Interference alignment (IA) is a technique used to reduce the dimension of the interference, where consequently the multiplexing rate is increased. In the 2-user X channel, combining IA with space-time block codes increases the diversity gain. These gains are achieved with the cost of leaked information at unintended receivers, where this leaked information can be used to decode other receiver’s signals. In this paper, we consider each of the two two-antenna receivers as an eavesdropper with 1 or 2 additional eavesdropping antennas. As such, we suggest receiver structures to answer the question: “Is the leaked information sufficient to properly decode the unintended signals?” besides quantifying the leaked information in terms of secrecy sum rates (SSR). Interestingly, we show that the SSR is negative, indicating that the quality of the eavesdropped signals is superior to that of the intended signals. To assure confidentiality, we propose an interleaved multiple rotation-based transformation scheme that neutralizes any a priori knowledge about the structure of the eavesdropped information and rotates the transmitted symbols using orthogonal matrices, preserving both the power and the distance between symbols.
1. Introduction
In wireless communications systems, interference plays a major role in defining the achievable performance and capacity [1]. In conventional receivers, in multiuser scenarios, the interference is either ignored, hence considered as an additional noise, or jointly decoded via employing successive interference cancellation (SIC) detectors [2–4]. In both cases, the dimensions of the interference remain the same, leading to degraded performance and diversity gain in the first case, while powerful algorithms should be employed in the case of SIC algorithms so as to avoid degradation in the performance due to interference.
Interference alignment is a transmission technique used to reduce the dimensions of the interference while maintaining the useful signals discernible at the intended receivers. This is achievable by precoding the transmitter signals such that the interference is aligned at unintended receivers [5]. As such, interference is removed at the intended receivers using simple mathematical operations leading to an interference-free system, where appropriate decoding algorithms can then be used to decode the useful signals. In [5], Jafar and Shamai proposed a linear alignment algorithm for the two-user X channel, which achieves the maximum data rate of (nT×4/3) symbols/channel use and a diversity gain of 1, with nT as the number of transmit antennas.
In addition to the multiplexing gain, quantified by the unit symbols/channel use, the diversity gain is an important measure of the system performance. When the channel is in deep fading, systems with unity diversity gain suffer from low signal-to-noise ratio (SNR) at the receiver side, leading to degradation in the bit-error rate (BER). Several diversity techniques have been proposed in the literature to explore further diversity gain [6–8]. In [9], a technique that combines interference alignment in X channel and Alamouti diversity scheme with two transmit antennas has been proposed to achieve the maximum multiplexing gain of (nT×4/3=8/3) and the full diversity gain of 2, which is equal to the number of antennas at each of the four nodes. Furthermore, the proposed scheme inherits the space-time orthogonality of the Alamouti algorithm, and hence a simple linear receiver, that avoids computationally complex matrix inversion is required to achieve the aforementioned gains.
In analogy to other multiuser communication systems with interuser interference [10–12], keeping confidentiality arises as one of the main challenges in the two-user X channel system with interference alignment. In such a system, each receiver can be seen as an internal eavesdropper that, besides decoding its intended symbols, it uses the leaked information to decode other receiver’s intended symbols. The accuracy of decoding the unintended symbols depends on the number of additional spatial resources available at the eavesdropper.
In [13], the eavesdropper is an external agent and the system is modeled as a wiretap channel. However, in the X-channel with interference alignment system considered in this paper, the eavesdropper is the other intended receiver in the X-channel system. While in [13] it is possible to design the precoding matrices in order to deprive the eavesdropper of the capability of decoding the unintended symbols, and it is impossible to do so in the case of the X-channel system since both transmitters are employing joint precoding as will be explained later. We conclude therefore that the work introduced in [13], though very solid, cannot be applied to the case of the X-channel with interference alignment.
Another related work was introduced in [14], where authors proposed a secrecy algorithm which can be only applied in time-division duplex (TDD) systems because authors make use of the channel reciprocity principle. Another shortcoming of the proposed algorithm in [14] is that it is mainly based on the received signal strength indication (RSSI) which is inaccurate and insecure. The RSSI of users that have totally independent channels might be the same especially in indoor pico- or microcells scenarios, where they are so common in the long-term evolution (LTE) system. The drawbacks of using the RSSI in communication systems are outlined in [15] based on experimental study.
The merits of this paper are summarized as follows:
Unlike in conventional works [11, 12] where only the amount of leaked information is examined and therefore is given in terms of secrecy sum rate (SSR) values, we go beyond this first stage by answering the question: “Is the leaked information sufficient to decode the unintended signals?” To this end, we investigate the receiver structures in the case of a single and two additional eavesdropping antennas. The BER performance is then evaluated for both the intended and unintended signals.
Based on the obtained receiver structures, the mutual information and the SSRs are derived taking into consideration the information used in the decoding stage.
