Secure Degrees of Freedom of Rank-Deficient BCCM and Rank-Deficient ICCM

The secure degrees of freedom (SDoF) of two-user rank-deficient multiple-input multiple-output (MIMO) broadcast channel with confidential messages (BCCM) and two-user rank- deficient MIMO interference channel with confidential messages (ICCM) are studied respectively in this paper. In the systems, each transmitter has <inline-formula><tex-math notation="LaTeX">$M$</tex-math></inline-formula> antennas, and each receiver has <inline-formula><tex-math notation="LaTeX">$N$</tex-math></inline-formula> antennas. We consider that each transmitter intends to send secure messages to the corresponding receiver, and another receiver can receive the messages but cannot decode them, which ensures that the messages are confidential. Comparing with previous studies on two-user broadcast channel and interference channel, we explore the case that channel matrices are rank-deficient, and the rank of channel matrices can take arbitrary value, <inline-formula><tex-math notation="LaTeX">$D \leq \text{min} (M,N)$</tex-math></inline-formula>. For the two rank-deficient channels, BCCM and ICCM, we divide the problem into several regimes according to the different configurations of the rank of channel matrices and the number of antennas at each node. The outer bound of rank-deficient BCCM is inferred from information theoretic methods and the achievable schemes are given by zero forcing techniques. We derive the outer bound of rank-deficient ICCM by taking the minimum region of the three outer bounds, where the first outer bound is the result of rank-deficient interference channel model without secrecy constraints, the second outer bound is obtained by considering secrecy constraints, and the third outer bound is achieved by transmitters cooperation. Then we present the achievable schemes by combining zero-forcing, real interference alignment, and spatial alignment. Finally, we determine the exact SDoF of the rank-deficient BCCM and the rank-deficient ICCM.

[1]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[2]  Aylin Yener,et al.  Secure Degrees of Freedom for the MIMO Wire-Tap Channel With a Multi-Antenna Cooperative Jammer , 2015, IEEE Trans. Inf. Theory.

[3]  Jianwei Xie,et al.  Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure , 2014, IEEE Transactions on Information Theory.

[4]  Jianwei Xie,et al.  Secure degrees of freedom of the Gaussian wiretap channel with helpers , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[5]  Sennur Ulukus,et al.  Secure Degrees of Freedom Region of Static and Time-Varying Gaussian MIMO Interference Channel , 2019, IEEE Transactions on Information Theory.

[6]  Shlomo Shamai,et al.  Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.

[7]  Qiang Wang,et al.  Secure Degrees of Freedom of the Asymmetric Gaussian MIMO Interference Channel , 2017, IEEE Transactions on Vehicular Technology.

[8]  Mahesh K. Varanasi,et al.  Degrees of Freedom of the MIMO Z-Interference Channel With Delayed CSIT , 2015, IEEE Communications Letters.

[9]  Shlomo Shamai,et al.  Secrecy Degrees of Freedom of MIMO Broadcast Channels With Delayed CSIT , 2011, IEEE Transactions on Information Theory.

[10]  Vahid Tarokh,et al.  On the degrees-of-freedom of the MIMO interference channel , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[11]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[12]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[13]  Bin Dai,et al.  Feedback Coding Schemes for the Broadcast Channel With Mutual Secrecy Requirement at the Receivers , 2019, IEEE Transactions on Communications.

[14]  Fuhui Zhou,et al.  Robust Chance-Constrained Secure Transmission for Cognitive Satellite–Terrestrial Networks , 2018, IEEE Transactions on Vehicular Technology.

[15]  Yuan Luo,et al.  An Improved Feedback Coding Scheme for the Wire-Tap Channel , 2019, IEEE Transactions on Information Forensics and Security.

[16]  Xiaoli Xu,et al.  On the degrees of freedom of the 3-user rank-deficient MIMO interference channels , 2013, 2013 IEEE International Conference on Communications (ICC).

[17]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[18]  Yan Zhang,et al.  Physical-Layer Security in Space Information Networks: A Survey , 2020, IEEE Internet of Things Journal.

[19]  Sergey Loyka,et al.  From Multi-Keyholes to Measure of Correlation and Power Imbalance in MIMO Channels: Outage Capacity Analysis , 2008, IEEE Transactions on Information Theory.

[20]  Sundar R. Krishnamurthy,et al.  Degrees of Freedom of Rank-Deficient MIMO Interference Channels , 2015, IEEE Transactions on Information Theory.

[21]  Qiang Wang,et al.  Secure Degrees of Freedom of Rank-Deficient MIMO Interference Channel , 2019, IEEE Communications Letters.

[22]  Jianwei Xie,et al.  Secure Degrees of Freedom of $K$ -User Gaussian Interference Channels: A Unified View , 2013, IEEE Transactions on Information Theory.

[23]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.