Paper ID | SAM-13.1 |
Paper Title |
PHYSICAL-LAYER SECURITY VIA DISTRIBUTED BEAMFORMING IN THE PRESENCE OF ADVERSARIES WITH UNKNOWN LOCATIONS |
Authors |
Yagiz Savas, Abolfazl Hashemi, University of Texas at Austin, United States; Abraham P. Vinod, Mitsubishi Electric Research Laboratories (MERL), United States; Brian M. Sadler, U.S. Army Research Laboratory, United States; Ufuk Topcu, University of Texas at Austin, United States |
Session | SAM-13: Multi-Channel Data Fusion and Processing |
Location | Gather.Town |
Session Time: | Friday, 11 June, 14:00 - 14:45 |
Presentation Time: | Friday, 11 June, 14:00 - 14:45 |
Presentation |
Poster
|
Topic |
Sensor Array and Multichannel Signal Processing: [SAM-BEAM] Beamforming |
IEEE Xplore Open Preview |
Click here to view in IEEE Xplore |
Virtual Presentation |
Click here to watch in the Virtual Conference |
Abstract |
We study the problem of securely communicating a sequence of information bits with a client in the presence of multiple adversaries at unknown locations in the environment. We assume that the client and the adversaries are located in the far-field region, and all possible directions for each adversary can be expressed as a continuous interval of directions. In such a setting, we develop a periodic transmission strategy, i.e., a sequence of joint beamforming gain and artificial noise pairs, that prevents the adversaries from decreasing their uncertainty on the information sequence by eavesdropping on the transmission. We formulate a series of nonconvex semi-infinite optimization problems to synthesize the transmission strategy. We show that the semi-definite program (SDP) relaxations of these nonconvex problems are exact under an efficiently verifiable sufficient condition. We approximate the SDP relaxations, which are subject to infinitely many constraints, by randomly sampling a finite subset of the constraints and establish the probability with which optimal solutions to the obtained finite SDPs and the semi-infinite SDPs coincide. We demonstrate with numerical simulations that the proposed periodic strategy can ensure the security of communication in scenarios in which all stationary strategies fail to guarantee security. |