ . The above process is performed again for the updated interval, until the width of the interval is small enough (i.e., U L ϵ b , where ϵ b is the desired accuracy). Since the initial interval is halved at each iteration, log 2 ( ( U L ) / ϵ b ) iterations are required [29]. As commented in [7], we also found that the above process can always provide a rank-one solution in our simulations.
For numerical implementations, the constraints tr ( Γ ˜ ( u , v ) W ) τ D , ( u , v ) S D and tr ( Γ ˜ ( u , v ) W ) τ E , ( u , v ) S E in (10) are approximated as
tr ( Γ ˜ ( u p , v p ) W ) τ D , p , tr ( Γ ˜ ( u q , v q ) W ) τ E , q ,
where ( u p , v p ) and ( u q , v q ) denote the sample points in S D and S E , respectively [30]. When the numbers of the sample points in S D and S E are given as Q D and Q E , we have to solve (10) with a matrix variable of size N × N , 2 nonnegative variables, and Q D + Q E + 2 linear constraints at each iteration of the bisection process. Interior point methods will take O N + 2 log ( 1 / ϵ ) iterations, where ϵ represents the solution accuracy at the algorithm’s termination, and each iteration requires at most O ( N + 2 ) 6 + ( Q D + Q E + 2 ) ( N + 2 ) 2 arithmetic operations [29]. Further, at each iteration of the PFM, we solve (11), which will take O N log ( 1 / ϵ ) iterations and each iteration requires at most O N 6 + ( Q D + Q E + 1 ) N 2 arithmetic operations [7].

4. Numerical Evaluation

In this section, we present numerical results to verify the secrecy rate performance of the proposed scheme. For simulation simplicity, we assume that S D is a circle in the u-v domain given as
S D = { ( u , v ) ; ( u u D ) 2 + ( v v D ) 2 < r D 2 } ,
where ( u D , v D ) and r D are the center and the radius of the circle, respectively. For each channel realization, ( u D ( 1 ) , v D ( 1 ) ) for a dominant path is randomly chosen within S D , while ( u D ( k ) , v D ( k ) ) with k = 2 , , K D are randomly chosen in the whole u-v domain. S E i is also assumed to be a circle in the u-v domain with a center of ( u E i , v E i ) and radius of r E i . ( u E i ( 1 ) , v E i ( 1 ) ) is randomly chosen within S E i , while ( u E i ( k ) , v E i ( k ) ) with k = 2 , , K E i are randomly chosen in the whole u-v domain. Note that the proposed scheme can be adopted for arbitrary shapes of S D and S E i .
In the following results, we fix P = 1 , r D = r E i = 0.1 , σ 2 = 10 3 , and K D = K E i = K . Without loss of generality, we set u D = v D = 0 and consider a UPA with N ˜ × N ˜ antenna elements (i.e., N = N ˜ 2 ), where each element is uniformly spaced by half a wavelength. The far field radiated by the planar array can be expressed as f ( u , v ) = n = 1 N r n ( u , v ) w n e j 2 π ( u x n + v y n ) [30], where r n ( u , v ) is the radiation pattern of the n-th antenna element. The n-th antenna element is fed by w n , which denotes the n-th entry of w . In our simulation, we assume isotropic antenna elements with r n ( u , v ) = 1 [30]. Let us refer to | f ( u , v ) | 2 as the beamforming gain of the antenna array.
Let us consider a scenario where I = 6 eavesdroppers exist in the network and each ( u E i , v E i ) is given as in Table 1. Here, we verify the validity of the proposed beamformer from the viewpoint of the beamforming gain of the planar array. For illustration purposes, we present the beamforming gain of the transmit beamformer obtained by the proposed scheme for this scenario when N ˜ = 8 in Figure 1. The interior of the black circle is S D , whereas the interior of the white circle denotes S E i . We found that the proposed beamformer provides 12.58 dB of the minimum beamforming gain in S D and 33.77 dB of the maximum beamforming gain in S E . From the simulation results, we found that the ratio between the minimum beamforming gain in S D and the maximum beamforming gain in S E increases with increasing N ˜ .
In Appendix A, we derived the transmit beamformer for global CSI. Further, to investigate the impact of imperfect CSI, we assumed that the imperfect channel coefficients h ^ D and h ^ E i are used instead of the exact channel coefficients h D and h E i , where h ^ D = h D + v D and h ^ E i = h E i + v E i , respectively. Here, each entry of v D and v E i is assumed to be independent and identically distributed complex Gaussian with zero mean and ζ 2 variance. We computed the transmit beamformer as in the Appendix A by replacing h D and h E i with the imperfect CSI h ^ D and h ^ E i , respectively.
In Figure 2, we compare the secrecy rate achieved by the proposed scheme and that with imperfect CSI for different values of N ˜ . We set K = 3 and consider that β D ( 1 ) = β E i ( 1 ) = 1 , β D ( 2 ) = β E i ( 2 ) = 0.1 , and β D ( 3 ) = β E i ( 3 ) = 0.0316 , which indicate that the second and third multipaths are 10 dB and 15 dB weaker than the dominant multipath, respectively [23]. ζ 2 = 0 indicates the exact CSI. As expected, the secrecy rate for imperfect CSI decreases with an increase of ζ 2 . Note that the secrecy rate performance of the proposed scheme is independent of ζ 2 . It is observed that ζ 2 at which the secrecy rate with imperfect CSI is better than that of the proposed scheme decreases as N ˜ increases. This indicates that the proposed scheme is efficient when the size of the antenna array is large and the channel estimation error becomes critical.
As described above, we consider that only the dominant path is within the given AOD region and the other multipaths are randomly distributed. It is expected that the other multipaths with AODs outside the given AOD region degrade the secrecy rate performance of the proposed scheme. In order to investigate the impact of the other multipaths, we evaluate the secrecy rate of the proposed scheme for different numbers of multipaths as shown in Figure 3. For K = 1 , we consider only the dominant path with β D ( 1 ) = β E i ( 1 ) = 1 , whose AOD is within the given AOD region. Note that K = 1 is optimal for the proposed scheme. For K = 2 , the second path is added with β D ( 2 ) = β E i ( 2 ) = 0.1 , which is 10 dB weaker than the dominant path. For K = 3 , we use the same setting for β D ( k ) and β E i ( k ) as in Figure 2. When K 4 , we add the multipaths which are 15 dB weaker than the dominant path. As expected, the secrecy rate performance of the proposed scheme degrades with an increase of K. In particular, the gap between the secrecy rates with K = 1 and 2 is remarkable. For N ˜ = 8 , it is found that the secrecy rate with K = 2 is about 76% of that with K = 1 . However, the secrecy rate is shown to decrease slightly when K 2 .
Figure 3 also presents the secrecy rate achieved by the proposed scheme in a colluding scenario. The rate at the colluding eavesdroppers can be given as R E = log 2 1 + | | H E w | | 2 σ 2 , where H E = [ h E 1 T h E 2 T h E I T ] T [3] and the achievable secrecy rate is computed as R = max R D R E , 0 . Since the proposed beamformer minimizes the beamforming gains to all eavesdroppers as shown in Figure 1, the proposed scheme is also effective in a colluding scenario. In Figure 3, the secrecy rate in a colluding scenario is observed to be worse than that in a non-colluding scenario. However, it is noteworthy that the gap between them reduces as N ˜ increases.

5. Conclusions

In this paper, we proposed a transmit beamfomer design scheme exploiting partial CSI for physical layer security in mmWave channels. Assuming that the AOD region of each node is available, we designed a transmit beamformer to maximize the ratios between the minimum beamforming gain to the AOD region of the destination and the maximum beamforming gain to the union of the AOD regions of the eavesdroppers. In the numerical results, we compared the secrecy rate achieved by the proposed scheme and that with imperfect CSI to verify the efficiency of the proposed scheme.

Author Contributions

Conceptualization, J.-H.L.; methodology, J.-H.L., J.C. and W.-H.L.; software, J.-H.L.; validation, J.C., W.-H.L. and J.S.; writing—original draft preparation, J.-H.L. and J.S.; writing—review and editing, J.-H.L. and J.S.

Funding

This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education(NRF-2016R1D1A1B03930599).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Let us rewrite the optimization problem in (3) to maximize the secrecy rate with global CSI as
max w ˜ w ˜ R ˜ D w ˜ max i w ˜ R ˜ E i w ˜ , s . t . w ˜ w ˜ = 1 ,
where w ˜ = 1 P w , R ˜ D = σ 2 P I + h D h D , and R ˜ E i = σ 2 P I + h E i h E i . Note that (A1) is equivalent to
max W ˜ tr R ˜ D W ˜ max i tr R ˜ E i W ˜ s . t . tr W ˜ = 1 , W 0 , rank W ˜ = 1 .
Further, (A2) can be rewritten as
max W ˜ , τ D , τ E τ D τ E s . t . tr R ˜ D W ˜ = τ D , tr R ˜ E i W ˜ τ E , i , tr W ˜ = 1 , W 0 , rank W ˜ = 1 .
Note that (A3) is equivalent to
max W ˜ , ρ , τ D , τ E ρ s . t . tr ( R ˜ D W ˜ ) = τ D , tr ( R ˜ E i W ˜ ) τ E , i , ρ τ D = τ E , tr ( W ˜ ) = 1 , W ˜ 0 , rank ( W ˜ ) = 1 .
As in Section 3, we exploit the semidefinite relaxation and use the bisection technique with the PFM. The feasibility problem for this case is given as
find W ˜ , τ D , τ E such that tr ( R ˜ D W ˜ ) = τ D , tr ( R ˜ E i W ˜ ) τ E , i , ρ τ D = τ E , tr ( W ˜ ) = 1 , W ˜ 0 .

