Securing Communication via Transmission of Artificial Noise by Both Sides : Bipolar-Beamforming Optimization

The paper considers the secure transmission in a wireless environment in which both the transmitter (Alice) and the legitimate receiver (Bob) send artificial noise (AN) to interfere with the eavesdropper (Eve). Optimal design is analyzed in detail for this AN-by-both-side model to deal with Eve’s stochastic channel condition and random spatial distribution. Bipolar-beamforming is first proposed to jointly design Alice and Bob’s transmitting signals. By optimally assigning the transmitting antenna for Bob and allocating the power ratio between Alice’s information and the AN signal, maximum secrecy capacity can be achieved. Simulation is done to illustrate the process of bipolar-beamforming optimization. Results show that the AN-by-both-side model has good secrecy performance on both average and extreme conditions as Eve approaches Alice or Bob.


Introduction
In wireless communication, a malicious intruder can easily overhear messages transmitted between two nodes.Traditional security problems involve three parties: transmitter (Alice), legitimate receiver (Bob), and a passive eavesdropper (Eve).Wyner [1] first studied the wiretap channel and introduced the notion of secrecy capacity.After that, Csiszár and Körner [2] extended this work to the nondegraded discrete memoryless broadcast channel.Their work showed that if Bob's channel is more capable than Eve's, perfect secrecy can be achieved.Secrecy capacity in MIMO (multiple-input and multiple-output) wiretap channel and fading channel is studied in [3,4].Recently, the problem of stochastic system modeling has also been considered in [5][6][7][8][9][10][11].
The method of adopting artificial noise (AN) to increase secrecy capacity was first proposed by Goel and Negi [12,13].In their model, Alice uses multiple transmitting antennas or cooperates with the helper nodes to generate the AN, shown in Figure 1(a).This degrades Eve's channel, without affecting Bob, by projecting the AN into the null space of Bob's channel.Authors in [14][15][16][17] adopted an iterative waterfilling algorithm to allocate the power ratio between AN and the information signal, thus solving the optimal design problem of this model.Li et al. proposed another AN based approach [18], in which AN is generated by Bob, shown in Figure 1(b).Such a kind of AN impairs Eve's channel but can be cancelled by Bob himself by applying the self-interference cancellation techniques [19][20][21].In their model, Bob adopts one antenna for receiving information and another for transmitting AN.Outage secrecy capacity region (OSR) is analyzed for such a configuration.Li et al. also mentioned a model in the discussion part of their paper in which both Alice and Bob send AN.As shown in Figure 1(c), this is a combination of the above two models.However, no detailed optimization analysis is available yet for this AN-by-both-side model.
In this paper, we will generalize the above AN-by-bothside model from Alice equipped with 2 antennas, Bob with 2 antennas, and Eve with 1 antenna to a model that all of them are equipped with multiple antennas.Optimal design will be studied for such a configuration to best utilize Alice and Bob's antenna and power resources.In order to achieve optimal secrecy performance, many design-specific issues need to be addressed to deal with a stochastic Eve with random channel condition and spatial distribution.These  include the assignment of Bob's antennas, the optimal power allocation ratio for Alice, and the beamforming design.
In this work, we will propose an efficient scheme, called "bipolar-beamforming optimization, " to design Alice and Bob's transmitting signals and allocate their antenna and power resources so that maximum secrecy capacity can be achieved.
The paper is organized as follows.The system model will be described in Section 2. Sections 3-5 will then focus on the efficient computation of secrecy capacity and optimal parameter design for the proposed model.Simulation results will be presented in Section 6, and the conclusion will be given in Section 7.
Throughout this paper, the following notations will be used: bold symbols (e.g., G and g) in capital letter and small letter denote matrices and vectors, respectively.C  is the dimension vector space over the complex field.(⋅) † denotes the conjugate transpose and () + = max{0, }.| ⋅ | is the determinant of a square matrix while ‖ ⋅ ‖ is the norm of a vector. G (⋅) stands for the expectation over the random variate G.

