Acta Metallurgica Sinica(English letters) ›› 2015, Vol. 22 ›› Issue (4): 33-41.doi: 10.1016/S1005-8885(15)60665-3

• Security • Previous Articles     Next Articles

Two security transmission realization schemes for MIMO Gaussian wiretap channel with one helper

Xie Xianzhong, Zhang Xiujuan, Lei Weijia, Ma Bin   

  1. 1. School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China 2. Institute of Personal Communications, Chongqing University of Posts and Telecommunications, Chongqing 400065, China 3. College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
  • Received:2015-01-13 Revised:2015-03-29 Online:2015-08-28 Published:2015-08-28
  • Contact: Xiu-Juan ZHANG E-mail:zhangxjcqupt@163.com
  • Supported by:
    the National Natural Science Foundation of China (61271259, 61471076, 61301123), the Research Project of Chongqing Education Commission (KJ120501, KJ120502), the Program for Changjiang Scholars and Innovative Research Team in University (IRT1299), and the Special Fund of Chongqing Key Laboratory (CSTC).

Abstract: This paper presents noncooperative and cooperative security transmission schemes for multiple-input multiple-output (MIMO) Gaussian wiretap channel with one helper for antenna configuration with arbitrary number. In these two schemes, the transmitter performs beamforming based on generalized singular value decomposition (GSVD), where an appropriate power allocation algorithm is utilized. Meanwhile, the helper sends artificial noise for higher secrecy rate. However, the transmission strategies for the artificial noise are different in the two schemes. In the first scheme, the helper adopts GSVD-based beamforming. Nevertheless, in this scheme, the impact of the artificial noise on the information signal at the receiver is not considered. To solve the problem, the helper performs space projection (SP)-based beamforming in the second scheme. In this scheme, suboptimal weighting factors are introduced to reduce the computational complexity, which can be adapted to the change of the channel quality. Theoretical analysis for the performance of the two proposed schemes is then given. Furthermore, simulation results indicate that the two presented schemes perform better than the existed schemes without helper. They also show that in the second scheme the suboptimal parameter setting is better than equal parameter setting and quite close to optimal parameter setting.

Key words: physical layer security, GSVD, space projection, power allocation, weighting factor, secrecy rate

CLC Number: