On Gaussian wiretap channels with M-PAM inputs

This paper investigates the secrecy capacity of the Gaussian wiretap channel with M-PAM inputs, by capitalizing on the relationship between mutual information and minimum mean squared error (MMSE). In particular, we establish optimality conditions for both the M-PAM input power and the M-PAM input distribution, which we specialize to the asymptotic low-power and high-power regimes. By using the properties of the MMSE to establish sufficient conditions for the uniqueness of the solution of some of the underlying non-convex optimization problems, we also propose efficient algorithms to compute the optimal solutions. Interestingly, we show that with M-PAM inputs it is sub-optimal to use all the available power for some range of parameters — this is in sharp contrast to standard Gaussian channels. We also extend the results to the parallel Gaussian wiretap channel with M-PAM inputs. We put forth a mercury-waterfilling interpretation of the optimal power allocation procedure for parallel Gaussian wiretap channels which generalizes the conventional mercury-waterfilling interpretation for parallel Gaussian channels, with the mercury level amending the base level to account for both the non-Gaussianess of the input and the secrecy constraint.

[1]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[2]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[3]  Antonia Maria Tulino,et al.  Optimum power allocation for parallel Gaussian channels with arbitrary input distributions , 2006, IEEE Transactions on Information Theory.

[5]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[6]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[7]  Marten van Dijk On a special class of broadcast channels with confidential messages , 1997, IEEE Trans. Inf. Theory.

[8]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[9]  Shlomo Shamai,et al.  Estimation of non-Gaussian random variables in Gaussian noise: Properties of the MMSE , 2008, 2008 IEEE International Symposium on Information Theory.

[10]  H. Vincent Poor,et al.  Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.

[11]  Antonia Maria Tulino,et al.  Optimum Power Allocation for Multiuser OFDM with Arbitrary Signal Constellations , 2008, IEEE Transactions on Communications.

[12]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[13]  Shlomo Shamai,et al.  Mutual information and minimum mean-square error in Gaussian channels , 2004, IEEE Transactions on Information Theory.

[14]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[15]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[16]  Shlomo Shamai,et al.  Estimation in Gaussian Noise: Properties of the Minimum Mean-Square Error , 2010, IEEE Transactions on Information Theory.

[17]  Daniel Pérez Palomar,et al.  Gradient of mutual information in linear vector Gaussian channels , 2005, ISIT.

[18]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[19]  John E. Dennis,et al.  Numerical methods for unconstrained optimization and nonlinear equations , 1983, Prentice Hall series in computational mathematics.