System Model
Suppose Alice is equipped with   (  ≥ 2) antennas.Bob has   (  ≥ 2) antennas.He will choose the th (1 ≤  ≤   ) antenna as receiving antenna, and the remaining ones as AN-emitting antennas.Eve will have   (  ≥ 1) antennas for eavesdropping on the transmission signal between Alice and Bob.It is assumed that the channel between Alice and Bob is known to all parties, but they do not hold channel state information (CSI) of Eve.
As shown in Figure 1(c), when both Alice and Bob send AN, the signal received by Bob can be expressed as where h (i)  ab denotes the channel between Alice and the th receiving antenna of Bob, which is a 1 ×   vector.h (i)  bb is the channel between the receiving and the transmitting antennas of Bob, with size 1 × (  − 1).  is the Gaussian noise at Bob, with noise power  2   .The signal transmitted by Alice is x, while n stands for the artificial noise emitted by Bob.
Similarly, the signal received by a stochastic Eve is given by where n e is the Gaussian noise at Eve. G ae is the random channel between Alice's transmitting antennas and Eve.G (i)   be is the random channel between Bob's transmitting antenna set and Eve.The elements of G ae and G (i) be are modeled as i.i.d.zero-mean circularly symmetric complex Gaussian (ZMCSCG) random variables.
The total transmission power of Alice and Bob are   and   , respectively.For   , a proportion of  (0 ≤  ≤ 1) is allocated to the information signal, with others left for AN.Therefore, the power used for transmitting information and emitting AN is (3)

Beamforming and Secrecy Capacity
In this section, the beamforming of Alice and Bob's transmission signal is first studied.Secrecy capacity of the proposed AN-by-both-side model can therefore be obtained based on the signals received by Bob and Eve.
3.1.Bipolar Beamforming.For Bob, since the location and channel condition of Eve is unknown to him, the beamforming of n is just to generate random Gaussian noise.Therefore, n becomes an (  − 1) × 1 complex random Gaussian vector with covariance matrix (nn For Alice, the transmitted signal x can be decomposed into the information part, s, and the AN part, w as follows: According to the beamforming scheme by [13], (w 1 , W 2 ) forms an orthogonal basis of C   , and w 1 = h (i) † ab /‖h (i) ab ‖.W 2 spans the null space of h (i) † ab . stands for the information symbol with power ( † ) =  2  =  info ; and k is a complex Gaussian vector with zero mean and covariance matrix (kk † ) =  AN /(  − 1) ⋅ I   −1 .Thus, ( 1) and ( 2) can be further expanded as where we denote g = G ae ⋅ w 1 and G = G ae ⋅ W 2 for simplicity.Note that due to the orthonormality of (w 1 , W 2 ), g and G also have i.i.d.ZMCSCG entries as G ae .
Note that in (7), there is no h (i) bb ⋅ n item in the calculation of  1 because it is possible for Bob to cancel the AN exerted on himself by adopting full duplex wireless communication techniques [20], and the problem of self-interference cancellation has also been discussed in depth in [18,21].
In (8), the worst case situation, n e → 0, is considered.Therefore,  2 is the upper bound of the information tapped by Eve; and  in ( 6) is the minimum guaranteed secrecy capacity that can be ensured in this scenario.

Optimization for Secrecy Capacity
Through the secrecy capacity () analyzed in ( 6)-( 8), the optimization problem can be formalized as max ,  (, ) In order to maximize this secrecy capacity, the following 2 key parameters need to be optimized: (1) , with the th antenna selected as Bob's receiving antenna, and the others left as AN transmitting antennas; (2) , the power allocation ratio between Alice's information signal and AN.
As it can be seen from ( 6)- (8), it is hard to analyze  due to the existence of 3 random matrices in  2 : g, G and G (i)  be .In the following part, we will exploit the random characteristics of Eve to optimize the above 2 parameters.

