Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-4rdpn Total loading time: 0 Render date: 2024-11-09T05:44:10.938Z Has data issue: false hasContentIssue false

6 - MIMO Wiretap Channels

from Part II - Secure Communication

Published online by Cambridge University Press:  28 June 2017

M. Nafea
Affiliation:
Wireless Communications and Networking Laboratory (WCAN), Electrical Engineering Department, The Pennsylvania State University
A. Yener
Affiliation:
Wireless Communications and Networking Laboratory (WCAN), Electrical Engineering Department, The Pennsylvania State University
Rafael F. Schaefer
Affiliation:
Technische Universität Berlin
Holger Boche
Affiliation:
Technische Universität München
Ashish Khisti
Affiliation:
University of Toronto
H. Vincent Poor
Affiliation:
Princeton University, New Jersey
Get access

Summary

This chapter considers securing wireless communications at the physical layer using multiple antennas. In particular, the multiple antenna (MIMO) wiretap channel is presented and its secrecy capacity is provided. Further investigation of the high-SNR characterization of the secrecy capacity, i.e., secure degrees of freedom, reveals that the secrecy capacity of the MIMO wiretap channel does not scale with the transmit power when the eavesdropper has an advantage over the legitimate transmitter in the number of antennas. An external multi-antenna cooperative jammer terminal is introduced to the channel model in order to improve its secrecy capacity scaling with power. The secure degrees of freedom for this new multi-terminal multi-antenna channel is characterized. While for these models the eavesdropper channel state information is known at the legitimate terminals, the chapter next removes this assumption and presents results that utilize multiple antennas in order to provide secure communications irrespective of the eavesdropper channel state. An achievable strong secrecy rate and the secure degrees of freedom characterization for the MIMO wiretap channel when the eavesdropper channel is arbitrary, varying, and unknown at the legitimate terminals are presented. Finally, the extension of this model to the two-user multiple access MIMO wiretap channel is considered and its secure degrees of freedom region is characterized.

Introduction

The wiretap channel and the notion of secrecy capacity, introduced in [1] and generalized by [2], have provided the framework for physical layer design for wireless channels with information theoretic guarantees against eavesdropping. A natural model in wireless communications is one which utilizes multiple antennas for transmission and reception at each node. The improvement in secrecy rate that can be obtained using multiple antennas in a point-to-point channel with an eavesdropper has been studied extensively in several references, including [3, 4]. Specifically, the secrecy capacity of the Gaussian model consisting of a multiple antenna legitimate transmitter, a multiple antenna legitimate receiver, and a multiple antenna eavesdropper, termed the multiple-input multiple-output (MIMO) wiretap channel, has been identified in full generality in [5, 6].

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

[1] A. D., Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, pp. 1355–1387, Oct. 1975.Google Scholar
[2] I., Csiszár and J., Körner, “Broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339–348, May 1978.Google Scholar
[3] A., Khisti and G. W., Wornell, “Secure transmission with multiple antennas i: The MISOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088–3104, Jul. 2010.Google Scholar
[4] S., Shafiee, N., Liu, and S., Ulukus, “Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel,” IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033–4039, Sep. 2009.Google Scholar
[5] A., Khisti and G. W., Wornell, “Secure transmission with multiple antennas–Part II: The MIMOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515–5532, Nov. 2010.Google Scholar
[6] F., Oggier and B., Hassibi, “The secrecy capacity of theMIMO wiretap channel,” IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961–4972, Aug. 2011.Google Scholar
[7] M., Nafea and A., Yener, “Secure degrees of freedom of N ×N × M wiretap channel with a K-antenna cooperative jammer,” in Proc. IEEE Int. Conf. Commun., London, UK, Jun. 2015, pp. 4169–4174.
[8] M., Nafea and A., Yener, “Secure degrees of freedom for the MIMO wiretap channel with a multiantenna cooperative jammer,” in Proc. IEEE Inf. Theory Workshop, Hobart, TAS, Australia, Nov. 2014, pp. 626–630.
[9] S., Goel and R., Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008.Google Scholar
[10] X., He and A., Yener, “MIMO wiretap channels with unknown and varying eavesdropper channel states,” IEEE Trans. Inf. Theory, vol. 60, no. 11, pp. 6844–6869, Nov. 2014.Google Scholar
[11] X., He, A., Khisti, and A., Yener, “MIMO multiple access channel with an arbitrarily varying eavesdropper: Secrecy degrees of freedom,” IEEE Trans. Inf. Theory, vol. 59, no. 8, pp. 4733–4745, Aug. 2013.Google Scholar
[12] X., He, A., Khisti, and A., Yener, “MIMO broadcast channel with an unknown eavesdropper: Secrecy degrees of freedom,” IEEE Trans. Commun., vol. 62, no. 1, pp. 246–255, Jan. 2014.Google Scholar
[13] H., Sato, “An outer bound to the capacity region of broadcast channels,” IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 374–377, May 1978.Google Scholar
[14] H., Weingarten, Y., Steinberg, and S., Shamai (Shitz), “The capacity region of the Gaussian multiple-input multiple-output broadcast channel,” IEEE Trans. Inf. Theory, vol. 52, no. 9, pp. 3936–3964, Sep. 2006.Google Scholar
[15] T., Liu and S., Shamai (Shitz), “A note on the secrecy capacity of the multiple-antenna wiretap channel,” IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547–2553, Jun. 2009.Google Scholar
[16] C. C., Paige and M. A., Saunders, “Towards a generalized singular value decomposition,” SIAM Journal on Numerical Analysis, vol. 18, no. 3, pp. 398–405, 1981.Google Scholar
[17] M., Yuksel and E., Erkip, “Diversity–multiplexing tradeoff for the multiple-antenna wire-tap channel,” IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 762–771, Mar. 2011.Google Scholar
[18] E., Tekin and A., Yener, “Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy,” in Proc. 44th Annual Allerton Conf. Commun., Control, Computing, Monticello, IL, Sep. 2006, pp. 809–816.
[19] E., Tekin and A., Yener, “The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735–2751, Jun. 2008.Google Scholar
[20] X., He and A., Yener, “Providing secrecy with structured codes: Two-user Gaussian channels,” IEEE Trans. Inf. Theory, vol. 60, no. 4, pp. 2121–2138, Apr. 2014.Google Scholar
[21] J., Xie and S., Ulukus, “Secure degrees of freedom of one-hop wireless networks,” IEEE Trans. Inf. Theory, vol. 60, no. 6, pp. 3359–3378, Jun. 2014.Google Scholar
[22] M. A., Maddah-Ali, “On the degrees of freedom of the compound MISO broadcast channels with finite states,” in Proc. IEEE Int. Symp. Inf. Theory, Austin, TX, USA, Jun. 2010, pp. 2273–2277.
[23] A. S., Motahari, S. O., Gharan, M. A., Maddah-Ali, and A. K., Khandani, “Real interference alignment: Exploiting the potential of single antenna systems,” IEEE Trans. Inf. Theory, vol. 60, no. 8, pp. 4799–4810, Aug. 2014.Google Scholar
[24] V., Sprindzuk, “On Mahler's conjecture,” Doklady Akademii Nauk SSSR, vol. 154, pp. 783–786, 1964, (in Russian); English translation in Soviet Math. Dokl. vol. 5, (1964), pp. 183–186.Google Scholar
[25] D., Kleinbock, “Baker–Sprindzhuk conjectures for complex analytic manifolds,” Oct. 2002. [Online]. Available: http://arxiv.org/abs/math/0210369
[26] W. M., Schmidt, Diophantine approximation. Berlin, Heidelberg: Springer-Verlag, 1980.
[27] R. G., Gallager, Information Theory and Reliable Communication. Chichester: Wiley & Sons, 1968.
[28] G., Poltyrev, “On coding without restrictions for the AWGN channel,” IEEE Trans. Inf. Theory, vol. 40, no. 2, pp. 409–417, Mar. 1994.Google Scholar
[29] D., Blackwell, L., Breiman, and A. J., Thomasian, “The capacity of a class of channels,” Ann. Math. Stat., vol. 30, no. 4, pp. 1229–1241, Dec. 1959.Google Scholar