To render useless the leaked information about other receiver’s signals, we propose an interleaved multiple rotation-based transformation (IMRBT) algorithm that consists of two stages, namely, interleaving stage and rotation stage. In the interleaving stage, symbols are interleaved so that any a priori information about the structure of the eavesdropped signals becomes useless. Then, interleaved symbols are rotated using orthonormal matrices such that both the power and the distance between symbols in the Euclidean space are kept intact.
The rest of the paper is organized as follows. In Section 2, we introduce the system model and review related works. In Section 3, we investigate the decoding capabilities of the unintended signals at the eavesdropper, in the cases of no additional, single additional, and two additional eavesdropping antennas. In Section 4, we derive the SSRs of the intended symbols and the unintended symbols. We introduce the proposed IMRBT scheme in Section 5 and present simulation results in Section 6. Finally, we draw conclusions in Section 7.
We briefly introduce the notations used in this paper. We employ boldface uppercase letters for matrices and boldface lowercase letters for vectors. The superscripts (·)t, (·)H, and (·)∗ denote transpose, conjugate transpose, and conjugate, respectively. CN(μ,σ2) is a circular symmetric complex Gaussian random variable with mean μ and variance σ2. Finally, prob(x) is the probability of x.
2. System Model and Previous Work2.1. System Model
Consider a two-user X channel with eavesdropping as depicted in Figure 1. Each transmitter has independent and confidential symbols for each of the receivers. These symbols are drawn independently from a finite modulation set Ω. Transmitter 1 has s11=[s111s112]t and s12=[s121s122]t intended for receiver 1 and receiver 2, respectively. In sijk, the superscript k denotes the index of the symbol, the first subscript i denotes the index of the transmitter, and the second subscript j denotes the index of the intended receiver. Likewise, transmitter 2 has s21=[s211s212]t and s22=[s221s222]t intended for receiver 1 and receiver 2, respectively. Vectors sij, for i,j=1,2, are encoded using the space-time block coder (STBC) block to generate the matrices Sij, for i,j=1,2. Finally, encoded symbols are beamformed and linearly combined to generate T×2 block codes Xi, for i=1,2, with T=3 denoting the number of channel uses. In the deployed scenario, each receiver is equipped with nR=2 legal receive antennas and nE eavesdropping receive antennas. To denote the channels between the transmitters and the legal receive antennas, we use H, G, A, and B to denote the 2×2 matrices coupling transmitter 1 and receiver 1, transmitter 2 and receiver 1, transmitter 1 and receiver 2, and transmitter 2 and receiver 2, respectively. While employing nR receive antennas at each receiver is sufficient to recover its intended symbols, extra eavesdropping antennas are required to leak more information about other receiver’s symbols, so that efficient decoding is achieved. To denote the channels between the transmitters and the eavesdropping receive antennas, we use K, M, L, and Q to denote the channels between transmitter 1 and receiver 1, transmitter 2 and receiver 1, transmitter 1 and receiver 2, and transmitter 2 and receiver 2, respectively. The elements in the channel matrices in Figure 1 are independently and identically distributed (i.i.d.) circular Gaussian random variables, CN(0,1). These matrices were pseudorandomly generated following the aforementioned characteristics. T×2 signal matrices received at the legal antennas of receiver 1 and receiver 2, respectively, are given by(1)Y1=X1H+X2G+W1,Y2=X1A+X2B+W2.Similarly, the received signal matrices at the eavesdropping antennas of receiver 1 and receiver 2 are given by(2)Z1=X1K+X2L+N1,Z2=X1M+X2Q+N2.Entries in the additive white Gaussian noise (AWGN) matrices, W1, W2, N1, and N2, are i.i.d. CN(0,σn2), where σn2=2/(3ρ) and ρ denotes the SNR.
System model of a 2-user X channel with eavesdropping.
2.2. Review of Li-Jafarkhani-Jafar (LJJ) Algorithm
To achieve a diversity order of 2, while still achieving the maximum multiplexing rate of nT×4/3=8/3 symbols per channel use, LJJ algorithm has been proposed in [9]. In this scheme, Alamouti coding was independently performed on each couple of symbols intended for each of two receivers. That is, at each coding instant, four symbols, two intended for receiver 1 and two intended for receiver 2, are independently encoded and then linearly combined at each transmitter. These symbols are transmitted over T=3 channel uses, leading to a sum rate of 8/3 symbols per channel use.
2.2.1. Transmitter Structure
The transmitted 3×2 block codes from transmitter 1 and transmitter 2 are designed, respectively, as(3)X1=S11V11+S12V12,X2=S21V21+S22V22,where(4)Si1=si11si12-si12∗si11∗00,Si2=00-si22∗si21∗si21si22,fori=1,2,where sijk is the kth symbol transmitted from the ith transmitter to the jth receiver, with E[sijsij∗]=1, for i,j=1,2. The symbols s11k and s21k are intended for receiver 1, and hence they become interference at receiver 2. The 2×2 beamforming matrices Vi1, for i=1,2, assure that the interference symbols s11k and s21k are aligned at receiver 2. Likewise, the symbols s12k and s22k, which are intended for receiver 2, are precoded using Vi2, for i=1,2, so that they are aligned at receiver 1. To fulfill these conditions, the beamforming matrices are given by(5)V11=αAA-1,V12=αHH-1,V21=αBB-1,V22=αGG-1,where the real scalars αA,αH,αB, and αG satisfy the power constraint tr(VijVijH)=1, and hence we have αR=1/tr(R-1R-1H).
2.2.2. Receiver Structure
Based on Figure 1, the received 3×2 signal matrices at receiver 1 and receiver 2, respectively, are written as(6)Y1=S11V11H︸H~+S21V21G︸G~+αHS12+αGS22︸AI+W1,(7)Y2=S12V12A︸A~+S22V22B︸B~+αAS11+αBS21︸AI+W2.In (6) and (7), AI stands for aligned interference. Also, Y1, Y2, W1, and W2∈C3×2. The matrices H~, G~, A~, and B~∈C2×2 are the effective channels of the intended symbols. Let yk,ij and wk,ij be the (i,j)th elements of Yk and Wk, respectively, and let h~ij, g~ij, a~ij, and b~ij be the (i,j)th elements of the matrices H~, G~, A~, and B~, respectively, and then (6) and (7) can be rewritten as(8)y~1=h~11h~21g~11g~2100h~21∗-h~11∗g~21∗-g~11∗0-1000010h~12h~22g~12g~2200h~22∗-h~12∗g~22∗-g~12∗10000001s111s112s211s212I1I2+w~1,(9)y~2=000010a~21∗-a~11∗b~21∗-b~11∗0-1a~11a~21b~11b~2100000001a~22∗-a~12∗b~22∗-b~12∗10h~12a~22b~12b~2200s121s122s221s222I3I4+w~2,where(10)y~i=yi,11yi,21∗yi,31yi,12yi,22∗yi,32,w~i=wi,11wi,21∗wi,31wi,12wi,22∗wi,32.In (8), I1=(αHs121+αGs221) and I2=(αHs122+αGs222), while in (9), I3=(αAs111+αBs211) and I4=(αAs112+αBs212).
Each receiver recovers its intended symbols using interference cancellation (IC) that comprises two stages, which are explained in the following two subsections. Without loss of generality and due to space limits, we consider the decoding at receiver 1, where the performance at receiver 2 is identical since the system is symmetric.
Stage 1 (removal of the aligned interference).
From (8), the channel associated with the intended data symbols has an Alamouti structure. As such, symbols can be recovered using Alamouti decoder. At first, the aligned interference, I1 and I2, is simply removed by adding y~12 to y~16 and subtracting y~13 from y~15, where y~1j is the jth element of y~1. The resulting system is rewritten as(11)y^1y^2=H^1H^2s11+G^1G^2s21+w^1w^2,where (12)H^i=h~1ih~2ih~2i∗-h~1i∗,G^i=g~1ig~2ig~2i∗-g~1i∗fori=1,2,y^1=y~11y~12+y~16t,y^2=y~14y~15-y~13t,w^1=w~11w~12+w~16t,w^2=w~14w~15-w~13t,with H^i and G^i having Alamouti structure.
Stage 2 (decoupling symbols from different transmitters).
All the matrices in (11) have the Alamouti structure and operations on them are complete; that is, the result of multiplying two matrices having the Alamouti structure is also an Alamouti matrix. Also, since matrices having Alamouti structure are orthogonal, their Gramian matrices are weighted identity matrices, with the weight being the matrix Frobenius norm. Therefore, when y^1 is multiplied by G^1H/G^12, the resulting channel matrix of s21 becomes the identity matrix. Also, when y^2 is multiplied by G^2H/G^22, the resulting channel matrix of s21 becomes the identity matrix as well. When the second equation is subtracted from the first, the resulting equation becomes a function of only s11 which can be decoded using a linear receiver. Mathematically, symbols s111 and s112 are decoupled from s211 and s212 as follows:(13)G^1HG^12y^1-G^2HG^22y^2︸y˘1=G^1HG^12H^1-G^2HG^22H^2︸H˘1s11+G^1HG^12w^1-G^2HG^22w^2︸w˘1.The matrix H˘1 still has the Alamouti structure. Therefore, the following linear decoding is still applicable:(14)s~11=2·H˘1HH˘12y˘1=s11+2·H˘1HH˘12w˘1,where the demodulated symbols s^11=Q(s~11), with Q(·) as the demodulation function. The symbols s211 and s212 can be decoupled by employing the same method due to the system symmetry.
3. Eavesdropping and Decoding Capabilities3.1. Case 1: No Eavesdropping Antennas
Let receivers 1 and 2 act as eavesdroppers, where, in addition to decoding their intended data symbols, they try to decode the aligned interference, that is, other receiver’s symbols. Again, without loss of generality, we focus on receiver 1 due to system symmetry. From (8), the leaked information about unintended symbols, that is, s12i, s22i for i=1,2, can be rewritten as(15)y~13y~16=αHs12+αGs22+w~13w~16.In light of (15), we emphasize on the following two remarks.
Remark 1.
Although receiver 1 has the leaked information represented in (15), it cannot decode the symbols designated for receiver 2 due to the lack of sufficient information, four unknowns with only two equations.
Remark 2.
The signal-to-noise ratio (SNR) in (15) is a function of αH and αG. The value of αH is given by(16)αH=1trH-1H-1H=1σ12H-1+σ22H-1=σ1Hcond2H+1,where σ1(H) and σ2(H) are the maximal and minimal singular values of H, respectively, and cond(H) is the condition number of H. For orthonormal H, that is, HHH=I,αH2=0.5. Figure 2 depicts the probability density function (pdf) of αH, where prob(αH≤1)≈0.93. This means that, in 93% of the cases, the power of the eavesdropped symbols is lower than 1 which indicates that the average receiver SNR of the interference terms is much lower than that of the intended symbols, which makes it hard, if not impossible, to eavesdrop on and decode other receiver’s intended symbols.
The probability density function of αH. The pdf is modeled as a Weibull random variable with a scale parameter λ=0.644 and a shape parameter k=2.20. The results are averaged over 100,000 independent trials, where the mean and variance of αH are approximately given by 0.57 and 0.075.
3.2. Case 2: Number of Eavesdropping Antennas = 1
Adding an extra eavesdropping antenna at receiver 1, that is, nE=1, increases the leakage of information about the symbols intended for receiver 2. Hence, receiver 1 can use this leaked information to decode s12 and s22, after decoding its intended symbols s11 and s21, via SIC.
Based on Figure 1, the received signal matrix at the eavesdropping antenna of receiver 1 is given by(17)Z1=S11V11K︸C+S12V12K︸D+S21V21L︸E+S22V22L︸F+N1.Let zk,ij and nk,ij be the (i,j)th elements of the Zk and Nk∈C3×1, respectively, and let cij, dij, eij, and fij be the (i,j)th elements of the matrices C, D, E, and F∈C2×1, respectively, and then the system can be rewritten as(18)z~1=c11c21e11e21c21∗-c11∗e21∗-e11∗0000s^11s^21+0000d21∗-d11∗f21∗-f11∗d11d21f11f21s12s22+n~1,where(19)z~1=z1,11z1,21∗z1,31,n~1=n1,11n1,21∗n1,31.Combining (15) and (18) yields the following:(20)z^1z^2=D^1D^2s12+F^1F^2s22+n^1n^2.Let z~1i and n~1i be the ith elements of z~1 and n~1, respectively, and then(21)z^1=z~13θ1,z^2=y~13y~16,n^1=n~13n~12,n^2=w~13w~16,D^1=d11d21d21∗-d11∗,F^1=f11f21f21∗-f11∗,D^2=αHI,F^2=αGI,where θ1=(z~12-c21∗s^111+c11∗s^112-e21∗s^211+e11∗s^212). The elements of s12 are decoupled as follows:(22)F^1HF^12z^1-F^2HF^22z^2︸z˘1=F^1HF^12D^1-F^2HF^22D^2︸G˘1s12+F^1HF^12n^1-F^2HF^22n^2︸n˘1.The matrices D^1, D^2, F^1, and F^2 still have the Alamouti structure, and hence G˘1 also has the Alamouti structure. The simple conventional Alamouti decoding is still applicable. Also, s22 can be decoded in a similar way due to the system symmetry.
Note that the SNR of s12 and s22 in z^2 is much lower than that in z^1 due to the low average power of αH and αG. This leads to degradation in the performance of s12 and s22. In the following section, we investigate the receiver structure for decoding s12 and s22 with better error performance and a diversity order of 2; the same diversity of the intended symbols.
3.3. Case 3: Number of Eavesdropping Antennas = 2
Equation (17) can be still used to model the system for nE=2, with the exception that Zk and Nk∈C3×2 and the matrices C, D, E, and F∈C2×2. Since the leaked information about the unintended symbols in the first nR=2 receive antennas experiences low SNR, we will discard this leaked information and consider only the leaked information from nE=2 eavesdropping antennas. In contrast to the case of nE=1, the leaked information via the nE=2 eavesdropping antennas is sufficient to accurately recover the unintended symbols. As such, the system can be written as(23)z~1=c11c21e11e21c21∗-c11∗e21∗-e11∗0000c12c22e12e22c22∗-c12∗e22∗-e12∗0000s^11s^21+0000d21∗-d11∗f21∗-f11∗d11d21f11f210000d22∗-c12∗f22∗-f12∗d12d22f12f22s12s22+n~1,where(24)z~1=z1,11z1,21∗z1,31z1,12z1,22∗z1,23,n~1=n1,11n1,21∗n1,31n1,12n1,22∗n1,23.The system can be rewritten in the form of (20) with(25)z^1=z~13θ2,z^2=z~16θ3,n^1=n~13n~12,n^1=n~16n~15,D^i=d1id2id2i∗-d1i∗,F^i=f1if2if2i∗-f1i∗,where θ2=(z~12-c21∗s^111+c11∗s^112-e21∗s^211+e11∗s^212) and θ3=(z~15-c22∗s^111+c12∗s^112-e22∗s^211+e12∗s^212). The vectors s12 and s22 are then decoded the same as in the case of nE=1. From (25), which is similar to the model representing the intended symbols, we can conclude that the diversity order for the unintended symbols is equal to 2 [9].
4. Mutual Information and Secrecy Sum Rate4.1. Mutual Information at the Intended Receivers
Again, we focus on receiver 1, where due to system symmetry the same analysis applies to receiver 2. Let s11∈Ω2×1 be the transmitted vector such that E[s11s11H]=I2, and let y˘1∈C2×1 be the equivalent received vector defined in (13). Then, the mutual information between s11 and y˘ at receiver 1 is given by(26)Is11,y˘1∣H˘1=logdetI2+H˘1Rw˘-1H˘1H,where H˘1 is the effective channel matrix and Rw˘ is the covariance matrix of the equivalent noise. Let (27)Θ^1∈C2×4=G^1HG^12-G^2HG^22,Ψ^1∈C4×2=H^1tH^2tt,Ξ^1∈C4×1=w^1tw^2tt,and then (13) can be rewritten as(28)y˘1=Θ^1Ψ^1s11+Θ^1Ξ^1.As such, Rw˘=Θ^1RΞ^1Θ^1H, where RΞ^1=σn2·diag(1,2,1,2). Due to the system symmetry, the overall mutual information of the intended symbols at receiver 1 and receiver 2 can be given by(29)Ii=4·logdetI2+H˘1Rw˘-1H˘1H,with H˘1=Θ^1Ψ^1.
4.2. Mutual Information at the Unintended Receivers
At receiver 1, leaked information can be used to decode s12 and s22. Evidently, the amount of leaked information decides the accuracy of the decoding process. In the following, we investigate the mutual information in the case of 1 and 2 eavesdropping antennas.
4.2.1. Case 1: Number of Eavesdropping Antennas = 1
Based on (21), the mutual information is given by(30)Is12,z˘1∣G˘1=logdetI2+G˘1Rn˘-1G˘1HΘ^2∈C2×4=F^1HF^12-F^2HF^22,Ψ^2∈C4×2=D^1tD^2tt,Ξ^2∈C4×1=n^1tn^2tt.Note that the elements of n^1 and n^2 are i.i.d. with equal variance of σn2; therefore Rn˘=σn2·Θ^2Θ^2H. Finally, the overall mutual information of the unintended symbols at receiver 1 and receiver 2 can be given by(31)Iu=4·logdetI2+G˘1Rn˘-1G˘1H=4·logdetI2+1σn2G˘1Θ^2Θ^2H-1G˘1H,with G˘1=Θ^2Ψ^2.
4.2.2. Case 2: Number of Eavesdropping Antennas = 2
Equation (31) still applies for the case of nE=2, with the exception that z˘1, n^1, n^2, D^1, D^2, F^1, and F^2 are given in (23)–(25).
4.3. Secrecy Sum Rate
Finally, the secrecy sum rate is given by [11] (32)Rs=EH˘1,Θ^1Ii-EG˘1,Θ^2Iu.Although a negative value of the mathematical expression for Rs is unrealistic, we will keep it for the sake of comparison. Note that a negative sign of Rs means that the eavesdropper has information about the unintended data symbols, which is used in the decoding process, more than that available at the intended receiver, for the same data symbols.
5. Achieving Confidentiality Using Interleaved Pseudorandom Rotation-Based Transformation
In this section, we propose to geometrically transform the data symbols sent from each of the transmitters such that each receiver cannot decode unintended symbols using the leaked information. To this end, we propose to use the rotation-based transformation (RBT), which has been extensively used for privacy preserving data mining, among other fields [16]. The main idea of RBT is to precode the data using orthogonal matrix, referred to as rotation matrix, such that both the power of each data symbol and the distance between symbols are preserved. A two-dimensional rotation matrix is given by(33)Rθijk=cosθijksinθijk-sinθijkcosθijk,where RθijktRθijk=RθijkRθijkt=I and θijk is the counterclockwise rotation angle for the kth data symbol, for k=1,2, transmitted from transmitter i to receiver j, with θ111≠θ112≠θ121≠θ122≠θ211≠θ212≠θ221≠θ222. Each receiver knows a priori the angles used at the transmitters to rotate its intended data symbols; that is, receiver j knows only θijk for i,k=1,2. Based on that, the symbol sijk is rotated at transmitter i to produce uijk as follows:(34)realuijkimaguijk=Rθijkrealsijkimagsijk.The symbols uij are then encoded using the STBC block as shown in Figure 3 before being beamformed, linearly combined, and transmitted as in (3). Since each receiver knows the rotation matrices applied to its intended symbols, it can only decode its intended symbols. That is, without knowing other receiver’s rotation matrices, receiver cannot use the leaked information to recover the unintended symbols.
System model of transmitter 1 in a 2-user X channel configuration with IMRBT.
At the receiver side, rotated intended symbols, u~ij, are recovered as in (14). The intended symbols are therefore given by(35)reals~ijkimags~ijk=Rθijktrealu~ijkimagu~ijk.Although RBT scheme is simple and cost-efficient, it is effective to avoid eavesdropping. However, a drawback of this scheme might arise when the eavesdropper tries to recover unintended symbols by applying brute-force scheme to estimate the rotation angles. Even though employing the brute-force scheme is costly in terms of power consumption and hence impractical for power- and memory-limited wireless devices, we will discuss a method to overcome this drawback. Mohaisen and Hong proposed a multiple RBT (MRBT) in which each packet of length m is divided into v subpackets and each is rotated using a different rotation matrix [17]. Using the MRBT algorithm in our system has two advantages: eavesdropper requires to (i) estimate 2×v angles instead of only two angles and (ii) avoid statistical attacks such as the a priori knowledge-independent component analysis (AK-ICA) [18], which requires longer observations of data symbols rotated using the same rotation matrix. This MRBT algorithm might become vulnerable if the eavesdropper has a partial preknowledge on the structure of eavesdropped data symbols, helping him to recover the message. To randomize the data before rotation, we propose to interleave the data symbols before being rotated, leading to an interleaved MRBT (IMRBT) algorithm, that makes it practically impossible to recover the original data even with the preknowledge on the structure of the unintended data.
To integrate the IMRBT scheme in our system, we first introduce the following settings:
We consider that transmitter i, for i=1,2, has two packets, si1 and si2, each of length m, intended for receiver 1 and 2, respectively.
Each of these packets of length m is split into two equal-size subpackets sij1=[sij,11,sij,21,…,sij,n1] and sij2=[sij,12,sij,22,…,sij,n2], for i,j=1,2 and n=m/2.
Transmitter i, for i=1,2, has four pseudorandom interleaving sequences πijk=[πij,1k,πij,2k,…,πij,nk] for j,k=1,2, which are used to interleave symbols sijk; that is, πi11 is used to interleave si11, resulting in the interleaved subpacket s¯i11 and so forth.
Transmitter i, for i=1,2, has four pseudorandom rotation sequences θijk=[θij,1k,θij,2k,…,θij,nk] for j,k=1,2, which are used to rotate symbols s¯ijk resulting in the rotated subpackets ui1k; that is, θi11 is used to rotate s¯i11, and hence θi1,l1 rotates s¯i1,l1 and so forth.
Accordingly, the IMRBT is applied as follows:
Receiver j, for j=1,2, picks four random offsets lijk that are associated with θijk, for i,k=1,2. These offsets are sent to the corresponding ith transmitter, for i=1,2, at the initiation stage preceding the transmission of the data packet.
Receiver j, for j=1,2, picks four random offsets ξijk that are associated with πijk, for i,k=1,2. These offsets are sent to the corresponding ith transmitter, for i=1,2, at the initiation stage.
At transmitter i, for i=1,2, the four streams sijk, for j,k=1,2, are interleaved using the interleaving sequences that are rearranged as
[πij,ξijkk,πij,ξijk+1k,…,πij,nk,…,πij,ξijk-1k], for j,k=1,2, to obtain the interleaved streams s¯ijk, for j,k=1,2, respectively.
At transmitter i, for i=1,2, the four streams s¯ijk, for j,k=1,2, are rotated using the rotation matrices, whose associated rotation angles are rearranged as
[θij,lijkk,θij,lijk+1k,…,θij,nk,…,θij,lijk-1k], for j,k=1,2, to obtain the rotated streams uijk, for j,k=1,2.
From the IMRBT scheme description, it is evident that the interleavers πijk and the rotation angles θijk, for i,j,k=1,2, are static, that is, having fixed sequences. Hence, they might be estimated using statistical analysis, which requires long observations of the unintended data symbols. That is why the random offsets ξijk and lijk, for i,j,k=1,2, are used to reset the statistical analysis, hence adding further immunity to eavesdropping in the proposed system under the aforementioned type of attacks.
After applying the proposed IMRBT scheme on the data subpackets, the rotated subpackets are encoded using the STBC block, beamformed, linearly combined, and transmitted via the 2 transmit antennas. The block diagram of transmitter 1 deploying the proposed IMRBT is depicted in Figure 3. At the intended receiver, after the decoding process, the received symbols are derotated and deinterleaved to recover the intended data symbols. Since the eavesdropper does not have any of the parameters necessary to recover the unintended data symbols, our proposed system assures full confidentiality of the transmission over the X channel with interference alignment depicted in Figure 1.
