To avoid or not to avoid CSI leakage in physical layer secret communication systems

Physical layer secrecy has attracted much attention in recent years due to its ability to ensure communication secrecy with the use of channel coding and signal processing techniques (and without the explicit use of secret keys) in the physical layer. It serves as a promising technique for highly dynamic or ad hoc systems such as device-to-device and machine-type communication systems. However, the achievable secrecy performance depends highly on the level of CSI at the transmitter, the receiver, and the eavesdropper. In this article, we discuss how different levels of CSI resulting from conventional and unconventional ways of performing training and channel feedback may affect the confidentiality in terms of the information-theoretic (perfect) secrecy rate. The conventional approach refers to the emission of pilot signals from the transmitter and explicit channel feedback from the receiver. This approach is backward compatible with existing systems and allows the receiver to obtain accurate knowledge of the CSI, but may suffer from CSI leakage toward the eavesdropper. Unconventional approaches capitalize on reverse training to prevent CSI leakage and are shown to achieve significant improvements over conventional schemes in certain cases. For example, in a system with four transmit antennas and a single antenna at both the receiver and the eavesdropper, a secrecy rate gain of approximately 0.8 b/channel use at transmit SNR of 16 dB is observed over the full CSI case by providing CSI only to the transmitter (but not the receiver and the eavesdropper).

[1]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[2]  Xiangyun Zhou,et al.  Two-Way Training for Discriminatory Channel Estimation in Wireless MIMO Systems , 2011, IEEE Transactions on Signal Processing.

[3]  Chong-Yung Chi,et al.  On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise: The Noise Leakage Problem , 2009, IEEE Transactions on Wireless Communications.

[4]  Nan Liu,et al.  Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.

[5]  Eduard A. Jorswieck,et al.  On the Fast Fading Gaussian Wiretap Channel With Statistical Channel State Information at the Transmitter , 2016, IEEE Transactions on Information Forensics and Security.

[6]  Yao-Win Peter Hong,et al.  How much training is enough for secrecy beamforming with artificial noise , 2012, 2012 IEEE International Conference on Communications (ICC).

[7]  Mohamed-Slim Alouini,et al.  Ergodic Secret Message Capacity of the Wiretap Channel with Finite-Rate Feedback , 2014 .

[8]  C.-C. Jay Kuo,et al.  Enhancing secrecy in fading wiretap channels with only transmitter-side channel state information , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[9]  Eduard A. Jorswieck,et al.  Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.

[10]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[11]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[12]  Mohamed-Slim Alouini,et al.  Ergodic Secret Message Capacity of the Wiretap Channel with Finite-Rate Feedback , 2012, IEEE Transactions on Wireless Communications.

[13]  Chong-Yung Chi,et al.  On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise: The Noise Leakage Problem , 2011, IEEE Trans. Wirel. Commun..

[14]  Shlomo Shamai,et al.  Secrecy Degrees of Freedom of MIMO Broadcast Channels With Delayed CSIT , 2011, IEEE Transactions on Information Theory.

[15]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[16]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[17]  Pritam Mukherjee,et al.  Secure Degrees of Freedom of MIMO Rayleigh Block Fading Wiretap Channels With No CSI Anywhere , 2015, IEEE Transactions on Wireless Communications.