MIMO: Multiple Input Multiple Output Technology for Physical-Layer Security

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Microwave and Wireless Communications".

Deadline for manuscript submissions: closed (10 January 2023) | Viewed by 5439

Special Issue Editors


E-Mail Website
Guest Editor
Div. of Electronics Eng., Jeonbuk National University, Jeonju, Korea
Interests: error correction coding theory; coded-MIMO; soft iterative detection; satellite communications; physical layer security transmissions
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Information Science and Technology, Donghua University, Shanghai, China
Interests: error correction coding theory; MIMO; quantum key distribution
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The multiple input multiple output (MIMO) scheme is one of the most important technologies in modern wireless communication systems, including wireless LAN and 4G to beyond 5G systems. Most of the physical-layer technologies for MIMO systems have been focused on enhancing the error performance and spectral efficiency of the system, rather than on securing privacy. Dramatically increasing traffic demands, especially on machine-type communications, requires more secure communications for privacy protection. For this reason, there have been a number of studies on MIMO transmissions for physical-layer security (PLS), from signal design to performance analysis. Unlike traditional security-guaranteeing techniques which rely heavily on cryptographic approaches at the upper layers of the protocol stack, PLS benefits from the randomness of the wireless channel, which provides better immunity and prevents different attacks. However, our understanding of this concept still has many fundamental problems and is yet to be investigated in sufficient depth.

This Special Issue aims to collect new developments and methodologies, best practices and applications of MIMO technologies for PLS. We welcome submissions which provide the community with the most recent advancements on all aspects of MIMO transmission technologies for PLS, as detailed in the list of keywords below, though other relevant submissions are also welcome.

Prof. Dr. Sooyoung Kim
Prof. Dr. Xueqin Jiang
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • multiple input multiple output
  • physical-layer security
  • wiretap channel
  • secrecy rate
  • security performance

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

18 pages, 640 KiB  
Article
Joint Beamforming and Trajectory Design for Aerial Intelligent Reflecting Surface-Aided Secure Transmission
by Yanping Wang, Jingping Qiao and Chuanting Zhang
Electronics 2022, 11(18), 2802; https://doi.org/10.3390/electronics11182802 - 06 Sep 2022
Viewed by 1546
Abstract
This paper studies the secure transmission challenge confronted with future communication systems. In our considered model, the confidential communication between legitimate users is strengthened by an aerial intelligent reflecting surface (AIRS) deployed on aerial platforms such as an unmanned aerial vehicle (UAV). The [...] Read more.
This paper studies the secure transmission challenge confronted with future communication systems. In our considered model, the confidential communication between legitimate users is strengthened by an aerial intelligent reflecting surface (AIRS) deployed on aerial platforms such as an unmanned aerial vehicle (UAV). The average secrecy rate for all time slots is first investigated to improve information security during AIRS flights. Then, the transmit beamforming, phase-shifting matrix, and trajectory of AIRS are jointly designed, aiming to maximize the average secrecy rate performance between legitimate users. On account of the non-convexity of the formulated objective function and the coupled three key variables, we resort to an alternative strategy that converts the original objective into three sub-problems and solves them recursively. In particular, the transmit beamforming is designed on the basis of the generalized eigenvalue optimization method, and the closed-form solution is derived. For the AIRS-related optimization, a Minorization-Maximization (MM)-based algorithm and a deep deterministic policy gradient (DDPG)-based method are proposed to derive the solutions of phase shift matrix and trajectory, respectively. Simulation results show that AIRS assistance can obtain nearly twice the secrecy performance of terrestrial intelligent reflecting surface (TIRS) systems. Full article
Show Figures

Figure 1

13 pages, 1183 KiB  
Article
Efficient MIMO Signal Predistortion for Secrecy-Enhancing
by Hyein Lee, Satya Chan and Sooyoung Kim
Electronics 2022, 11(9), 1425; https://doi.org/10.3390/electronics11091425 - 28 Apr 2022
Cited by 3 | Viewed by 1216
Abstract
Massive machine type communications or internet of things (IoT) over wireless systems have invoked attention in terms of security problems, especially for multi-input multi-output (MIMO) schemes. In this paper, we propose efficient physical layer security (PLS) enhancing methods for space-time block coding (STBC), [...] Read more.
Massive machine type communications or internet of things (IoT) over wireless systems have invoked attention in terms of security problems, especially for multi-input multi-output (MIMO) schemes. In this paper, we propose efficient physical layer security (PLS) enhancing methods for space-time block coding (STBC), as well as spatial multiplexing (SM) schemes. The proposed methods pre-distort the transmit signals by using the phase information of the legitimate MIMO channel, and, as a result, the illegal eavesdropper cannot extract any information. The proposed predistortion for the STBC schemes is done so that the channel matrix at the receiver is a real-valued one, which results in full-rate and full-diversity gain for more than two transmit antennae. Therefore, compared to the conventional schemes, the proposed scheme eventually leads to the higher performance gain and lower detection complexity in addition to the high security protection. By extending the principle of the proposed method for STBC, a predistortion scheme is also proposed for SM by using the phase information of the column space of the channel matrix. The simulation results investigated in this paper reveal that the proposed methods can achieve enhanced error rate performances, as well as high security protection. Full article
Show Figures

Figure 1

15 pages, 1815 KiB  
Article
Secrecy Enhancement for SSK-Based Visible Light Communication Systems
by Wangzhaoqi Xie, Bao Li, Yuyang Peng, Han Zhu, Fawaz AL-Hazemi and Mohammad Meraj Mirza
Electronics 2022, 11(7), 1150; https://doi.org/10.3390/electronics11071150 - 06 Apr 2022
Cited by 2 | Viewed by 1628
Abstract
Visible light communication (VLC) is a technology that uses unlicensed light spectrum resources and high spatial reuse rates for communication. Because it does not occupy any resource allocation in wireless communication, it has fully alleviated the problem of spectrum scarcity in radio frequency [...] Read more.
Visible light communication (VLC) is a technology that uses unlicensed light spectrum resources and high spatial reuse rates for communication. Because it does not occupy any resource allocation in wireless communication, it has fully alleviated the problem of spectrum scarcity in radio frequency (RF) communication and gradually become a new development direction. However, owing to the inherent broadcasting nature of the VLC channel, the VLC link is vulnerable to eavesdropping by unexpected or unauthorized users in spacious public places. Therefore, enhancing the security of the VLC system has attracted extensive attention. This paper studies the security optimization scheme of the VLC system based on the space shift keying (SSK) technology in the free space optical environment called the SSK-VLC system. The antenna selection (AS) technology and artificial noise (AN) cancellation method are adopted to enhance the confidentiality of the SSK-VLC system. In this paper, we presume that the SSK-VLC system includes three parts: a transmitter containing multiple light-emitting diodes, a legitimate receiver, and an eavesdropper, respectively. By using the designed AS and AN method, the transmitted valid information can be demodulated at the legitimate receiver, and at the same time, the received information by the eavesdropper will be disturbed. The simulation results prove that the proposed optimization scheme can further improve the security performance, including the secrecy rate (SR) and the bit error ratio (BER), compared with the traditional SSK-VLC scheme. Full article
Show Figures

Figure 1

Back to TopTop