Finally, it is worth mentioning that the IMRBT scheme is only applied to complex-valued modulation sets such as quadrature-amplitude modulation (QAM) or phase-shift keying (PSK) modulation. This is not a limitation to our proposed scheme since future generation communication systems, such as long-term evolution (LTE) and LTE-advanced, use only QPSK, 16-QAM, or 64-QAM, which are complex-valued modulation scheme, for data modulation [19].
6. Simulation Results and Discussion
We consider that each transmitter has perfect knowledge of the channels coupling its transmit antennas and nR receive antennas of the two receivers. The elements of the channel matrices are i.i.d. complex Gaussian with zero mean and unit variance. For the transmitted symbols sijk, for i,j,k=1,2, each has an average power of unity. The noise variance at each receive antenna is set, in accordance with [9], to 2/3ρ with ρ as the SNR.
Figure 4 shows the mutual information and the SSR for the system depicted in Figure 1 for nE=1 and nE=2. Since nR=2 antennas are used to receive the intended symbols, the mutual information of the intended symbols Ii is independent of the value of nE. However, when the number of eavesdropping antennas increases, the amount of leaked information about the the unintended symbols (Iu) also increases. In the case of nE=1, Iu is less than Ii because the leaked information about the unintended symbols at the first nR=2 antennas has low SNR as explained earlier. To collect information sufficient to recover the unintended symbols, the leaked information at nR=2 antennas is combined with that received at the nE=1 eavesdropping antenna. Note that, in this case, the noise affecting the unintended symbols is still i.i.d. with equal variances. In the case nE=2, the leaked information about the unintended symbols at the two eavesdropping antennas is sufficient to recover those symbols without requiring the leaked information at the first nR=2 antennas, where symbols suffer high noise power. It is worth mentioning that the removal of alignment interference increases the noise variance affecting the intended symbols, leading to degradation in the mutual information and hence in the BER performance. On the other hand, the unintended symbols are recovered by first removing the intended symbols via SIC, leaving the noise variance intact. Hence, if intended symbols are error-free, the error performance of the unintended symbols is superior to that of the intended symbols, as will be explained later.
Mutual information and secrecy sum rate versus SNR for nE=1 and nE=2. The depicted values are the average over 5,000 independent trials.
Figure 5 depicts the bit error rate (BER) of the intended and unintended data symbols using both binary and quadrature phase shift keying (BPSK and QPSK, resp.) with nE=1. The diversity order, as proved in [9], equals 2 for the intended symbols with a superior BER performance when BPSK modulation is used as compared to using QPSK modulation. However at high SNR values, an error floor appears in the BER curves associated with the unintended symbols. This is due to the low SNR value of the leaked information of the unintended symbols in the first nR=2 antennas, leading to an overall degradation in the BER.
BER of the intended and unintended symbols for nE=1 and both BPSK and QPSK modulation schemes.
Figure 6 shows the BER of intended and unintended symbols for nE=2 with BPSK and QPSK modulations. In the case of BPSK, the BER performance of the unintended symbols is superior to that of the intended symbols. This is due to the noise amplification imposed due to the decoding structure of the intended symbols, which does not exist in the decoding process of the unintended symbols. However, the performance of the unintended symbols, in terms of BER, is affected by error propagation due to the SIC stage, where the intended symbols are removed. The effect of the SIC is not apparent when the BPSK in employed, where the unintended symbols have better BER performance in all the simulated range of values of SNR. In the case of QPSK, the error propagation due to the SIC stage comes into play, where at low to medium SNR values (<23 dB) the performance of the intended symbols is slightly superior to that of the unintended symbols. At higher SNR values, the performance of the unintended symbols starts to slightly become superior to that of the intended symbols due to the decreased effect of the error propagation.
BER of the intended and unintended symbols for nE=2 and both BPSK and QPSK modulation schemes.
Figure 7 depicts the BER of the intended and unintended symbols with IMRBT using QPSK modulation. To obtain these results, a different angle is used for each symbol at each channel use. For instance, angle θij,lk is used to rotate symbol sijk at the lth channel use. This implies that the interleaved symbols s¯11,s¯12,s¯21, and s¯22 are rotated using independent angles at each channel use l. Since the intended receiver has prior knowledge of the rotation angles of its designated symbols, it can recover those symbols after employing the decoding procedure explained earlier, while the unintended receiver cannot recover the unintended symbols due to unknowing the interleaving and rotation parameters used at the transmitters to treat those symbols. As shown in Figure 7, applying the IMRBT does not affect the BER performance of the intended symbols. However, the unintended receiver ignores the fact that symbols were rotated and decodes them without derotation, leading to degraded performance manifested by a fixed BER at about 0.3. Restricting the rotation angles to [45,315] leads to further improvement in the proposed algorithm since this assures that, after employing the proposed IMRBT scheme, each symbol will lie in the Voronoi region of other symbols from the constellation set Ω.