References

  1. Shiu, Y.S.; Chang, S.Y.; Wu, H.C.; Huang, S.-H.; Chen, H.-H. Physical layer security in wireless networks: A tutorial. IEEE Wirel. Commun. 2011, 18, 66–74. [Google Scholar] [CrossRef]
  2. Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [Google Scholar] [CrossRef]
  3. Khisti, A.; Wornell, G.W. Secure transmission with multiple antennas I: The MISOME wiretap channel. IEEE Trans. Inf. Theory 2010, 56, 3088–3104. [Google Scholar] [CrossRef]
  4. Khisti, A.; Wornell, G.W. Secure transmission with multiple antennas II: The MIMOME wiretap channel. IEEE Trans. Inf. Theory 2010, 56, 5515–5532. [Google Scholar] [CrossRef]
  5. Awan, Z.H.; Zaidi, A.; Vandendorpe, L. Secure communication over parallel relay channel. IEEE Trans. Inf. Forensics Secur. 2012, 7, 359–371. [Google Scholar] [CrossRef]
  6. Li, J.; Petropulu, A.P.; Weber, S. On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Signal Process. 2011, 59, 4985–4997. [Google Scholar] [CrossRef]
  7. Wang, H.-M.; Luo, M.; Yin, Q.; Xia, X.-G. Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks. IEEE Trans. Inf. Forensics Secur. 2013, 8, 2007–2020. [Google Scholar] [CrossRef]
  8. Lee, J.-H. Optimal power allocation for physical layer security in multi-hop DF relay networks. IEEE Trans. Wirel. Commun. 2016, 15, 28–38. [Google Scholar] [CrossRef]
  9. Zaidi, A.; Vandendorpe, L. Coding schemes for relay-assisted information embedding. IEEE Trans. Inf. Forensics Secur. 2009, 4, 70–85. [Google Scholar] [CrossRef]
  10. Zaidi, A.; Awan, Z.H.; Shamai, S.; Vandendorpe, L. Secure degrees of freedom of MIMO X-channels with output feedback and delayed CSIT. IEEE Trans. Inf. Forensics Secur. 2013, 8, 1760–1774. [Google Scholar] [CrossRef]
  11. Awan, Z.H.; Zaidi, A.; Sezgin, A. On SDoF of multi-receiver wiretap channel with alternating CSIT. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1780–1795. [Google Scholar] [CrossRef]
  12. He, B.; Zhou, X.; Abhayapala, T.D. Wireless physical layer security with imperfect channel state information: A survey. arXiv 2013, arXiv:1307.4146v2. [Google Scholar]
  13. Cumanan, K.; Xing, H.; Xu, P.; Zheng, G.; Dai, X.; Nallanathan, A.; Ding, Z.; Karagiannidis, G.K. Physical layer security jamming: Theoretical limits and practical designs in wireless networks. IEEE Access 2017, 5, 3603–3611. [Google Scholar] [CrossRef]
  14. Goel, S.; Negi, R. Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 2008, 7, 2180–2189. [Google Scholar] [CrossRef]
  15. Huang, J.; Swindlehurst, A.L. Robust secure transmission in MISO channels based on worst-case optimization. IEEE Trans. Signal Process. 2012, 60, 1696–1707. [Google Scholar] [CrossRef]
  16. Mukherjee, A.; Swindlehurst, A.L. Robust beamforming for security in MIMO wiretap channels with imperfect CSI. IEEE Trans. Signal Process. 2011, 59, 351–361. [Google Scholar] [CrossRef]
  17. Schaefer, R.F.; Loyka, S. The secrecy capacity of compound Gaussian MIMO wiretap channels. IEEE Trans. Inf. Theory 2015, 61, 5535–5552. [Google Scholar] [CrossRef]
  18. Fuchs, B. Application of convex relaxation to array synthesis problems. IEEE Trans. Antennas Propag. 2014, 62, 634–640. [Google Scholar] [CrossRef]
  19. Lee, J.-H.; Song, J. Beamforming via array pattern synthesis for millimeter wave NOMA downlink transmission. IEEE Trans. Veh. Technol. 2018, 67, 12363–12367. [Google Scholar] [CrossRef]
  20. Wang, W.; Teh, K.C.; Li, K.H. Secrecy throughput maximization for MISO multi-eavesdropper wiretap channels. IEEE Trans. Inf. Forensics Secur. 2017, 12, 505–515. [Google Scholar] [CrossRef]
  21. Cumanan, K.; Ding, Z.; Xu, M.; Poor, H.V. Secrecy rate optimization for secure multicast communications. IEEE J. Sel. Top. Signal Process. 2016, 10, 1417–1432. [Google Scholar] [CrossRef]
  22. Zheng, K.; Ou, S.; Yin, X. Massive MIMO channel models: A survey. Int. J. Antennas Propag. 2014, 2014, 848071. [Google Scholar] [CrossRef]
  23. Muhi-Eldeen, Z.; Ivrissimtzis, L.; Al-Nuaimi, M. Modelling and measurements of millimeter wavelength propagation in urban environments. IET Microw. Antennas Propag. 2010, 4, 1300–1309. [Google Scholar] [CrossRef]
  24. Luo, Z.; Ma, W.; So, A.; Ye, Y.; Zhang, S. Semidefinite relaxation of quadratic optimization problems. IEEE Signal Process. Mag. 2010, 27, 20–34. [Google Scholar] [CrossRef]
  25. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  26. Havary-Nassab, V.; Shahbazpanahi, S.; Grami, A.; Luo, Z. Distributed beamforming for relay networks based on second-order statistics of the channel state information. IEEE Trans. Signal Process. 2008, 56, 4306–4316. [Google Scholar] [CrossRef]
  27. Sturm, J.F. Using SeDuMi 1.02, a Matlab toolbox for optimization over symmetric cones. Optim. Methods Softw. 1999, 11–12, 625–653. [Google Scholar] [CrossRef]
  28. Lofberg, J. YALMIP: A toolbox for modeling and optimization in MATLAB. In Proceedings of the CACSD Conference, Taipei, Taiwan, 2–4 September 2004. [Google Scholar]
  29. Karipidis, E.; Sidiropoulos, N.D.; Luo, Z.-Q. Quality of service and max-min fair transmit beamforming to multiple cochannel multicast groups. IEEE Trans. Signal Process. 2008, 56, 1268–1279. [Google Scholar] [CrossRef]
  30. Fuchs, B.; Skrivervik, A.; Mosig, J.R. Synthesis of uniform amplitude focused beam arrays. IEEE Antennas Wirel. Propag. Lett. 2012, 11, 1178–1181. [Google Scholar] [CrossRef]
Figure 1. Beamforming gain of the proposed beamformer when N ˜ = 8 .
Figure 1. Beamforming gain of the proposed beamformer when N ˜ = 8 .
Electronics 08 00745 g001
Figure 2. Comparison of secrecy rates as a function of ζ 2 .
Figure 2. Comparison of secrecy rates as a function of ζ 2 .
Electronics 08 00745 g002
Figure 3. Secrecy rate comparison of the proposed scheme in non-colluding and colluding scenarios as a function of K.
Figure 3. Secrecy rate comparison of the proposed scheme in non-colluding and colluding scenarios as a function of K.
Electronics 08 00745 g003
Table 1. The center of the circle for E in the u-v domain.
Table 1. The center of the circle for E in the u-v domain.
i ( u E i , v E i )
1(0.3,0.7)
2(−0.4,−0.5)
3(0.5,−0.2)
4(−0.8,0.3)
5(0.3,−0.3)
6(0.9,0.1)

Share and Cite

MDPI and ACS Style

Lee, J.-H.; Choi, J.; Lee, W.-H.; Song, J. Exploiting Array Pattern Synthesis for Physical Layer Security in Millimeter Wave Channels. Electronics 2019, 8, 745. https://doi.org/10.3390/electronics8070745

AMA Style

Lee J-H, Choi J, Lee W-H, Song J. Exploiting Array Pattern Synthesis for Physical Layer Security in Millimeter Wave Channels. Electronics. 2019; 8(7):745. https://doi.org/10.3390/electronics8070745

Chicago/Turabian Style

Lee, Jong-Ho, Jeongsik Choi, Woong-Hee Lee, and Jiho Song. 2019. "Exploiting Array Pattern Synthesis for Physical Layer Security in Millimeter Wave Channels" Electronics 8, no. 7: 745. https://doi.org/10.3390/electronics8070745

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop