Ergodic Secret Message Capacity of the Wiretap Channel with Finite-Rate Feedback

We study the secret message capacity of an ergodic block fading wiretap channel with partial channel state information at the transmitter and perfect channel state information at the receivers, under both a short term power constraint (STPC) and a long term power constraint (LTPC). We consider that in addition to the statistics of the main and the eavesdropper channel state information (CSI), the sender is provided by the legitimate receiver with a q-bit feedback, at the beginning of each coherence block, through an error-free public channel, with capacity q bits. We establish upper and lower bounds on the secrecy capacity. We show that the lower and the upper bounds coincide asymptotically as q → ∞. When applied to Rayleigh fading channels, we show that, a 4-bit feedback achieves about 90% of the secrecy capacity when perfect main CSI is available at the transmitter. Finally, asymptotic analysis at high and low Signal-to-Noise Ratio (SNR) is presented. It is found that the capacity is bounded at high-SNR, whereas at asymptotically low-SNR, the lower bounds and the upper bound scale linearly with SNR under STPC. Furthermore, subject to LTPC, the capacity at low-SNR is equal to the capacity of the main channel without secrecy constraint and with perfect CSI at both the transmitter and the receiver, under a mild condition on the fading statistics. We also show that a positive secrecy rate is achievable even when the feedback is at the end of each coherence block and q=1.

[1]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[2]  Ueli Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[3]  Wei Shi,et al.  Robust beamforming for MISO wiretap channel by optimizing the worst-case secrecy capacity , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[4]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[5]  A. Lee Swindlehurst,et al.  Ensuring Secrecy in MIMO Wiretap Channels with Imperfect CSIT: A Beamforming Approach , 2010, 2010 IEEE International Conference on Communications.

[6]  Zhi Ding,et al.  Linear Precoding for Finite-Alphabet Signaling Over MIMOME Wiretap Channels , 2012, IEEE Transactions on Vehicular Technology.

[7]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[8]  Pravin Varaiya,et al.  Capacity of fading channels with channel side information , 1997, IEEE Trans. Inf. Theory.

[9]  Nihar Jindal MIMO broadcast channels with finite rate feedback , 2005, GLOBECOM.

[10]  Chong-Yung Chi,et al.  On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise: The Noise Leakage Problem , 2011, IEEE Trans. Wirel. Commun..

[11]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[12]  Mohamed-Slim Alouini,et al.  On the ergodic secrecy capacity of the wiretap channel under imperfect main channel estimation , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[13]  Mikael Skoglund,et al.  On the Expected Rate of Slowly Fading Channels with Quantized Side Information , 2005, ASILOMAR 2005.

[14]  Shuai Ma,et al.  Outage Constrained Robust Secure Transmission for MISO Wiretap Channels , 2013, IEEE Transactions on Wireless Communications.

[15]  Mohamed-Slim Alouini,et al.  Ergodic Secret Message Capacity of the Wiretap Channel with Finite-Rate Feedback , 2014 .

[16]  G. Caire,et al.  On the capacity of some channels with channel state information , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[17]  Robert W. Heath,et al.  An overview of limited feedback in wireless communication systems , 2008, IEEE Journal on Selected Areas in Communications.

[18]  J. Nicholas Laneman,et al.  Information-spectrum methods for information-theoretic security , 2009, 2009 Information Theory and Applications Workshop.

[19]  Suhas N. Diggavi,et al.  Creating shared secrets out of thin air , 2012, HotNets-XI.

[20]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[21]  Yi Hong,et al.  Wiretap channel with finite-rate feedback , 2015, 2015 22nd International Conference on Telecommunications (ICT).

[22]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[23]  Sergio Verdú,et al.  Spectral efficiency in the wideband regime , 2002, IEEE Trans. Inf. Theory.

[24]  Hamid Sharif,et al.  Impact of channel estimation errors on effectiveness of Eigenvector-based jamming for physical layer security in wireless networks , 2011, 2011 IEEE 16th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).

[25]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[26]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[27]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[28]  Russell Davidson,et al.  Testing for Restricted Stochastic Dominance: Some Further Results , 2009, Review of Economic Analysis.

[29]  Moustafa Youssef,et al.  Keys Through ARQ: Theory and Practice , 2011, IEEE Transactions on Information Forensics and Security.

[30]  Anders Forsgren,et al.  Interior Methods for Nonlinear Optimization , 2002, SIAM Rev..

[31]  Eduard A. Jorswieck,et al.  Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.

[32]  Xiangyun Zhou,et al.  Two-Way Training for Discriminatory Channel Estimation in Wireless MIMO Systems , 2011, IEEE Transactions on Signal Processing.

[33]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[34]  Mohamed-Slim Alouini,et al.  A Threshold-Based Channel State Feedback Algorithm for Modern Cellular Systems , 2007, IEEE Transactions on Wireless Communications.

[35]  Matthieu R. Bloch,et al.  Exploiting Partial Channel State Information for Secrecy over Wireless Channels , 2013, IEEE Journal on Selected Areas in Communications.

[36]  Athina P. Petropulu,et al.  Explicit Solution of Worst-Case Secrecy Rate for MISO Wiretap Channels With Spherical Uncertainty , 2011, IEEE Transactions on Signal Processing.

[37]  Thomas M. Cover,et al.  Elements of information theory (2. ed.) , 2006 .

[38]  Rohit U. Nabar,et al.  Introduction to Space-Time Wireless Communications , 2003 .