On Quantization for Masked Beamforming Secrecy Systems

This study investigates how to quantize the masked beamforming systems to maximize the secrecy rate for MISOSE (multiple-input, single-output, single-eavesdropper) channels and assume that this eavesdropper equipped with only single antenna, where only partial channel state information (CSI) at the legitimate receiver is available to the transmitter. In this case, the artificial noise (AN) leaks to the legitimate receiver due to CSI quantization. In the literature, all quantization bits are used to quantize the beamforming vector. Then the null space of this quantized beamforming vector is used to transmit the AN. We find that such quantization schemes can result in serious interference at the legitimate receiver. To overcome this issue, we propose that the beamforming vector and the AN vector should be quantized separately, where the beamforming vector should be selected from a codebook to maximize the beamforming gain and the AN vector should be selected from another codebook to minimize the leakage (or interference). Theoretical results show that separate quantization can significantly reduce the AN leakage at the legitimate receiver. Furthermore, based on the proposed quantization scheme, we show how to allocate bits to separately quantize the beamforming vector and the AN vector to maximize the secrecy rate. By using the proposed quantization and bit allocation schemes, the secrecy rates of masked beamforming systems can be improved compared to the conventional quantization schemes. Simulation results corroborate the theoretical results.

[1]  Bhaskar D. Rao,et al.  Transmit beamforming in multiple-antenna systems with finite rate feedback: a VQ-based approach , 2006, IEEE Transactions on Information Theory.

[2]  Zhi Ding,et al.  On Secrecy of Codebook-Based Transmission Beamforming under Receiver Limited Feedback , 2011, IEEE Transactions on Wireless Communications.

[3]  Abbas El Gamal,et al.  Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).

[4]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[5]  B. Arnold,et al.  A first course in order statistics , 1994 .

[6]  Chong-Yung Chi,et al.  On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise: The Noise Leakage Problem , 2011, IEEE Trans. Wirel. Commun..

[7]  A. Paulraj,et al.  A simple scheme for transmit diversity using partial channel feedback , 1998, Conference Record of Thirty-Second Asilomar Conference on Signals, Systems and Computers (Cat. No.98CH36284).

[8]  H. Vincent Poor,et al.  Power Allocation for Artificial-Noise Secure MIMO Precoding Systems , 2014, IEEE Transactions on Signal Processing.

[9]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[10]  A. Lee Swindlehurst,et al.  Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization , 2011, IEEE Transactions on Signal Processing.

[11]  Andrea J. Goldsmith,et al.  Multi-Antenna Downlink Channels with Limited Feedback and User Selection , 2007, IEEE Journal on Selected Areas in Communications.

[12]  Athanasios Papoulis,et al.  Probability, Random Variables and Stochastic Processes , 1965 .

[13]  D. Rajan Probability, Random Variables, and Stochastic Processes , 2017 .

[14]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[15]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.

[16]  Shlomo Shamai,et al.  Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.

[17]  Babak Hassibi,et al.  On the capacity of MIMO broadcast channels with partial side information , 2005, IEEE Transactions on Information Theory.

[18]  Robert W. Heath,et al.  Grassmannian beamforming for multiple-input multiple-output wireless systems , 2003, IEEE Trans. Inf. Theory.

[19]  A. James Distributions of Matrix Variates and Latent Roots Derived from Normal Samples , 1964 .

[20]  Nihar Jindal,et al.  Multi-Antenna Broadcast Channels with Limited Feedback and User Selection , 2006 .

[21]  Nihar Jindal MIMO broadcast channels with finite rate feedback , 2005, GLOBECOM.

[22]  Qiang Li,et al.  A robust artificial noise aided transmit design for MISO secrecy , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[23]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[24]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[25]  A. Lee Swindlehurst,et al.  MIMO Interference Channel With Confidential Messages: Achievable Secrecy Rates and Precoder Design , 2011, IEEE Transactions on Information Forensics and Security.

[26]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .

[27]  David James Love,et al.  On the performance of random vector quantization limited feedback beamforming in a MISO system , 2007, IEEE Transactions on Wireless Communications.

[28]  Shlomo Shamai,et al.  An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009 .

[29]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[30]  Ya-Feng Liu,et al.  Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization , 2013, IEEE Journal on Selected Areas in Communications.

[31]  Thomas M. Cover,et al.  Network Information Theory , 2001 .

[32]  B. Arnold,et al.  A first course in order statistics , 2008 .

[33]  A. M. Mathai Quadratic forms in random variables , 1992 .

[34]  Shlomo Shamai,et al.  An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009, 2009 IEEE International Symposium on Information Theory.

[35]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[36]  Mounir Ghogho,et al.  Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.

[37]  Arjun K. Gupta,et al.  Handbook of beta distribution and its applications , 2004 .

[38]  Eduard A. Jorswieck,et al.  Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.

[39]  Mounir Ghogho,et al.  Physical layer security by robust masked beamforming and protected zone optimisation , 2014, IET Commun..