Artificial Noise Based Security Algorithm for Multi-User MIMO System


The existing physical layer security algorithm, which is based on artificial noise, could affect legitimate receivers negatively when the number of users is no less than sending antennas in multi-user MIMO system. In order to improve security of multi-user MIMO system under this scenario, we propose a new multi-user MIMO system physical layer security algorithm based on joint channel state matrix. Firstly, multiple users are processed together, thus a multi-user joint channel state matrix is established. After achieving Singular Value Decomposition (SVD) of the joint channel state matrix, the minimum singular value is obtained, which can be utilized for precoding to eliminate the interference of artificial noise to legitimate receivers. Further, we also present an approach to optimize the power allocation. Simulation results show that the proposed algorithm can increase secrecy capacity by 0.1 bit/s/HZ averagely.

Share and Cite:

Peng, J. , Huang, K. and Ji, J. (2013) Artificial Noise Based Security Algorithm for Multi-User MIMO System. Communications and Network, 5, 194-199. doi: 10.4236/cn.2013.53B2037.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] R. Negi and S. Goel, Secure Communications Using Artificial Noise, IEEE Vehicle Technology Conference (VTC), Dallas, TX, September 2005, pp. 1906-1910.
[2] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Transactions on Wireless Communication, Vol. 7, No. 6, 2008, pp. 2180-2189.
[3] M. Ghogho and A. Swami, “Physical Layer Secrecy of MIMO Communications in the Presence of a Poisson Random Field of Eavesdroppers,” IEEE ICC Workshop on Physical Layer Security, Kyoto, Japan, June 2011, pp. 1-5.
[4] M. Ghogho and Ananthram, “Physical Layer Security of MIMO frequency selective channels by beamforming and noise generation,” European Signal Processing Conference, Barcelona, Spain, Augest 2011, pp. 829-833.
[5] A. Muk-herjee and A. L. Swindlehurst, “Utility of Beamforming Strategies for Secrecy in Multi-user MIMO Wiretap Channels, in Proc. of Forty-Seventh Allerton Conf., Oct 2009: 1268-1276.
[6] W. Liao, T. Chang, W. Ma and C. Chi, “Joint transmit beamforming and artificial noise design for QoS discrimination in wireless downlink,” in Proc. IEEE ICASSP, Dallas, Mar 2010, pp. 256-2565.
[7] E. Ekrem and S. Ulukus, “The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel,” IEEE Transactions on Information Theory, Vol. 57, No. 4, 2011, pp. 2083-2113. doi:10.1109/TIT.2011.2111750
[8] A. Khisti and G. W. Wornell, “Secure Transmission with Multiple Antennas Part II: The MIMOME Wiretap Channel,” IEEE Transactions on Information Theory, Vol. 56, No. 11, 2010, pp. 5515-5532. doi:10.1109/TIT.2010.2068852
[9] A. Khisti and G. W. Wornell, “Secure Transmission with Multiple Antennas I: The MISOME Wiretap Channel,” IEEE Transactions on Information Theory, 2010, Vol. 56, No. 11, pp. 3088-3104. doi:10.1109/TIT.2010.2048445
[10] X. Zhou and M. R. Mckay, Secure Transmission with Artificial Noise over Fading Channels: Achievable Rate and Optimal Power Allocation, International Conference Signal Processing and Communication Systems, Omaha, NE, Oct. 2010, pp. 3831-3842.
[11] A. Mukherjee and A. L. Swindlehurst, “User Election in Multi-user MIMO Systems with Secrecy Considerations,” ASILOMAR Conf. on Signals, Systems, and Computers, Pacific Grove, CA, 2009, pp. 1479-1482.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.