BER of the intended and unintended symbols with transmitters employing the proposed IMRBT scheme for nE=2 and QPSK modulation.
7. Conclusion
In this paper, we assumed that each receiver in the explained 2-user X channel system with interference alignment and STBC plays the role of an eavesdropper that, in addition to decoding its intended symbols, it decodes the symbols intended for the other receiver. We analyze the mutual information and SSRs in cases of a single and two eavesdropping antennas, where we propose decoding algorithms for the unintended symbols in both cases. Interestingly enough, we show that, in the case of two eavesdropping antennas, the performance of the eavesdropped symbols is superior to that of the intended symbols. As such, to guarantee confidentiality, hence rendering useless the leaked information about unintended symbols, we proposed an IMRBT scheme, which consists of two stages, namely, interleaving and orthogonal rotation. Interleaving neutralizes any a priori knowledge at the eavesdropper side about the structure of the transmitted packet, whereas the orthogonal transformation, which preserves both the power of and distance among the data symbols, rotates the data symbols in such a way the angular information of data symbols is perturbed. Knowing the interleaving and rotation parameters, intended receiver recovers the transmitted data, while unintended receiver cannot. Simulation results and discussions demonstrate the effectiveness of the proposed scheme.
Conflict of Interests
The author declares that there is no conflict of interests regarding the publication of this paper.
Acknowledgment
This work was supported by research subsidy by Korea University of Technology and Education (Korea Tech), for the period from 2014 to 2015.
IyerA.RosenbergC.KarnikA.What is the right model for wireless channel interference?2009852662267110.1109/twc.2009.0807202-s2.0-74249101942LeeJ. H.ToumpakarisD.YuW.Interference mitigation via joint detection20112961172118410.1109/jsac.2011.1106062-s2.0-84055176757ChenW.LetaiefK. B.CaoZ.Network interference cancellation20098125982599510.1109/twc.2009.12.0815762-s2.0-73049089641MohaisenM.ChangK. H.Maximum-likelihood co-channel interference cancellation with power control for cellular OFDM networksProceedings of the IEEE International Symposium on Communications and Information Technologies (ISCIT '07)October 2007198202JafarS. A.ShamaiS.Degrees of freedom region of the MIMO X
channel200854115117010.1109/tit.2007.911262MR24467462-s2.0-38349129070AlamoutiS. M.A simple transmit diversity technique for wireless communications19981681451145810.1109/49.7304532-s2.0-0032183752TarokhV.JafarkhaniH.CalderbankA. R.Space-time block codes from orthogonal designs19994551456146710.1109/18.771146MR16990702-s2.0-0032656952El GamalH.HammonsR.Jr.On the design of algebraic space-time codes for MIMO block-fading channels200349115116310.1109/tit.2002.806116MR19658932-s2.0-0037269306LiL.JafarkhaniH.JafarS.When Alamouti codes meet interference alignment: transmission schemes for two-user X channelProceedings of the IEEE International Symposium on Information Theory Proceedings (ISIT '11)July 201127172721MohaisenM.ChangK. H.Fixed-complexity sphere encoder for multi-user MIMO systems2011131636910.1109/jcn.2011.61572532-s2.0-79952931190EkremE.UlukusS.The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel20115742083211410.1109/tit.2011.2111750MR27602362-s2.0-79952846257GeraciG.YuanJ.RaziA.CollingsI. B.Secrecy sum-rates for multi-user MIMO linear precodingProceedings of the 8th International Symposium on Wireless Communication Systems (ISWCS '11)November 201128629010.1109/iswcs.2011.61253552-s2.0-84857477616FakoorianS. A.JafarkhaniH.SwindlehurstA. L.Secure space-time block coding via artificial noise alignmentProceedings of the Conference Record of the 45th Asilomar Conference on Signals, Systems and Computers (ASILOMAR '11)November 2011651655AllenT.ChengJ.Al-DhahirN.Secure space-time block coding without transmitter CSI20143657357610.1109/LWC.2014.23446662-s2.0-84919786288ParameswaranA. T.HusainM. I.UpadhyayaS.Is RSSI a reliable in sensor localization algorithms an experimental studyProceedings of the International Symposium on Reliable Distributed SystemsSeptember 2009Niagara Falls, NY, USA15OliveiraS.ZaïaneO.Privacy preserving clustering by data transformationProceedings of the Brazilian Symposium on Databases (SBBD '03)2003304318MohaisenA.HongD.Mitigating the ICA attack against rotation-based transformation for privacy preserving clustering200830686887010.4218/etrij.08.0208.01342-s2.0-57349161985GuoS.WuX.Deriving private information from arbitrarily projected dataProceedings of the 11th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining (PAKDD '07)20078495KhanF.2009Cambridge, UKCambridge University Press10.1017/cbo9780511810336