Professional Documents
Culture Documents
Abstract— In this paper, we consider physical layer security the assumption of the SNs sensing a common field is used
in wireless sensor networks (WSNs) using distributed co-phasing to achieve reliable data fusion [7]. Due to the common data
(DCP)-based transmissions. For this protocol, we first analyze the being transmitted, the multiple SNs in DCP act as a distributed
achievable ergodic secrecy rate of a single stream DCP system
in the presence of one or more eavesdroppers. We show that the antenna array, resulting in both diversity gain and coherent
coherent combining gain offered by DCP leads to the signal- combining gain at the FC. Also, since DCP signals are pre-
to-interference-plus-noise-ratio (SINR) over the main channel coded to coherently combine at the FC, they naturally combine
increasing as the square of the number of SNs N and that over incoherently at any unintended location, thereby making DCP
the eavesdropper channel increasing linearly with N. This results inherently secure. In this paper, we quantify this inherent
in a strictly positive ergodic secrecy rate that increases as log N.
We then analyze the performance of multi-stream DCP and show security of DCP systems in terms of the achievable ergodic
that using K data streams in DCP leads to a K-fold increase secrecy rates in the presence of eavesdroppers.
in the achievable secrecy rate at high SNRs. We also discuss During the first stage of the two stage DCP, the FC transmits
an alternative power allocation scheme for multi-stream DCP, known pilot symbols to the SNs. The SNs use these pilots
such as distributed maximal ratio transmission with a per-user to estimate the respective channels to the FC. In the second
power constraint and show that this improves the achievable
secrecy rates as compared to standard multi-stream DCP. Finally, stage, the SNs synchronously transmit their data symbols to
we analyze the role of artificial noise in improving the achievable the FC. The data symbols are pre-rotated to compensate for
secrecy rates. We validate the accuracy of these derived results the estimated channel phase, resulting in coherent combining
and illustrate the efficacy of DCP in ensuring secure data fusion of the signals at the FC. The reverse link training of the SNs
in WSNs using Monte Carlo simulations. by the FC offers several benefits. Firstly, the FC is connected
Index Terms— Distributed co-phasing, data fusion, physical to the mains and can transmit at higher power compared to
layer security, artificial noise, maximal ratio transmission. the power starved SNs, resulting in better channel estimates.
I. I NTRODUCTION Secondly, reverse link training requires a smaller training
overhead compared to forward link training, where the training
T HERE has been a renewed research interest in wire-
less sensor networks (WSNs) due to the emergence of
the internet of things (IoT) [1], [2]. Traditionally, a WSN
duration is proportional to the number of SNs. Thirdly, and
most relevant to this paper, by initiating the training from the
FC, the channel states from the SNs remain unknown at the
comprises a set of spatially distributed sensor nodes (SNs)
eavesdroppers’ locations.
observing a physical phenomenon of interest, and report-
DCP works under the assumption that the channel is
ing the observed data to a fusion center (FC) [3]. Secure
quasi static and reciprocal [8], [9]. The feasibility of DCP
communication of the observed data from the SNs to the
in practical implementations, as well as its resilience to
FC is a challenging problem mainly due to the constraints
channel estimation errors has been well established in the
on the capabilities of the SNs [4]–[6]. The goal in secure
literature [8], [10]. However, while DCP ensures that the sym-
communications is to ensure that the transmissions by the SNs
bols transmitted by the SNs can be recovered at the FC with
can be decoded only at the FC. Distributed Co-Phasing (DCP)
high fidelity, their ability to secure the transmission against
is a form of distributed transmit beamforming (DTB), where
reception by an eavesdropper is yet to be studied. In a practical
Manuscript received September 20, 2018; revised January 22, 2019 and setting, an eavesdropper may exist in the network, and may
February 26, 2019; accepted March 8, 2019. Date of publication March 18, attempt to access sensitive private information intended for
2019; date of current version June 14, 2019. The work of R. Chopra was
supported by a Startup Grant from IIT Guwahati. The work of C. R. Murthy the FC. Therefore, it is interesting to investigate the conditions
was supported by the Young Faculty Research Fellowship from the Ministry under which secrecy of the transmitted data can be ensured.
of Information Technology, Government of India. The associate editor coor- In this work, our main focus is to analyze the maximum rates
dinating the review of this manuscript and approving it for publication was
Prof. Tobias Oechtering. (Corresponding author: Ribhu Chopra.) at which the SNs can transmit to the FC, while ensuring
R. Chopra is with the Department of Electronics and Electrical Engineering, secrecy in the presence of one or more eavesdroppers within
IIT Guwahati, Guwahati 781039, India (e-mail: ribhu@outlook.com). the network.
C. R. Murthy is with the Department of Electrical Communication
Engineering, Indian Institute of Science, Bengaluru 560012, India (e-mail:
cmurthy1@gmail.com). A. Related Work
R. Annavajjala is with the College of Computer and Information The basic model for DCP, i.e., a DTB system involv-
Science, Northeastern University, Boston, MA 02115 USA (e-mail:
ramesh.annavajjala@gmail.com). ing multiple SNs transmitting coherently to an FC, was
Digital Object Identifier 10.1109/TIFS.2019.2905759 first discussed in [4] using a master slave architecture.
1556-6013 © 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:30:57 UTC from IEEE Xplore. Restrictions apply.
CHOPRA et al.: PHYSICAL LAYER SECURITY IN WSNs USING DISTRIBUTED CO-PHASING 2663
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:30:57 UTC from IEEE Xplore. Restrictions apply.
2664 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 14, NO. 10, OCTOBER 2019
signals broadcast by the latter. Then, the nodes transmit A. Achievable Ergodic Secrecy Rate Under Ideal DCP
their data symbols simultaneously by pre-rotating them using
the estimated channel phase, such that they combine coher- Under ideal DCP, we assume that accurate CSI is available
ently at the receiver. For the data detection at the FC, the at all the SNs, and therefore, θ̂1,i = θ1,i . Consequently, the
FC can perform blind channel estimation using the data signal received by the FC at the nth instant can be expressed
symbols transmitted by the SNs [16]. Note that, for con- as
stant envelop modulation schemes, data can be detected even
N
without blind channel estimation, albeit with a small loss y1 [n] = α1,i e j θ1,i x i [n] + w1 [n]
of performance. Throughout this paper, we assume that the i=1
communication takes place over a quasi-static block fading
narrowband channel [33]. That is, we assume that the chan- = N Es h 1 s[n] + w1 [n] (5)
nel coefficients remain constant over a block consisting of
N
M channel uses. The channel coefficients vary in an indepen- with w1 [n] ∼ CN (0, N0 ), and h 1 N1 i=1 α1,i .
dent and identically distributed (i.i.d.) fashion across blocks. To obtain the achievable ergodic secrecy rates for this
Out of the M channel uses within a block, the first M p instants system, we need to separately determine the achievable ergodic
are used for reverse link training The next Md = M − M p secrecy rates for the main channel and the eavesdroppers
channel uses are used for data transmission from the SNs to channel [21]. These rates are given in Lemmas 1 and 2
the FC. below.
