Dirty-Paper Coding Based Secure Transmission for Multiuser Downlink in Cellular Communication Systems

This paper studies the secure transmission in a multiuser broadcast channel where only the statistical channel state information of the eavesdropper is available. We propose to apply secret dirty-paper coding (S-DPC) in this scenario to support the secure transmission of one user and the normal (unclassified) transmission of the other users. By adopting the S-DPC and encoding the secret message in the first place, all the information-bearing signals of the normal transmission are treated as noise by potential eavesdroppers and thus provide secrecy for the secure transmission. In this way, the proposed approach exploits the intrinsic secrecy of multiuser broadcasting and can serve as an energy-efficient alternative to the traditional artificial noise (AN) scheme. To evaluate the secrecy performance of this approach and compare it with the AN scheme, we propose two S-DPC-based secure transmission schemes for maximizing the secrecy rate under constraints on the secrecy outage probability (SOP) and the normal transmission rates. The first scheme directly optimizes the covariance matrices of the transmit signals, and a novel approximation of the intractable SOP constraint is derived to facilitate the optimization. The second scheme combines zero-forcing dirty-paper coding and AN, and the optimization involves only power allocation. We establish efficient numerical algorithms to solve the optimization problems for both schemes. Theoretical and simulation results confirm that, in addition to supporting the normal transmission, the achievable secrecy rates of the proposed schemes can be close to that of the traditional AN scheme, which supports only the secure transmission of one user.

[1]  Eduard A. Jorswieck,et al.  Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.

[2]  Shlomo Shamai,et al.  The Capacity Region of the Gaussian Multiple-Input Multiple-Output Broadcast Channel , 2006, IEEE Transactions on Information Theory.

[3]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[4]  Gregory W. Wornell,et al.  Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.

[5]  Sennur Ulukus,et al.  The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.

[6]  Hsiao-Hwa Chen,et al.  Physical Layer Security in Multi-Cell MISO Downlinks With Incomplete CSI—A Unified Secrecy Performance Analysis , 2014, IEEE Transactions on Signal Processing.

[7]  Jeffrey G. Andrews,et al.  Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.

[8]  Qiang Li,et al.  A Safe Approximation Approach to Secrecy Outage Design for MIMO Wiretap Channels , 2014, IEEE Signal Processing Letters.

[9]  Donald F. Towsley,et al.  Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers , 2015, IEEE Transactions on Communications.

[10]  Abraham Charnes,et al.  Programming with linear fractional functionals , 1962 .

[11]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[12]  Chong-Yung Chi,et al.  Outage Constrained Robust Transmit Optimization for Multiuser MISO Downlinks: Tractable Approximations by Conic Optimization , 2011, IEEE Transactions on Signal Processing.

[13]  Qiang Li,et al.  Safe convex approximation to outage-based MISO secrecy rate optimization under imperfect CSI and with artificial noise , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[14]  Derrick Wing Kwan Ng,et al.  Artificial Noise Assisted Secure Transmission Under Training and Feedback , 2015, IEEE Transactions on Signal Processing.

[15]  Chong-Yung Chi,et al.  Probabilistic SINR constrained robust transmit beamforming: A Bernstein-type inequality based conservative approach , 2010, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[16]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[17]  I. Bechar,et al.  A Bernstein-type inequality for stochastic processes of quadratic forms of Gaussian variables , 2009, 0909.3595.

[18]  H. Vincent Poor,et al.  Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.

[19]  Bo Wang,et al.  Optimal Semiadaptive Transmission With Artificial-Noise-Aided Beamforming in MISO Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.

[20]  Bo Wang,et al.  Secrecy Rate Maximization With Artificial-Noise-Aided Beamforming for MISO Wiretap Channels Under Secrecy Outage Constraint , 2015, IEEE Communications Letters.

[21]  Huiming Wang,et al.  Combining dirty-paper coding and artificial noise for secrecy , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[22]  Huiming Wang,et al.  Secure MISO Wiretap Channels With Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading , 2015, IEEE Transactions on Wireless Communications.

[23]  Bo Wang,et al.  Practical Transmission Scheme With Fixed Communication Rate Under Constraints of Transmit Power and Secrecy Outage Probability , 2015, IEEE Communications Letters.

[24]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[25]  Amir K. Khandani,et al.  The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel , 2009, IEEE Transactions on Information Theory.

[26]  Shi Jin,et al.  Ergodic Secrecy Sum-Rate for Multiuser Downlink Transmission via Regularized Channel Inversion: Large System Analysis , 2014, IEEE Communications Letters.

[27]  M. B. Shenouda,et al.  Probabilistically-constrained approaches to the design of the multiple antenna downlink , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.

[28]  Richard E. Blahut,et al.  Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[29]  Shuai Ma,et al.  Outage Constrained Robust Secure Transmission for MISO Wiretap Channels , 2013, IEEE Transactions on Wireless Communications.

[30]  Shlomo Shamai,et al.  On the Achievable Throughput of a Multiantenna , 2003 .

[31]  Markku J. Juntti,et al.  On Linear Precoding Strategies for Secrecy Rate Maximization in Multiuser Multiantenna Wireless Networks , 2014, IEEE Transactions on Signal Processing.

[32]  Tareq Y. Al-Naffouri,et al.  On the Distribution of Indefinite Quadratic Forms in Gaussian Random Variables , 2009, IEEE Transactions on Communications.

[33]  Huiming Wang,et al.  On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[34]  Jinhong Yuan,et al.  Confidential Broadcasting via Linear Precoding in Non-Homogeneous MIMO Multiuser Networks , 2014, IEEE Transactions on Communications.

[35]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[36]  Wan Choi,et al.  Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.

[37]  Matthew R. McKay,et al.  On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.

[38]  Iain B. Collings,et al.  Large System Analysis of Linear Precoding in MISO Broadcast Channels with Confidential Messages , 2013, IEEE Journal on Selected Areas in Communications.

[39]  Shlomo Shamai,et al.  Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.

[40]  M. V. Clark,et al.  Theoretical reliability of MMSE linear diversity combining in Rayleigh-fading additive interference channels , 1998, IEEE Trans. Commun..

[41]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.