Antenna Assignment for Bob.
We first exam  2 .In (8), the item related to  is G (i)  be G (i) † be .Because the channel between Bob and Eve is unknown to Bob and considered to be randomized, any combination of Bob's AN transmitting antennas will result, on average, in the same effect.Hence,  2 is irrelevant to the selection of antenna .
On the other hand, for (7), it is simple to check that  1 is monotonically increasing with ‖h (i)  ab ‖.Therefore, this item needs to be maximized.
Finally; the assignment of Bob's antenna resources has a relatively simple solution, that is,

Power Allocation Ratio for Alice.
The form of  in ( 6)-( 8) is hard to be computed due to the existence of 3 random matrices in  2 : g, G and G (i) be .In fact, they are related to Eve's stochastic channel condition and spatial distribution.In the following section, we will first derive and explore an efficient method to compute the secrecy capacity based on Eve's random characteristics.The optimal power allocation ratio,  * , can be obtained thereafter.

Eve's Stochastic Channel Condition.
As it can be seen in ( 8),  2 is the expectation over the channel condition of Eve; that is, G ae and G be .When taking into account the pathloss effect, G ae can be expanded as the product of a path-loss component,   , and a Gaussian fading component, Gae as follows: In (11),  0 is a coefficient and   is the distance between Alice and Eve. stands for the pass-loss exponent.The Gaussian fading component, Gae , is a unit random Gaussian matrix, and the elements of Gae are normalized to be i.i.d.zero-mean unit-covariance circularly symmetric complex Gaussian random variables.This is similar for G (i) be , g, and G; that is, where G(i) be , g, and G are all normalized random Gaussian matrices, the same as Gae .
The complementary cumulative distribution function of  is given in [22] (Equation (18) in that paper), as where   is the coefficient of   in the polynomial, ∏ (1 + Γ  ).Hence, the probability density function of  is   () = d(−()).We can rewrite the expectation in (13) into integral form as () is obtained using integration by parts.Note that for a given   and   , the integrand in ( 16) corresponds to a rational function.The improper integral, therefore, can be easily computed by adopting partial fraction decomposition.Also, note that the second term in () equals 0, because lim  → 0 log 2 (1 + )() = 0.If the size constraint in Section 5.1 is fulfilled; that is,

Spatial Distribution of Eve.
In ( 16),  2 is still the expectation over   and   , which is in turn related to the spatial location of Eve.Therefore, some geometry distribution could be prespecified for this imaginary attacker.For example, in [16,23], the location of Eve follows a Poisson point process.
In our simulation (see Section 6, Figure 4), however, a certain region of area within a radius of 2 ⋅   is delimited around Alice and Bob.The probability density function of Eve's location can be expressed as where  , is the coordinate of Eve's location and D = { , |   ,   < 2 ⋅   }.We refer to D as the "Protected Zone, " and (D) is the area of such a region.25 points are sampled uniformly and symmetrically in this region to approximately compute the expectation in (16).Outside this region, Eve is considered to have little impact on the secure communication because the relatively high pass-loss and low-SNR makes it difficult to decode the information signal.

4.2.3.
Searching for Optimal  * .Through the above derivation,  can be computed efficiently given a specified .Therefore, the optimal power allocation ratio,  * , can be obtained by some searching techniques.Analytically, it is hard to prove the concavity of  in the form of ( 16).However, it can be checked from Figure 2 that the resulted curve is concave.Although not strict, it can still be empirically treated as a concave problem in practical engineering.Therefore, one-dimension search technique such as binary search can be applied to find the optimal  * .

Constraints on Antenna Numbers.
There are some size constraints on the number of antennas for Alice, Bob, and Eve in the proposed AN-by-both-side scenario.
First, as can be seen from ( 8), to avoid GG † + G (i) be G (i) † be being singular, (  − 1) + (  − 1) ≥   has to be ensured.Second, for Eve's antenna number,   , it is related to an assumption on the capability of Eve.  =   is typically assumed to mean that Eve has the same capability as Bob.  can also be considered as the number of colluding eavesdroppers, each equipped with one antenna.