The received signal
at the i th SN during the downlink Lemma 1: For the single antenna DCP system with non
training stage (n ∈ 1, 2, . . . , M p ) is identically distributed channels, the achievable rate over the
main channel satisfies
qi [n] = a1,i E p + wi [n] = α1,i e j θ1,i E p + wi [n] (1)
π Es
N N
with a1,i being the zero mean circularly symmetric com- Rm ≥ η p log2 Ω1,i Ωm,i
4 N0
plex Gaussian (ZMCSCG) distributed channel coefficient for i=1 m=1
the channel between the FC and the i th SN with a mean E[ψ 2 ] 3
squared channel power Ω1,i , denoted as a1,i = α1,i e j θ1,i ∼ + log2 (e) 2E[ψ] − − (6)
2 2
CN (0, Ω1,i ). Also, wi [n] ∼ CN (0, N0 ) is the additive white
Gaussian noise (AWGN) at the SN. with E[ψ] defined in (8), shown at the top of the next page,
Conditioned on yi [n], n = 1, . . . , M p , the MMSE estimate E[ψ 2 ] defined in (9), shown at the top of the next page, and
of the channel coefficient a1,i at the i th SN can be shown to M−M p
ηp = M , for non identically distributed channels, and
be
Mp
M p E p Ω1,i π N 2 Es 0.3944 4.24
â1,i = qi [n], (2) Rm ≥ η p log2 Ω − − 2 . (7)
N0 + M p E p Ω1,i 4N0 N N
n=1
with E p denoting the pilot power. Therefore, the channel for identically distributed channels, with Ω1,i = Ω for
magnitude and phase estimates can be written respectively as i = 1 . . . N.
α̂1,i = |â1,i | and Proof: See Appendix A.
We now turn our attention to the eavesdropper’s chan-
nel. Letting b1,i ∼ CN (0, Δ1,i ) be the channel coefficients
−1 â1,i
θ1,i = tan . (3) between the i th SN and the EVE,
â1,i √ we can write the signal
received by √ the EVE as z[n] = Es s[n] i=1N
b1,i e− j θ1,i +
The modulation symbol common to all the SNs is denoted v[n] = N Es g1 s[n] + v[n], where v[n] ∼ CN (0, N0 )
by s[n]. To coherently align s[n] at the FC, the i th SN is the AWGN at the EVE, and g1 = N1 i=1 N
b1,i e− j θ1,i .
pre-rotates s[n] to compensate for the estimated phase and Since g1 is the sum of independent ZMCSCG r.v.s, it is
transmits the symbol x i [n] such that also ZMCSCG.
Lemma 2: The achievable rate over the EVE’s channel in
x i [n] = Es e− j θ1,i s[n] n = M p + 1, . . . , M, (4) case of a block fading channel is upper bounded as
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:30:57 UTC from IEEE Xplore. Restrictions apply.
CHOPRA et al.: PHYSICAL LAYER SECURITY IN WSNs USING DISTRIBUTED CO-PHASING 2665
N
4N 2 4 i=1 Ω1,i
E[ψ] = E[|h 1 |2 ] = 1 + −1 (8)
π N
i,m=1 Ω Ω
1,i m,i π N
i,m=1 Ω1,i Ωm,i
16N 4 E[|h 1 |4 ] 16
N
N
N
3/2 1/2
E[ψ 2 ] = 2
= 2
2 Ω1,i + 3 Ω1,i Ω1,k
N N
π2 i,m=1 Ω1,i Ωm,i π2 i,m=1 Ω1,i Ωm,i i=1 i=1 k=1
k =i
N
N
N
N
N
1/2 1/2
N
N
N
N
1/2 1/2 1/2 1/2
+3 Ω1,i Ω1,k + 6 Ω1,i Ω1,k Ω1,l + Ω1,i Ω1,k Ω1,l Ω1,m . (9)
i=1 k=1 i=1 k=1 l=1 i=1 k=1 l=1 m=1
k =i k =i l =i,k k =i l =i,k m =i,k,l
Theorem 1: The achievable ergodic secrecy rate of the DCP a1,i , can be expressed in terms of its MMSE estimate at
system can be lower bounded as the SN, â1,i , as
⎛ ⎞
π E
N
Rs ≥ η p log2 ⎝ Ω1,i Ω1,m ⎠ + log2 (e)
s
ξ Ω1,i Ω1,i
4 N0 a1,i = â1,i + ã1,i (15)
i,m=1 1 + ξ Ω1,i 1 + ξ Ω1,i
+
E[ψ 2 ] 3 NEs
× 2E[ψ] − − −log2 1 + Δ . MpEp
2 2 N0 where ξ = N0 is the pilot SNR, and ã1,i ∼ CN (0, 1), such
(11) that ∗ ] = 0 due to the MMSE estimation. Here it is
E[â1,i ã1,i
for non identically distributed channels, and important to note that this decomposition is applicable only
for ZMCSCG rvs.
πEs 2 0.3944 In this case, we present lower bounds on the achievable rate
Rs ≥ η p log2 N Ω −
4N0 N over the main channel, and on the achievable secrecy rate,
+ as Lemma 3 and Theorem 2, respectively.
4.24 NEs
− 2 − log2 1 + Δ . (12) Lemma 3: The achievable rate over the main channel for
N N0
practical DCP is bounded as
for identically distributed channels.
Proof: We know that, for memoryless AWGN channels, ⎛ ⎛ ⎞
πEs
N
ξ Ω1,i
2 ξ Ω1,k
2
the achievable secrecy rate can be expressed in terms of the Rm ≥ η p ⎝log2 ⎝ ⎠
achievable rates over the main and the wiretap channels as [21] 4N0 1 + ξ Ω1,i 1 + ξ Ω1,k
i,k=1
Rs = [Rm − Re ]+ . (13) 1 E[ψ̄ 2 ] 3
− 2E[ψ̄] − − , (16)
Therefore, (12) can be obtained by plugging the expressions N 2 2
for Rm and Re into (13).
N 2 Es π ξ Ω 2
Note that the argument inside the logarithm of the first term Rm ≥ η p log2
of (12) scales as N 2 , and that of the third term scales linearly N0 4 1 + ξ Ω
with N. Therefore, for large enough N, DCP can ensure secure 0.3944 4.24
communication at a nonzero rate between the SNs and the FC − − 2 (17)
N N
even when the channels from the SNs to the FC are weaker
than the channels from the SNs to the EVE. Under high SNR, for independent and non-identically distributed (i.n.d.) and
we can approximate the lower bound on the achievable ergodic i.i.d. channels, respectively.
secrecy rate for identically distributed channels as Proof: See Appendix C
πΩ 0.3944 4.24 + Since the channels between the EVE and the SNs are
Rs ≈ η p log2 N − − 2 . (14) independent of the CSI at the SNs, the channel statistics for
4 Δ N N
the the EVE’s channel remain unaltered under practical DCP.
In other words, as the SNR increases, the secure commu- Theorem 2: The ergodic secrecy rates for DCP based on
nication rate saturates to a value that depends only on the estimated channels can be approximated as
number of SNs participating in the DCP, and is independent of
the SNR. ⎛ ⎞
πEs ξ Ω1,i ξ Ω1,k
N 2 2
Rs ≥ η p log2 ⎝ ⎠
B. Practical DCP 4N0 1 + ξ Ω1,i 1 + ξ Ω1,k
i,k=1
In practice, the SNs need to estimate the CSI using pilot +
3 E s
N
symbols transmitted by the FC. In this section, we analyze − 2E[ψ̄]+ E[ψ̄ 2 ]− − log2 1 + Δ1,i ,
the effect of channel estimation errors on the secrecy rates of 2 N0
i=1
DCP systems. The actual channel from the i th SN to the FC, (18)
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:30:57 UTC from IEEE Xplore. Restrictions apply.
