On Secrecy Capacity of Fast Fading MIMOME Wiretap Channels with Statistical CSIT

In this paper, we consider secure transmissions in ergodic Rayleigh fast-faded multiple-input multiple-output multiple-antenna-eavesdropper (MIMOME) wiretap channels with only statistical channel state information at the transmitter (CSIT). When the antennas at the legitimate receiver are more than (or equal to) those at the eavesdropper, we prove the first MIMOME secrecy capacity with partial CSIT by establishing a new secrecy capacity upper-bound. The key step is to form an MIMOME degraded channel by dividing the legitimate receiver's channel matrix into two submatrices, and setting one of the submatrices to be the same as the eavesdropper's channel matrix. Next, under the total power constraint over all transmit antennas, we analytically solve the channel-input covariance matrix optimization problem to fully characterize the MIMOME secrecy capacity. Typically, the MIMOME optimization problems are non-concave. However, thanks to the proposed degraded channel, we can transform the stochastic MIMOME optimization problem to be a Schur-concave one and then find its solution. Besides total power constraint, we also investigate the secrecy capacity when the transmitter is subject to the practical per-antenna power constraint. The corresponding optimization problem is even more difficult since it is not Schur-concave. Under the two power constraints considered, the corresponding MIMOME secrecy capacities can both scale with the signal-to-noise ratios (SNR) when the difference between numbers of antennas at legitimate receiver and eavesdropper are large enough. However, when the legitimate receiver and eavesdropper have a single antenna each, such SNR scalings do not exist for both cases.

[1]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[2]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[3]  Jeffrey G. Andrews,et al.  Secure Wireless Network Connectivity with Multi-Antenna Transmission , 2011, IEEE Transactions on Wireless Communications.

[4]  Elza Erkip,et al.  Diversity-multiplexing tradeoff for the multiple-antenna wire-tap channel , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[5]  A.F. Molisch,et al.  MIMO systems with antenna selection , 2004, IEEE Microwave Magazine.

[6]  Antonia Maria Tulino,et al.  Random Matrix Theory and Wireless Communications , 2004, Found. Trends Commun. Inf. Theory.

[7]  Ingram Olkin,et al.  Inequalities: Theory of Majorization and Its Application , 1979 .

[8]  Wade Trappe,et al.  Achieving Secret Communication for Fast Rayleigh Fading Channels , 2010, IEEE Transactions on Wireless Communications.

[9]  Zhi Ding,et al.  On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input , 2011, IEEE Transactions on Communications.

[10]  Giuseppe Caire,et al.  Multiuser MISO Transmitter Optimization for Intercell Interference Mitigation , 2009, IEEE Transactions on Signal Processing.

[11]  Are Hjrungnes,et al.  Complex-Valued Matrix Derivatives: With Applications in Signal Processing and Communications , 2011 .

[12]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[13]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[14]  Qiang Li,et al.  Optimal transmit design for miso secrecy-rate maximization with general covariance constraints , 2010, 2010 International Symposium on Intelligent Signal Processing and Communication Systems.

[15]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[16]  Carles Padró,et al.  Information Theoretic Security , 2013, Lecture Notes in Computer Science.

[17]  Daniel Pérez Palomar,et al.  Hessian and Concavity of Mutual Information, Differential Entropy, and Entropy Power in Linear Vector Gaussian Channels , 2009, IEEE Transactions on Information Theory.

[18]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[19]  Nan Liu,et al.  Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.

[20]  A. Hjørungnes Complex-Valued Matrix Derivatives: Applications in Signal Processing and Communications , 2011 .

[21]  Shlomo Shamai,et al.  The Capacity Region of the Gaussian Multiple-Input Multiple-Output Broadcast Channel , 2006, IEEE Transactions on Information Theory.

[22]  Yao-Win Peter Hong,et al.  How much training is enough for secrecy beamforming with artificial noise , 2012, 2012 IEEE International Conference on Communications (ICC).

[23]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[24]  Andrea J. Goldsmith,et al.  Capacity and power allocation for fading MIMO channels with channel estimation error , 2006, IEEE Trans. Inf. Theory.

[25]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[26]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[27]  Shih-Chun Lin,et al.  On Secrecy Capacity of Fast Fading Multiple-Input Wiretap Channels With Statistical CSIT , 2012, IEEE Transactions on Information Forensics and Security.

[28]  Iain B. Collings,et al.  Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.