Multiple Receiving Antennas for Bob.
In this paper, the transmission between Alice and Bob adopts the MISO strategy; that is, Bob only uses one antenna for information receiving.In fact, Bob can use more than one antenna to receive information signals, because he has   antennas.Although authors in [13] have pointed out that the secrecy capacity, , does not necessarily grow linearly with the number of receive dimensions, it still might result in a better performance than the MISO strategy.For such MIMO cases, it tends to be more difficult to analyze the statistical expectation of  2 .Furthermore, the antenna selection problem becomes combinatorial NP hard for Bob with multiple receiving antennas.In future work, further efforts need to be made to solve these problems.
Power alloc ratio

Simulation Results
In the simulation scenario (see Figure 4), topology is set as (−2, 2) km × (−2, 2) km.Alice and Bob are located at (−0.5, 0) and (0. Optimal design of this scenario is analyzed first.According to the antenna assignment method in Section 4.1, h (i) ab (1 ≤  ≤   ) is computed for each of Bob's antennas, shown in Table 1.
Bob will therefore assign the 2nd antenna as the receiving antenna, and the remaining 3 ones for AN emission.
Figure 2 shows the power allocation ratio  and the corresponding secrecy capacity computed according to Section 4.2.Eve's antenna number,   , varies from 1 to 4, and the optimal power allocation ratio,  * , is obtained for each condition.Secrecy capacity drops drastically with the increase of   . * also decreases so that a greater proportion of the power should be assigned to AN in order to resist a more powerful eavesdropper.For   = 4, the dashed-line also shows the secrecy capacity when AN is sent only by Alice, and   is the optimal power allocation ratio for this condition.
Figure 3 compares the secrecy capacity for 3 AN strategies at different SNR levels.To be fair, model (b) and model (c) are configured under the same resource condition as follows:   = 6,   = 4,   = 2, and   =   .As it can be seen from Figure 3, the strategy of model (c) has better performance.In addition, positive secrecy capacity can be achieved even when SNR is fairly low.For model (a), only Alice sends AN, therefore,   = 0, and the secrecy capacity is still taken under the optimal power allocation ratio, denoted as   in Figure 3.The achieved secrecy capacity of model (c) still outperforms that of model (a), but at the cost of extra AN power emitted by Bob.In Figure 4, rather than the average secrecy capacity, we turn to see the distribution details of secrecy capacity when the attacker appears at various locations of the topology.When the eavesdropper approaches Alice, the secrecy capacity is degraded greatly due to Eve's superior channel condition compared with Bob.With the help of AN emitted by Alice, however, positive secrecy capacity is still possible.When Eve is located near Bob, high secrecy capacity is achieved, disregarding the fact that channel conditions for Eve and Bob are similar.This is a result of the strong interfering signal emitted by Bob, making it difficult for Eve to cancel the randomized AN.

Conclusion
In this paper, artificial noise sent by both Alice and Bob was studied.We proposed an efficient scheme, called "bipolarbeamforming optimization, " to optimally configure the proposed model.Secrecy capacity was analyzed based on Eve's stochastic channel condition and spatial distribution.Maximum secrecy capacity can be achieved by adopting the proposed optimization technique to allocate their antenna and power resources.Research work of this paper can be extended to a more general configuration where Bob adopts more than one antennas for receiving the information signals.
AN sent by both sides

Figure 1 :
Figure 1: Illustration to compare 3 different kinds of AN models.
5, 0), respectively, with   = 8 and   = 4. Simulation parameters are set to the following values:   =   = 0.1 W,  = 10 −12.81 , and  = 3.76.The noise power density is −180 dBm/Hz, which gives a noise power of  2   = 5 * 10 −15 W within a bandwidth of 5 MHz.Such configurations result in an SNR of 4.77 dB at Bob.The channel fading between Alice and Bob is generated randomly.

Figure 3 :
Figure 3: Comparison of 3 strategies in terms of secrecy capacity.

Figure 4 :
Figure 4: Impact of Eve's location on the secrecy capacity.

Table 1 :
Comparison results for Bob's antennas.