2666 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 14, NO. 10, OCTOBER 2019
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:30:57 UTC from IEEE Xplore. Restrictions apply.
CHOPRA et al.: PHYSICAL LAYER SECURITY IN WSNs USING DISTRIBUTED CO-PHASING 2667
between the i th SN and the kth FC antenna is computed at Lemma 4: The achievable rate over the main channel can
the i th SN as be lower bounded as
⎛ ⎞
kMp
M p E p Ωki K
πEs
N
âk,i = qi [n]. (29) Rm ≥ η p,K log2 ⎝ Ωki Ωkm ⎠
N0 + M p E p Ωki 4K N0
n=(k−1)M p +1 k=1 i,m=1
This is used to obtain the gain and phase estimates for the
+ E log2 (det (Ψ )) . (36)
corresponding channel as α̂k,i = |âk,i | and
âk,i where
θ̂k,i = tan−1 , (30)
âk,i Ψ D−1 H H H. (37)
respectively. Compensating for the estimated phase to each of and
the FC antennas, the i th SN then transmits the symbol x i [n] ⎛⎡ ⎤K ⎞
given as π ⎜
N
⎟
D= 2
diag ⎝⎣ Ωki Ωkm ⎦ ⎠, (38)
4N
Es
K
i,m=1
x i [n] = sk [n]e− j θ̂k,i , n = K M p +1, . . . , M, (31) k=1
K
k=1 Proof: See Appendix D
Note that the transmit energy is normalized w.r.t. the number Now, the diagonal entries of H correspond to weighted sums
of streams being used. In the following subsections, we discuss of Rayleigh random variables, and the off-diagonal entries
the received signal model and the achievable ergodic secrecy correspond to ZMCSCG random variables. Therefore, it is
rates for the ideal and practical DCP cases. not possible to determine the distribution of log2 (det(Ψ )) in
closed form. Hence, this term is evaluated for i.i.d. channels
using Monte Carlo simulations as
B. Ergodic Secrecy Rate With Ideal DCP
1
We first calculate the ergodic secrecy achievable rate over E log2 (det (Ψ )) ≈ − 2.2K 2 − 1.8K (39)
the main channel, for which the signal received by the kth FC N
antenna is It is observed that the variances of both the diagonal and off-
diagonal entries of H decay as N1 , and therefore the entries
N
yk [n] = ak,i x i [n] + wk [n] of H concentrate around their expected values as N increases,
i=1
resulting in the functions of H, Ψ and log2 (det (Ψ )) concen-
trating around their means. This is evident in the behavior of
Es
K N
= sm [n] αk,i e j (θk,i −θm,i ) + wk [n]. (32) the simulated lower bound on log2 (det (Ψ )). Therefore, the
K achievable rate over the main channel, for i.i.d. channels can
m=1 i=1
be evaluated as
Letting h km = 1
αk,i e j (θk,i −θm,i ) denote the effective
N
N i=1 N 2 Es π 1
channel coefficient between the kth FC antenna and the Rm ≥ K η p,K log2 Ω − (2.2K −1.8) . (40)
mth stream of data, we can write (32) as K N0 4 N
A comparison of the behavior of the achievable rates over
Es
K
Es the main channel with the derived bound for different values
yk [n] = N h kk sk [n] + N h km sm [n] + wk [n].
K K
m=1;m =k
of K and N for NEs0 = 1 is plotted in Fig. 1. The plot
(33) illustrates that the achievable rate increases linearly in K
and logarithmically in N, as expected from (40). It is also
Equivalently, the vector signal received at the FC, y[n] interesting that for K = 1 and moderately large values
[y1 [n], y2 [n], . . . , y K [n]]T , can be written as of N, this bound closely approximates the bound derived for
the single stream case.
y[n] = NHs[n] + w[n], (34) Considering the EVE’s channel, we can write the received
where H is the effective channel matrix with its (k, m)th entry signal at the lth EVE antenna as
equal to h km , and s[n] [s1 [n], s2 [n], . . . , s K [n]]T is the
Es
K
data vector. Assuming the data across different streams to be z l [n] = N glk sk [n] + vl [n] (41)
independent, i.e., E[s[n]s H [n]] = I K , the ergodic achievable K
k=1
rate over the main channel is given by [33] N − j θk,i
where glk 1
N is ZMCSCG with E[|glk |2 ] =
i=1 bl,i e
N 2 Es H N
i=1 Δli .
1
Rm = η p,K E H log2 det I K + H H , (35) N2
K N0 The signal received at the EVE’s channel can be written as
M−K M
with η p,K = p
. A lower bound on (35) can be Es
M z[n] = N Gs[n] + v[n], (42)
obtained using Lemma 4. K
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:30:57 UTC from IEEE Xplore. Restrictions apply.
2668 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 14, NO. 10, OCTOBER 2019
N ξ Ωki
where ĥ kk = 1
N i=1 1+ξ Ωki α̂ki , h̃ kk = 1
N
Ωki
N
i=1 1+ξ Ωki ãki e− j θ̂ki , h̄ kk = ĥ kk + h̃ kk and h̄ km =
1 N − j θ̂mi ,
N i=1 aki e and equivalently, the received signal
vector can be written as,
Es
y[n] = H̄s[n] + w[n]. (48)
K
The rate achievable over the channel described by (48) can be
lower bounded using Lemma 6.
Lemma 6: The achievable rate on the main channel is
Rm ≥ η p,K E log2 (det (Ψ ))
⎛ ⎞
K
πE N
Ω 2 Ω 2
log2 ⎝ ⎠
s ki km
+
4K N0 1 + ξ Ωki 1 + ξ Ωkm
Fig. 1. The Achievable data rates for the main multi-stream DCP channel k=1 i,m=1
for different numbers of SNs and FC antennas. (49)
where G denotes the effective channel with (l, k)th entry glk . for i.n.d. channels, and
Lemma 5 presents an upper bound on the achievable rate over
the channel described in (42). N 2 Es π Ω 2 1
Rm ≥ K η p,K × log2 − (2.2K −1.8) .
Lemma 5: The achievable rate over the EVE’s channel can K N0 4 1+ξ Ω N
be upper bounded as (50)
N LEs Δ for i.i.d. channels, with
Re ≤ K log2 1 + , (43)
K N0 ⎛⎡ ⎤K ⎞
where Δ N1L l=1 L N π N
Ωki
2 Ωkm
2
i=1 Δli . D=
⎜
diag ⎝⎣ ⎦ ⎟⎠ (51)
Proof: See Appendix E 4N 2 1 + ξ Ωki 1 + ξ Ωkm
i,m=1 k=1
Theorem 4: The achievable ergodic secrecy rate for multi-
stream DCP with perfect CSI at the SNs, and a K antenna and
FC is given by
Ψ D−1 H̄ H H̄ (52)
N 2 Es π
Rs ≥ η p,K K log2 Ω
K N0 4 Proof: See Appendix F
+ Therefore, the achievable secrecy rate of multistream
NEs 1
− log2 1 + LΔ − (2.2K − 1.8) . (44) DCP under estimated channels can be lower bounded using
K N0 N
Theorem 5.