[30] D. A., Levin, Y., Peres, and E. L., Wilmer, Markov Chains and Mixing Times. Providence, RI: American Mathematical Society, 2009.
[31] T. S., Han and S., Verdú, “Approximation theory of output statistics,” IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752–772, May 1993.Google Scholar
[32] I., Csiszár, “Almost independence and secrecy capacity,” Probl. Pered. Inform., vol. 32, no. 1, pp. 48–57, 1996.Google Scholar
[33] M. R., Bloch and J. N., Laneman, “On the secrecy capacity of arbitrary wiretap channels,” in Proc. 46th Annual Allerton Conf. Commun., Control, Computing, Monticello, IL, USA, Sep. 2008, pp. 818–825.
[34] M., Bloch and J. N., Laneman, “Information-spectrum methods for information-theoretic security,” Proc. IEEE Inf. Theory Workshop, pp. 23–28, Jun. 2009.Google Scholar
[35] R., Ahlswede, “Elimination of correlation in random codes for arbitrarily varying channels,” Z. Wahrscheinlichkeitstheorie verw. Gebiete, vol. 44, pp. 159–175, 1978.Google Scholar
[36] H. D., Ly, T., Liu, and Y., Liang, “Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages,” IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5477–5487, Nov. 2010.Google Scholar
[37] E., Ekrem and S., Ulukus, “The secrecy capacity region of the GaussianMIMO multi-receiver wiretap channel,” IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 2083–2114, Apr. 2011.Google Scholar
[38] E., Ekrem and S., Ulukus, “Capacity region of Gaussian MIMO broadcast channels with common and confidential messages,” IEEE Trans. Inf. Theory, vol. 58, no. 9, pp. 5669–5680, Sep. 2012.Google Scholar
[39] R., Liu, T., Liu, H. V., Poor, and S., Shamai (Shitz), “Multiple-input multiple-output Gaussian broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4215–4227, Sep. 2010.Google Scholar
[40] R., Liu, T., Liu, H. V., Poor, and S., Shamai (Shitz), “New results on multiple-input multiple-output broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. 59, no. 3, pp. 1346–1359, Mar. 2013.Google Scholar
[41] X., He and A., Yener, “The Gaussian interference wiretap channel when the eavesdropper channel is arbitrarily varying,” in Proc. IEEE Int. Symp. Inf. Theory, Cambridge, MA, USA, Jul. 2012, pp. 2316–2320.
[42] X., He and A., Yener, “The interference wiretap channel with an arbitrarily varying eavesdropper: Aligning interference with artificial noise,” Monticello, IL, USA, Sep. 2012, pp. 204–211.
[43] A., Khisti, “Interference alignment for the multiantenna compound wiretap channel,” IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 2976–2993, May 2011.Google Scholar
[44] E., Ekrem and S., Ulukus, “Degraded compound multi-receiver wiretap channels,” IEEE Trans. Inf. Theory, vol. 58, no. 9, pp. 5681–5698, Sep. 2012.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • MIMO Wiretap Channels
    • By M. Nafea, Wireless Communications and Networking Laboratory (WCAN), Electrical Engineering Department, The Pennsylvania State University, A. Yener, Wireless Communications and Networking Laboratory (WCAN), Electrical Engineering Department, The Pennsylvania State University
  • Edited by Rafael F. Schaefer, Technische Universität Berlin, Holger Boche, Technische Universität München, Ashish Khisti, University of Toronto, H. Vincent Poor, Princeton University, New Jersey
  • Book: Information Theoretic Security and Privacy of Information Systems
  • Online publication: 28 June 2017
  • Chapter DOI: https://doi.org/10.1017/9781316450840.007
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • MIMO Wiretap Channels
    • By M. Nafea, Wireless Communications and Networking Laboratory (WCAN), Electrical Engineering Department, The Pennsylvania State University, A. Yener, Wireless Communications and Networking Laboratory (WCAN), Electrical Engineering Department, The Pennsylvania State University
  • Edited by Rafael F. Schaefer, Technische Universität Berlin, Holger Boche, Technische Universität München, Ashish Khisti, University of Toronto, H. Vincent Poor, Princeton University, New Jersey
  • Book: Information Theoretic Security and Privacy of Information Systems
  • Online publication: 28 June 2017
  • Chapter DOI: https://doi.org/10.1017/9781316450840.007
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • MIMO Wiretap Channels
    • By M. Nafea, Wireless Communications and Networking Laboratory (WCAN), Electrical Engineering Department, The Pennsylvania State University, A. Yener, Wireless Communications and Networking Laboratory (WCAN), Electrical Engineering Department, The Pennsylvania State University
  • Edited by Rafael F. Schaefer, Technische Universität Berlin, Holger Boche, Technische Universität München, Ashish Khisti, University of Toronto, H. Vincent Poor, Princeton University, New Jersey
  • Book: Information Theoretic Security and Privacy of Information Systems
  • Online publication: 28 June 2017
  • Chapter DOI: https://doi.org/10.1017/9781316450840.007
Available formats
×