On optimal artificial-noise assisted secure beamforming for the fading eavesdropper channel

We consider secure transmission in fading channels with only the statistics of the eavesdropper's channel state information known at the transmitter. We optimize the celebrated artificial-noise (AN) assisted beamforming, which was studied by Goel and Negi using heuristically selected AN and beamforming directions. We find that Goel and Negi's AN selection is strictly sub-optimal. On the contrary, one may inject AN to the beam direction of the message to improve the secrecy rate performance. We prove that for a multiple-input, single-output, single-antenna-eavesdropper system, the optimal transmission scheme is a beamformer which is aligned to the direction of the legitimate channel. We then prove that, for the part of the AN in the null space of the legitimate channel, uniform power allocation is optimal. We also provide the necessary condition for the proposed AN selection to be optimal. Simulation results show that our AN selection outperforms Goel and Negi's, especially when the legitimate user's channel quality is poor. In particular, when AN assisted beamforming is applied, the region with non-zero secrecy rate is enlarged, which can significantly improve the connectivity of secure networks.

[1]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[2]  Athina P. Petropulu,et al.  On Ergodic Secrecy Capacity for Gaussian MISO Wiretap Channels , 2010, ArXiv.

[3]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[4]  Shlomo Shamai,et al.  Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.

[5]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[6]  Roy D. Yates,et al.  Secret Communication with a Fading Eavesdropper Channel , 2007, 2007 IEEE International Symposium on Information Theory.

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Eduard A. Jorswieck,et al.  Beamforming for fading wiretap channels with partial channel information , 2010, 2010 International ITG Workshop on Smart Antennas (WSA).

[9]  Jeffrey G. Andrews,et al.  Secure Wireless Network Connectivity with Multi-Antenna Transmission , 2011, IEEE Transactions on Wireless Communications.

[10]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[11]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[12]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[13]  Nan Liu,et al.  Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.

[14]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[15]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[16]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[17]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.