Under high SNRs, this can be approximated as Theorem 5: The achievable ergodic secrecy rates for i.n.d
+
ΩNπ 1 and i.i.d. channels with practical multi-stream DCP are given
Rs ≈ η p,K K log2 − (2.2K −1.8) . (45) by
Δ L 4 N
Therefore, multi-stream DCP with K FC antennas can achieve Rs ≥ η p,K
is approximately K times the ergodic secrecy achievable rate ⎛ ⎞
K N
by single stream DCP in the presence of the same number of πE Ωki
2 Ωkm
2
log2 ⎝ ⎠
s
×
eavesdroppers. 4K N0 1 + ξ Ωki 1 + ξ Ωkm
k=1 i,m=1
+
C. Ergodic Secrecy Rate With Estimated Channels NEs
+ E log2 (det (Ψ )) − K log2 1 + LΔ (53)
The channel coefficient between the kth antenna at the FC K N0
and the i th SN is given as and
ξ Ωki j (θˆki ) Ωki N 2 Es π Ω 2
ak,i = α̂ki e + ãki (46) Rs ≥ K η p,K log2
1 + ξ Ωki 1 + ξ Ωki K N0 4 1 + ξ Ω
+
with ãki ∼ CN (0, 1). The signal received at the kth FC 1 NEs
− (2.2K −1.8)−log2 1+ LΔ , (54)
antenna is therefore given as N K N0
Es
K respectively.
Es
yk [n] = N h̄ kk sk [n] + N h̄ km sm [n] + wk [n], Therefore, by using K antennas at the FC and transmitting K
K K
m=1
m =k
data streams, the achievable secrecy rate over a DCP channel
(47) can be scaled up approximately K times.
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:30:57 UTC from IEEE Xplore. Restrictions apply.
CHOPRA et al.: PHYSICAL LAYER SECURITY IN WSNs USING DISTRIBUTED CO-PHASING 2669
V. M ULTI -S TREAM DCP W ITH C ONSTRAINED Therefore, the achievable rate over the main channel can be
M AXIMAL R ATIO T RANSMISSION lower bounded as,
⎛ 2 ⎞
In the previous section, we considered the case where each N ΩEs
2 Γ (K + 1
)
SN allocates equal power, Es /K , to each of the transmitted Rm ≥ η p,K K log2 ⎝ 2 ⎠
N0 Γ (K + 1)
streams. However, from the initial training phase, the nodes
have an estimate of the magnitude of the channel to each of the K −2 K
FC antennas. They can potentially use this knowledge to allot − − (1.11K − 1.28) . (59)
2 N
power across the K data streams, while meeting an overall
transmit per-node power constraint, and thereby improve their For the wiretap channel, the signal received by the lth
data rates. In this section, we evaluate the achievable ergodic EVE can be written as
secrecy rates with maximal ratio transmission based power K
allocation across the streams. z l [n] = N Es glm sm [n] + wk [n] (60)
We again consider N single antenna SNs reporting to a m=1
K antenna FC. If the average energy expended per symbol N bli αmi j (−θmi )
with glm = N1 i=1
per node is Es , and the estimated channel gains at the i th α i 2 e .
Lemma 8: The achievable rate over the eavesdroppers
SN are represented using the vector α̂ i = [α̂1i , . . . , α̂ K i ]T , channel with maximal ratio beam-forming is given as
then the energy allocated by the i th node for the kth stream
α̂ 2 N L Es
is Es α̂ ki2 . Therefore, the symbol transmitted by the i th node Re ≤ η p,K K log2 1 + Δ . (61)
i 2 K N0
can be expressed as
Proof: ]
E[glm = 0, and E[|glm |2 ] =
K
α̂ki αmi
2 αmi
2
sk [n]e− j θ̂ki .
N
i=1 E[|bli | ]E α i 2 . Since α i 2 is a beta distributed
1 2
x i [n] = Es (55) N2
α̂ i 2
2
2
k=1
αmi
2
Note that, as in the previous sections, each SN still transmits random variable, E = K1 , hence, E[|glm |2 ] = KΔN ,
2α i 2
its data with a total power Es across the K streams. Here, where Δ is as defined earlier.
we limit the discussion to the case of i.i.d. channels. The case Theorems 6 and 7 can be used to obtain bounds on the
of i.n.d. channels is analytically intractable due to the form achievable secrecy rates with and without CSI estimation
of the random variables involved, and is beyond the scope of errors in this case.
this paper. Theorem 6: The achievable secrecy rate for ideal DCP with
With ideal DCP, the signal received at the kth FC antenna maximal ratio transmission is
⎛ ⎛ 2 ⎞
is given by
N 2 ΩE Γ (K + 12 )
Rs ≥ K ⎝log2 ⎝ ⎠
s
K
N0 Γ (K + 1)
yk [n] = N Es h kk sk [n] + N Es h km sm [n]+wk [n] (56)
m=1 1
m =k − (1.11K − 1.28)
N
+
N α2 N αki αmi j (θki −θmi ) N L Es K −2
where h kk = N1 i=1 α i 2 , h km = N
ki 1
i=1 α i 2 e . − log2 1 + Δ − η p,K . (62)
K N0 2
We can use Lemma 7 to lower bound the achievable rate
over the main channel. Theorem 7: The achievable secrecy rate for practical DCP
Lemma 7: The achievable rate over the main channel can with maximal ratio transmission is
⎛ ⎛ 2 ⎞
be lower bounded as
⎛ N Es ξ Ω
2 2 Γ (K + 1
)
2 ⎞ Rs ≥ K ⎝log2 ⎝ 2 ⎠
N 2 ΩE Γ (K + 12 ) N0 1 + ξ Ω Γ (K + 1)
Rm ≥ K log2 ⎝ ⎠ +log2 (det(Ψ )) η p,K ,
s
N0 Γ (K +1) 1
− (1.11K − 1.28)
(57) N
+
N L Es K −2
Γ (K +1)
2 − log2 1 + Δ − η p,K . (63)
where Ψ = 1
Ω H H H, and H is the effective K N0 2
Γ (K + 21 )
channel matrix with (k, m)th entry h km .
Proof: See Appendix G VI. S ECURING M ULTI -S TREAM DCP U SING
It is not possible to determine the distribution or the A DDED A RTIFICIAL N OISE
moments of log2 (det(Ψ )) in closed form. Using Monte Carlo In the previous sections, we have considered the achievable
simulations similar to the previous section, we evaluate this secrecy rates of a DCP system that is unaware of the existence
term as of eavesdroppers in the network. However, in case the presence
K −2 K of an eavesdropper is known, then the SNs can use additional
log2 (det(Ψ )) ≥ − − (1.11K − 1.28) . (58)
2 N physical layer security techniques with the transmitted data to
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:30:57 UTC from IEEE Xplore. Restrictions apply.
2670 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 14, NO. 10, OCTOBER 2019
further improve the achievable secrecy rates for the DCP chan-
nel. One such technique is the addition of artificial noise to the
transmitted signal [34]–[36]. Here, the nodes transmit artificial
noise using a fraction of the transmitted power, to reduce
the achievable rate at the eavesdropper. It is conventional to
assume that the artificial noise is transmitted in the null space
of the effective channel matrix. This beam alignment is not
possible for DCP due to the unavailability of receive degrees
of freedom.
However, if the SNs generate and add independent noise
samples to their transmitted signals using a fraction of the
transmitted power, then the artificial noise does not have the
same array gain as the intended signal, limiting its detrimental
effects at the FC. Also, since the eavesdroppers do not achieve
the DCP array gain, as discussed in the preceding sections,
the use of artificial noise affects the eavesdroppers more than
the FC. In this case, determining the fraction of power to Fig. 2. Achievable secrecy rates for a single antenna, single eavesdropper
system, with N = 50 SNs.
be transmitted as artificial noise becomes important. In this
section, we determine the optimal fraction of power to be used !! " "
with p!! = "(ΩΔEs2 + ΩEs N0 )! NKL −"1 ΩΔE"s2 −
for transmitting artificial noise for an i.i.d. channel. We omit
ΩΔEs2 NKL − 2 ΩΔEs2 − ΩEs N0 + NKL − 1 ΔEs N0 , q =
the similar case of i.n.d. channels for brevity.
2ΩΔEs2 (ΩΔEs2 + ΩEs N0 + ΔEs N0 + N02 ), r =
Now, in general, the achievable secrecy rate of a K stream
(ΩΔEs2 ΩEs N0 )(ΩΔEs2 + ΩEs N0 + ΔEs N0 + N02 ). Out
MS-DCP system with L colluding eavesdroppers, without any
of the two solutions of (68), the one satisfying 0 ≤ μ ≤ 1,
artificial noise being added, can be expressed as
optimizes the achievable secrecy rate of the DCP system in
N 2 Es the presence of eavesdroppers.
Rs ≥ η p,K K log2 λm Ω
K N0
+
N L Es VII. S IMULATION R ESULTS
− log2 1 + Δ − f c (K ) , (64)
K N0 In this section, we substantiate the results derived in the
where λm is a scale factor depending on the scheme and previous sections using Monte Carlo simulation experiments.
channel conditions, and f c (K ) is a function of the number We also use these results to compare the secrecy rate perfor-
of streams. Letting a fraction 1 − μ of the total power be mance of the different multi-stream DCP techniques discussed
allotted to artificial Gaussian noise, the signal transmitted by in the paper.
the i th SN at the nth instant can be written as We assume that the FC transmits training symbols at an
SNR of 10 dB, followed by data transmission from the
μEs
K
SNs to the FC using DCP. We assume a frame length (M)
x i [n] = sk [n]e− j θ̂k,i + (1 − μ)Es νi [n]. (65)
K of 100 channel uses and M p = 1 pilot per stream. Simulations
k=1
are then carried out for different values of data SNRs, num-
where νi [n] is the artificial noise generated by the i th SN. It ber of eavesdroppers, etc. The achievable rate performances
can be shown that achievable secrecy rate over the channel is are obtained by averaging over 10, 000 independent channel
given as, realizations.
N2 μΩEs In Fig. 2, we plot the achievable secrecy rates for a single
Rs ≥ η p,K K log2 λm stream DCP system with N = 50 SNs in the presence of a
K (1 − μ)Ω + N0
+ single eavesdropper, against the per node SNR, for different
NL μΔEs
− f c (K )− log2 1+ . (66) ratios of Ω and Δ. It is observed that a DCP system is able
K (1−μ)ΔEs + N0 to deliver nonnegative rates, even when the EVEs channel
Since λm and f c (K ) are independent of μ, the achievable is 10 dB stronger than the main users’ channel, and the
secrecy rate can be maximized by maximizing the fraction simulated results closely follow the derived bounds.
μΩ Es In Fig. 3, we plot the achievable secrecy rates for a three
(1−μ)Ω Es +N0 stream (K = 3) DCP system with N = 20 against the
T (μ) = μΔEs
. (67)
1 + NKL (1−μ)Δ Es +N0
number of eavesdroppers in the system, for different SNRs,
such that Ω = 10Δ. The system performance is observed
in terms of μ. It can be observed that for N > L > K and
to decay with an increase in the number of eavesdroppers,
Ω > Δ, this is a monotonically increasing function of μ,
under all cases, which is in accordance with the derived results.
and is therefore maximized for μ = 1. On the other hand,
Again, the simulated results are observed to follow the derived
for Δ > Ω, it can be shown that the optimal μ can be obtained
bounds.
by solving the quadratic equation
In Fig. 4, we plot the achievable secrecy rates for a multi-
pμ2 + qμ + r = 0, (68) stream DCP system with different numbers of streams, in the
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:30:57 UTC from IEEE Xplore. Restrictions apply.
CHOPRA et al.: PHYSICAL LAYER SECURITY IN WSNs USING DISTRIBUTED CO-PHASING 2671
Fig. 3. Achievable secrecy rates for three stream DCP system for different Fig. 5. Achievable secrecy rates for an MRT multi-stream DCP system for
numbers of eavesdroppers, with N = 20 SNs. N = 50 and 5 eavesdroppers at different SNRs.
Fig. 6. Achievable secrecy rates for a single user two eavesdropper system
Fig. 4. Achievable secrecy rates for a multi-stream DCP system for different for different amounts of added artificial noise.
numbers of SNs at a data SNR of 0 dB, with 10 eavesdroppers and Ω = 10Δ.
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:30:57 UTC from IEEE Xplore. Restrictions apply.
2672 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 14, NO. 10, OCTOBER 2019
!4 "
ratio transmission, and showed that this can further improve E[ψ] = 1 + 1
N π − 1 and
the secrecy rates achievable by mutlistream DCP. We also
1 24 1 72 24
studied the effect of adding artificial noise. We found that E[ψ 2 ] = 1 + − 6 + 2 29 − + 2
artificial noise can improve the secrecy rates of a DCP system N π N π π
1 48 48
if the eavesdroppers’ channel is stronger than the main chan- − 3 24 − − 2 . (76)
nel. Finally, via simulation experiments, we illustrated that the N π π
simulated achievable rates closely follow the derived bounds. Consequently,
−1 4 1
A PPENDIX A E[log2 (ψ)] ≥ log2 (e) − 1 − 2 log2 (e)
N π N
P ROOF OF L EMMA 1 72 24 −0.3944 4.24
× 29 − + 2 ≈ − 2 . (77)
From (5) we note that, π π N N
1
N
π A PPENDIX B
E[h 1 ] = Ω1,i , (69) P ROOF OF L EMMA 2
N 4
i=1
By the definition of g1 ,
π
N
1
var(h 1 ) = 2 1 − Ω1,i , (70) 1
N
1
N
N 4 E[|g1|2 ] = E[b 2
] = Δ1,i . (78)
i=1 1,i
N2 N2
when the channels are non identically distributed and E[h 1 ] = i=1 i=1
! " ! "
π π Ω
4 Ω; var(h 1 ) = 1 − 4 N , when the channels are identi-
Defining Δ N1 i=1 N
Δ1,i , we have g1 ∼ CN 0, Δ N , and
cally distributed. the ergodic achievable rate of EVE’s channel can be calculated
The ergodic achievable rate over the main channel under as [33]
the assumptions of the channel being memoryless, and the
M − Mp N 2 Es
additive noise being Gaussian, can be calculated as [33], [37] Re = E g1 log2 1 + |g1|2 . (79)
M N0
M − Mp N 2 Es Using Jensen’s inequality [37], we get
Rm = E h 1 log2 1 + |h 1 |2
M N0 M − Mp N 2 Es
Re ≤ log2 1 + E[|g1|2 ] ,
M − Mp N Es
2 (80)
≥ E h 1 log2 |h 1 |2 . (71) M N0
M N0
leading to (10).
4N 2√
Defining ψ N N |h 1 |2 , A PPENDIX C
π i=1 m=1 Ω1,i Ωm,i
P ROOF OF L EMMA 3
π Es
N N
M − Mp The signal received at the FC can be written as
Rm ≥ × log2 Ω1,i Ωm,i
M 4 N0
i=1 m=1 y[n] = N Es ĥ 1 s[n] + N Es h̃ 1 s[n] + w[n], (81)
+ E[log2 (ψ)] . (72) where ĥ 1 = 1 N ξ Ω1,i
α̂1,i and h̃ 1 = 1 N
N i=1 1+ξ Ω1,i N i=1
Ω1,i
Since ψ is the square of a weighted combination of 1+ξ Ω1,i ã1,i e− j θ̂1,i .
Rayleigh random variables its distribution is not obtainable in N Ω1,i
Now, E[h̃ 1 ] = 0, E[|h̃ 1 |2 ] = 1
i=1 1+ξ Ω1,i , E[ĥ 1 ] =
a closed form for N > 2. Therefore, the term E[log2 (ψ)] can- N2
π ξ Ω1,i
2
not be computed in a closed form. However, since log2 (ψ) ≥ 1
N
N
i=1 4 1+ξ Ω1,i , and
log2 (e) (ψ − 1) − (ψ−1)
2
2 ,
1 ξ Ω1,i
N 2
E[ψ 2 ] 3 E[|ĥ 1 |2 ] =
E[log2 (ψ)] ≥ log2 (e) 2E[ψ] − − . (73) N2 1 + ξ Ω1,i
i=1
2 2
π
N N
ξ Ω1,i
2 ξ Ω1,k
2
Now, + (82)
4N 2 1+ξ Ω1,i 1+ξ Ω1,k
i=1 k=1;k =i
4N 2
E[ψ] = N N E[|h 1 |2 ] (74) for non identically distributed channels. When the channels
π i=1 m=1 Ω1,i Ωm,i are i.i.d.,
and
π ξΩ2
E[ĥ 1 ] = , (83)
16N 4 4 1 + ξΩ
E[ψ 2 ] = 2
E[|h 1 |4 ] (75) 1 π N −1 ξΩ 2
π2 N N
Ω1,i Ωm,i E[|ĥ 1 |2 ] = + . (84)
i=1 m=1 N 4 N 1 + ξΩ
that can be simplified to (8) and (9) respectively. For identi- At the FC, an accurate estimate of the effective DCP channel
cally distributed channels, these can further be simplified as, h̄ 1 = ĥ 1 + h̃ 1 is required for data decoding. Using the fact
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:30:57 UTC from IEEE Xplore. Restrictions apply.
CHOPRA et al.: PHYSICAL LAYER SECURITY IN WSNs USING DISTRIBUTED CO-PHASING 2673
that the h̄ 1 has a positive real part with high probability, it has A PPENDIX E
been shown in [16] that it can be accurately estimated at the P ROOF OF L EMMA 5
FC using the data symbols transmitted by the SNs. That is, The vector signal received across all the eavesdroppers is
the channel estimation at the FC is blind, i.e., it does not
z[n] = N EKs Gs[n] + v[n], where G denotes the effective
require transmission of pilot symbols from the SNs. Defining
channel with (l, k)th entry glk . The achievable rate over the
4 N2 EVEs’ channel becomes [33]
ψ̄ = |h̄|2 , (85)
π N N ξ Ω1,i
2 ξ Ω1,k
2
N 2 Es H
i=1 k=1 1+ξ Ω1,i 1+ξ Ω1,k Re = E log2 det I K + G G
K N0
# K $
we can use an approach similar to the one discussed in N Es
2
Appendix A to obtain (16) and (17). (a) E
≤ log2 1 + gk 2
K N0
k=1
A PPENDIX D N 2 Es
K
P ROOF OF L EMMA 4 (b)
≤ log2 1 + E gk 2
K N0
The diagonal and off diagonal entries of H follow different k=1
distributions, and their individual statistics are required to
K
Es
L N
= log2 1 + Δli
evaluate (35). Looking at diagonal entries first, we have K N0
k=1 l=1 i=1
1
N N LEs Δ
h kk = αk,i , (86) = K log2 1 + . (95)
N K N0
i=1
In the above, inequality (a) is the result of the upper bound
consequently, on the log det(.) function [38], and the inequality (b) is due
1
N to Jensen’s inequality [37].
π
E[h kk ] = Ωki , (87)
N 4
i=1 A PPENDIX F
1 N
π
N
N P ROOF OF L EMMA 6
E[h 2kk ] = Ωki + Ωkm Ωki , (88)
N2 4N 2 It can be shown that
i=1 m=1;m =i
N
i=1
and 1 π ξ Ωki
E[ĥ kk ] = Ωki , (96)
N 4 1 + ξ Ωki
π
N i=1
1
var(h kk ) = 1− Ωki (89) 1 N
ξ Ωki
2
N2 4 E[|ĥ kk |2 ] =
i=1
N 1 + ξ Ωki
for i.n.d. channels, and i=1
π
N N
π ξ Ωki
2 ξ Ωkm
2
E[h kk ] = Ω, (90) + ,
4 4N 2 1 + ξ Ωki 1 + ξ Ωkm
i=1 m=1;m =i
π 1 π (97)
E[h 2kk ] = Ω+ 1− Ω, (91)
1 Ωki
4 N 4 N
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:30:57 UTC from IEEE Xplore. Restrictions apply.
2674 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 14, NO. 10, OCTOBER 2019
We have shown in [17] that the effective channel matrix H̄ [9] R. Mudumbai, J. Hespanha, U. Madhow, and G. Barriac, “Distributed
contains positive real numbers on its main diagonal with high transmit beamforming using feedback control,” IEEE Trans. Inf. Theory,
vol. 56, no. 1, pp. 411–426, Jan. 2010.
probability, and can be blindly estimated at the FC using [10] K. C. K. V, R. Annavajjala, and C. R. Murthy, “Comparative analysis
covariance based channel estimation. Defining D and Ψ as (51) of pilot-assisted distributed cophasing approaches in wireless sensor
and (52), the above results can be used to obtain Lemma 7. networks,” IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3722–3737,
Aug. 2011.
[11] M. M.-U. Rahman, R. Mudumbai, and S. Dasgupta, “Consensus based
A PPENDIX G carrier synchronization in a two node network,” IFAC Proc. Vol., vol. 44,
P ROOF OF L EMMA 7 no. 1, pp. 10038–10043, Jan. 2011.
[12] S. Zhou and G. B. Giannakis, “How accurate channel prediction needs
Since the phase of h km is uniformly distributed, to be for transmit-beamforming with adaptive modulation over Rayleigh
E[h km ] = 0 m = k, and MIMO channels?” IEEE Trans. Wireless Commun., vol. 3, no. 4,
# $ pp. 1285–1294, Jul. 2004.
1 √ Γ (K + 12 )
N
αki
2 [13] P. Fertl, A. Hottinen, and G. Matz, “Perturbation-based distributed
E[h kk ] = E (a) Ω . (103) beamforming for wireless relay networks,” in Proc. IEEE GLOBECOM,
N α i 2 = Γ (K + 1) Nov. 2008, pp. 1–5.
i=1
[14] C. Lin, V. V. Veeravalli, and S. P. Meyn, “A random search framework
A proof for (a) is given in [39]. Further, for convergence analysis of distributed beamforming with feedback,”
# $ IEEE Trans. Inf. Theory, vol. 56, no. 12, pp. 6133–6141, Dec. 2010.
1
N
2 αki
2 α2
mi [15] M. K. Banavar, A. D. Smith, C. Tepedelenlioglu, and A. Spanias,
E[|h km | ] = 2 E . (104) “On the effectiveness of multiple antennas in distributed detection
N α i 22
i=1 over fading MACs,” IEEE Trans. Wireless Commun., vol. 11, no. 5,
pp. 1744–1752, May 2012.
For K = 2, it can be shown that [40] [16] A. Manesh, C. R. Murthy, and R. Annavajjala, “Physical layer
3 1 Ω data fusion via distributed co-phasing with general signal constella-
E[|h km |2 ] = 2 F1 1, 2; ; − (105) tions,” IEEE Trans. Signal Process., vol. 63, no. 17, pp. 4660–4672,
2 2 N Sep. 2015.
[17] R. Chopra, C. R. Murthy, and R. Annavajjala, “Multistream distributed
where 2 F1 (·, ·; ·; ·) is the Gauss hypergeometric function [41]. cophasing,” IEEE Trans. Signal Process., vol. 65, no. 4, pp. 1042–1057,
For K ≥ 3, E[|h km |2 ] cannot be evaluated in closed form. Feb. 2017.
α2 α2 [18] R. Chopra, R. Annavajjala, and C. R. Murthy, “Distributed cophasing
However, when K is large, α iki2 and αmi i 2
can be treated as
with autonomous constellation selection,” IEEE Trans. Signal Process.,
being approximately independent. Under this approximation, vol. 65, no. 21, pp. 5798–5811, Nov. 2017.
we have: [19] S. Shafiee, N. Liu, and S. Ulukus, “Towards the secrecy capacity of the
2 Gaussian MIMO wire-tap channel: The 2-2-1 channel,” IEEE Trans. Inf.
Ω Γ (K + 1
) Theory, vol. 55, no. 9, pp. 4033–4039, Sep. 2009.
E[|h km |2 ] ≈ 2
. (106) [20] X. Chen, D. W. K. Ng, W. Gerstacker, and H. H. Chen, “A survey on
N Γ (K + 1) multiple-antenna techniques for physical layer security,” IEEE Commun.
Surveys Tuts., vol. 19, no. 2, pp. 1027–1053, 2nd Quart., 2016.
Also, from [39] [21] A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8,
# $ # $ pp. 1355–1387, Oct. 1975.
1 α 4
ki (N − 1) α 2
ki [22] S. Gerbracht, C. Scheunert, and E. A. Jorswieck, “Secrecy outage
E[h 2kk ] = E + E2
N α i 22 N α i 2 in MISO systems with partial channel information,” IEEE Trans. Inf.
⎛ 2 ⎞
Forensics Security, vol. 7, no. 2, pp. 704–716, Apr. 2012.
[23] M. Soltani and H. Arslan, “Randomized beamforming with generalized
Ω⎝ 2 Γ (K + 12 )
= + (N − 1) ⎠. (107) selection transmission for security enhancement in MISO wiretap chan-
N K −1 Γ (K + 1) nels,” IEEE Access, vol. 6, pp. 5589–5595, 2018.
[24] N. Romero-Zurita, M. Ghogho, and D. McLernon, “Outage probability
based power distribution between data and artificial noise for physical
R EFERENCES layer security,” IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71–74,
Feb. 2012.
[1] J. Voas, “Demystifying the Internet of Things,” Computer, vol. 49, no. 6, [25] N. S. Ferdinand, D. B. da Costa, A. L. F. de Almeida, and
pp. 80–83, Jun. 2016. M. Latva-Aho, “Physical layer secrecy performance of TAS wiretap
[2] M. A. Razzaque, M. Milojevic-Jevric, A. Palade, and S. Clarke, “Middle- channels with correlated main and eavesdropper channels,” IEEE Wire-
ware for Internet of Things: A survey,” IEEE Internet Things J., vol. 3, less Commun. Lett., vol. 3, no. 1, pp. 86–89, Feb. 2014.
no. 1, pp. 70–95, Feb. 2016. [26] P. Zhao, M. Zhang, H. Yu, H. Luo, and W. Chen, “Robust beamforming
[3] J.-F. Chamberland and V. V. Veeravalli, “Wireless sensors in distributed design for sum secrecy rate optimization in MU-MISO networks,” IEEE
detection applications,” IEEE Signal Process. Mag., vol. 24, no. 3, Trans. Inf. Forensics Security, vol. 10, no. 9, pp. 1812–1823, Sep. 2015.
pp. 16–25, May 2007.
[4] Y.-S. Tu and G. J. Pottie, “Coherent cooperative transmission from [27] X. Chen and H.-H. Chen, “Physical layer security in multi-cell MISO
multiple adjacent antennas to a distant stationary antenna through downlinks with incomplete CSI—A unified secrecy performance analy-
AWGN channels,” in Proc. VTC Spring, May 2002, pp. 130–134. sis,” IEEE Trans. Signal Process., vol. 62, no. 23, pp. 6286–6297,
[5] F. Jameel, S. Wyne, and I. Krikidis, “Secrecy outage for wireless Dec. 2014.
sensor networks,” IEEE Commun. Lett., vol. 21, no. 7, pp. 1565–1568, [28] Q. Xiong, Y. Gong, Y.-C. Liang, and K. H. Li, “Achieving secrecy
Jul. 2017. of MISO fading wiretap channels via jamming and precoding with
[6] J. Zhu, Y. Zou, and B. Zheng, “Physical-layer security and reliability imperfect channel state information,” IEEE Wireless Commun. Lett.,
challenges for industrial wireless sensor networks,” IEEE Access, vol. 5, vol. 3, no. 4, pp. 357–360, Aug. 2014.
pp. 5313–5320, 2017. [29] M. R. A. Khandaker, C. Masouros, and K.-K. Wong, “Constructive
[7] R. Mudumbai, D. R. B. Iii, U. Madhow, and H. V. Poor, “Distributed interference based secure precoding: A new dimension in physical
transmit beamforming: Challenges and recent progress,” IEEE Commun. layer security,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 9,
Mag., vol. 47, no. 2, pp. 102–110, Feb. 2009. pp. 2256–2268, Sep. 2018.
