Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization

This paper studies robust transmission schemes for multiple-input single-output (MISO) wiretap channels. Both the cases of direct transmission and cooperative jamming with a helper are investigated with imperfect channel state information (CSI) for the eavesdropper links. Robust transmit covariance matrices are obtained based on worst-case secrecy rate maximization, under both individual and global power constraints. For the case of an individual power constraint, we show that the nonconvex maximin optimization problem can be transformed into a quasi-convex problem that can be efficiently solved with existing methods. For a global power constraint, the joint optimization of the transmit covariance matrices and power allocation between the source and the helper is studied. We also investigate the robust wiretap transmission problem for the case with a quality-of-service constraint at the legitimate receiver. Numerical results show the advantage of the proposed robust design. In particular, for the global power constraint scenario, although cooperative jamming is not necessary for optimal transmission with perfect eavesdropper's CSI, we show that robust jamming support can increase the worst-case secrecy rate and lower the signal to interference-plus-noise ratio at the eavesdropper in the presence of channel mismatches between the transmitters and the eavesdropper.

[1]  T. Markham,et al.  A Generalization of the Schur Complement by Means of the Moore–Penrose Inverse , 1974 .

[2]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[3]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[4]  I. Olkin,et al.  Inequalities: Theory of Majorization and Its Applications , 1980 .

[5]  Benjamin Friedlander,et al.  Performance analysis of a null-steering algorithm based on direction-of-arrival estimation , 1989, IEEE Trans. Acoust. Speech Signal Process..

[6]  Henry Wolkowicz,et al.  Indefinite Trust Region Subproblems and Nonsymmetric Eigenvalue Perturbations , 1995, SIAM J. Optim..

[7]  Zhi-Quan Luo,et al.  Robust adaptive beamforming using worst-case performance optimization: a solution to the signal mismatch problem , 2003, IEEE Trans. Signal Process..

[8]  Alfred O. Hero,et al.  Secure space-time communication , 2003, IEEE Trans. Inf. Theory.

[9]  D. Palomar Convex primal decomposition for multicarrier linear MIMO transceivers , 2005, IEEE Transactions on Signal Processing.

[10]  Richard E. Blahut,et al.  Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[11]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[12]  Stephen P. Boyd,et al.  A tutorial on geometric programming , 2007, Optimization and Engineering.

[13]  Roy D. Yates,et al.  Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[14]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.

[15]  Daniel Pérez Palomar,et al.  Power Control By Geometric Programming , 2007, IEEE Transactions on Wireless Communications.

[16]  Ami Wiesel,et al.  On the Gaussian MIMO Wiretap Channel , 2007, 2007 IEEE International Symposium on Information Theory.

[17]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[18]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[19]  M. Debbah,et al.  Mobile Flexible Networks: The challenges ahead , 2008, 2008 International Conference on Advanced Technologies for Communications.

[20]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[21]  Yong Huat Chew,et al.  MMSE-based joint source and relay precoding design for amplify-and-forward MIMO relay networks , 2009, IEEE Transactions on Wireless Communications.

[22]  Shlomo Shamai,et al.  An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009, 2009 IEEE International Symposium on Information Theory.

[23]  Jiaheng Wang,et al.  Worst-Case Robust MIMO Transmission With Imperfect Channel Knowledge , 2009, IEEE Transactions on Signal Processing.

[24]  A. Lee Swindlehurst,et al.  Cooperative Jamming in MIMO ad-hoc networks , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.

[25]  Yiyang Pei,et al.  Robust Beamforming Design: From Cognitive Radio MISO Channels to Secrecy MISO Channels , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[26]  A. Lee Swindlehurst,et al.  Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels , 2009, 2009 IEEE 10th Workshop on Signal Processing Advances in Wireless Communications.

[27]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[28]  A. Lee Swindlehurst,et al.  Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[29]  Steven P. Weber,et al.  Optimal Cooperative Relaying Schemes for Improving Wireless Physical Layer Security , 2010, ArXiv.

[30]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[31]  Eduard A. Jorswieck Secrecy capacity of single- and multi-antenna channels with simple helpers , 2010, 2010 International ITG Conference on Source and Channel Coding (SCC).

[32]  Eduard A. Jorswieck,et al.  On the zero forcing optimality for friendly jamming in MISO wiretap channels , 2010, 2010 IEEE 11th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[33]  Athina P. Petropulu,et al.  On Ergodic Secrecy Capacity for Gaussian MISO Wiretap Channels , 2010, ArXiv.

[34]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[35]  Wei Shi,et al.  Robust beamforming for MISO wiretap channel by optimizing the worst-case secrecy capacity , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[36]  Eduard A. Jorswieck,et al.  Maximization of worst-case secrecy rates in MIMO wiretap channels , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[37]  A. Lee Swindlehurst,et al.  Secure Communications via Cooperative Jamming in Two-Hop Relay Systems , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[38]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[39]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[40]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.

[41]  Athina P. Petropulu,et al.  On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels , 2011, IEEE Transactions on Wireless Communications.

[42]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[43]  Qiang Li,et al.  A robust artificial noise aided transmit design for MISO secrecy , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[44]  Qiang Li,et al.  Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming , 2010, IEEE Transactions on Signal Processing.

[45]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[46]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[47]  Carles Padró,et al.  Information Theoretic Security , 2013, Lecture Notes in Computer Science.