[8] R. Mudumbai, G. Barriac, and U. Madhow, “On the feasibility of [30] A. Zappone, P.-H. Lin, and E. A. Jorswieck, “Energy-efficient secure
distributed beamforming in wireless networks,” IEEE Trans. Wireless communications in MISO-SE systems,” in Proc. 48th Asilomar Conf.
Commun., vol. 6, no. 5, pp. 1754–1763, May 2007. Signals, Syst. Comput., Nov. 2014, pp. 1001–1005.
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:30:57 UTC from IEEE Xplore. Restrictions apply.
CHOPRA et al.: PHYSICAL LAYER SECURITY IN WSNs USING DISTRIBUTED CO-PHASING 2675
[31] J. Li and A. P. Petropulu, “On ergodic secrecy rate for Gaussian MISO Chandra R. Murthy (S’03–M’06–SM’11) received
wiretap channels,” IEEE Trans. Wireless Commun., vol. 10, no. 4, the B.Tech. degree in electrical engineering from
pp. 1176–1187, Apr. 2011. IIT Madras, India, in 1998 and the M.S. and Ph.D.
[32] J. Li and A. P. Petropulu, “Ergodic secrecy rate for multiple-antenna degrees in electrical and computer engineering from
wiretap channels with Rician fading,” IEEE Trans. Inf. Forensics Secu- Purdue University and the University of California,
rity, vol. 6, no. 3, pp. 861–867, Sep. 2011. San Diego, CA, USA, in 2000 and 2006, respec-
[33] D. Tse and P. Viswanath, Fundamentals of Wireless Communication. tively.
New York, NY, USA: Cambridge Univ. Press, 2005. From 2000 to 2002, he was an Engineer at Qual-
[34] E. Tekin and A. Yener, “The general Gaussian multiple-access and two- comm Inc., where he worked on WCDMA baseband
way wiretap channels: Achievable rates and cooperative jamming,” IEEE transceiver design and 802.11b baseband receivers.
Trans. Inf. Theory, vol. 54, no. 6, pp. 2735–2751, Jun. 2008. From 2006 to 2007, he was a Staff Engineer at
[35] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Beceem Communications Inc., where he was involved on advanced receiver
Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008. architectures for the 802.16e Mobile WiMAX standard. In 2007, he joined
[36] W. Wang, K. C. Teh, and K. Li, “Artificial noise aided physical the Department of Electrical Communication Engineering, Indian Institute of
layer security in multi-antenna small-cell networks,” IEEE Trans. Inf. Science, Bengaluru, India, where he is currently a Professor. His research
Forensics Security, vol. 12, no. 6, pp. 1470–1482, Jun. 2017. interests are in the areas of energy harvesting communications, multiuser
[37] T. M. Cover and J. A. Thomas, Elements of Information Theory (Wiley MIMO systems, and sparse signal recovery techniques applied to wireless
Series in Telecommunications and Signal Processing). Hoboken, NJ, communications. His paper won the Best Paper Award in the Communications
USA: Wiley, 2006. Track at NCC 2014, and a paper co-authored with his student won the
[38] A. F. Molisch, M. Z. Win, Y.-S. Choi, and J. H. Winters, “Capacity of Student Best Paper Award at the IEEE ICASSP 2018. He has over 50 journal
MIMO systems with antenna selection,” IEEE Trans. Wireless Commun., papers and over 80 conference papers to his credit. He was an Associate
vol. 4, no. 4, pp. 1759–1772, Jul. 2005. Editor of the IEEE S IGNAL P ROCESSING L ETTERS (2012–2016) and of
[39] C. Feng and Y. Jing, “Modified mrt and outage probability analysis the Sadhana Journal (2016–2018). He is an Elected Member of the IEEE
for massive MIMO downlink under per-antenna power constraint,” SPCOM Technical Committee (2014–2016) and has been re-elected for the
in Proc. IEEE 17th Int. Workshop Signal Process. Adv. Wireless 2017–2019 term. He is the Past Chair of the IEEE Signal Processing Society,
Commun. (SPAWC), Jul. 2016, pp. 1–6. Bangalore Chapter. He is currently serving as an Associate Editor for the IEEE
[40] M. O. Hasna and M. S. Alouini, “End-to-end performance of transmis- T RANSACTIONS ON S IGNAL P ROCESSING and the IEEE T RANSACTIONS
sion systems with relays over Rayleigh-fading channels,” IEEE Trans. ON I NFORMATION T HEORY , as an Editor for the IEEE T RANSACTIONS ON
Wireless Commun., vol. 2, no. 6, pp. 1126–1131, Nov. 2003. C OMMUNICATIONS, and as a Guest Editor for the IEEE JSAC S PECIAL
[41] M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions: I SSUE ON M ACHINE L EARNING FOR W IRELESS C OMMUNICATIONS.
With Formulas, Graphs, and Mathematical Tables (Dover Books on
Mathematics). New York, NY, USA: Dover, 1964. Ramesh Annavajjala (S’03–M’06–SM’10) rec-
eived the bachelor’s degree in electronics and com-
munication engineering from the National Institute
of Technology (NIT), Warangal, India, in 1998,
the master’s degree in telecommunications from the
Indian Institute of Science (IISc), Bengaluru, India,
in 2001, and the Ph.D. degree in electrical engineer-
ing from the University of California at San Diego
(UCSD), La Jolla, CA, USA, in 2006.
He is currently an affiliated Research Associate
Professor with the College of Computer and Infor-
mation Science, Northeastern University, Boston, MA, USA. He is also
Ribhu Chopra (S’11–M’17) received the B.E. affiliated with Draper, Inc., Cambridge, MA, USA, an independent and non-
degree in electronics and communication engineer- profit organization. Earlier, he has served as the Distinguished Member of
ing from Panjab University, Chandigarh, India, Technical Staff at Altiostar Networks Inc., a Tewksbury, MA-based start-up
in 2009 and the M.Tech. and Ph.D. degrees in company developing cloud-RAN optimized 4G LTE base-station products.
electronics and communication engineering from IIT Prior to that, he was a Principal Member of Research Staff at the Mitsubishi
Roorkee, India, in 2011 and 2016, respectively. He Electric Research Labs (MERL), Cambridge, MA, USA. He has also held
was a Project Associate at the Department of Electri- industry positions at ArrayComm LLC, San Jose, CA, USA; Synopsys Inc.,
cal Communication Engineering, Indian Institute of Bengaluru, India; and CMC R&D Center, Hyderabad, India. He has published
Science (IISc), Bengaluru, India, from 2015 to 2016. over 60 papers in international journals and conferences, made numerous
From 2016 to 2017, he was an Institute Research contributions to commercial wireless standards, and is a co-inventor of 10 U.S.
Associate at the Department of Electrical Commu- patents (granted). He was a recipient of the Purkayastha/TimeLine Ventures
nication Engineering, IISc, Bengaluru. In 2017, he joined the Department Graduate Fellowship (2002–2003) and a co-recipient of the Best Paper Award
of Electronics and Electrical Engineering, IIT Guwahati, India. His research from the IEEE WPMC 2009 conference. He was a Guest Editor of the
interests include statistical and adaptive signal processing, massive MIMO special issue on Wireless Cooperative Networks of the EURASIP Journal
communications, and cognitive communications. on Advanced Signal Processing. He was nominated for the MIT TR-35.
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:30:57 UTC from IEEE Xplore. Restrictions apply.