Secure Degrees of Freedom of MIMO Two-Way Wiretap Channel With no CSI Anywhere

This article considers a two-way multiple-input multiple-output (MIMO) Rayleigh block fading wiretap channel with two full-duplex nodes (Alice and Bob) exchanging messages simultaneously and wiretapped by a <inline-formula> <tex-math notation="LaTeX">$ {N}_{ {e}}$ </tex-math></inline-formula>-antennas eavesdropper (Eve). The channel state remains unchanged over a coherence interval T and is unknown to all terminals, including Alice, Bob, and Eve, at the beginning of the coherence interval. We first show the expression of the optimal signal waveform for Alice and Bob, which maximizes the sum secrecy rate, should be the products of independent random diagonal matrices and isotropically distributed unitary matrices. Then, conditioned on large T and small <inline-formula> <tex-math notation="LaTeX">$ {N}_{ {e}}$ </tex-math></inline-formula>, the upper-bound for the secure degree of freedom (s.d.o.f.) of the two-way wiretap channel is derived, and a constant-norm-signaling (CNS) scheme is presented to achieve this theoretical bound. Finally, we formulate an optimization problem of the s.d.o.f. achieved by the CNS scheme for general cases with arbitrary T and <inline-formula> <tex-math notation="LaTeX">$ {N}_{ {e}}$ </tex-math></inline-formula>, and solve this problem by exploring the monotonicity of the achievable s.d.o.f.. Our result shows that the optimal s.d.o.f. can be independent of coherence time T and becomes the product of the numbers of legitimate nodes’s transmitter antennas (NLNTA) for large <inline-formula> <tex-math notation="LaTeX">$ {N}_{ {e}}$ </tex-math></inline-formula> and small NLNTA.

[1]  Sanghun Im,et al.  On the Secrecy Rate of Artificial Noise Assisted MIMOME Channels with Full-Duplex Receiver , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[2]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[3]  A. Lee Swindlehurst,et al.  Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer , 2011, IEEE Transactions on Signal Processing.

[4]  Zhi Chen,et al.  A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance , 2016, IEEE Signal Processing Letters.

[5]  Yingbo Hua,et al.  Advanced Properties of Full-Duplex Radio for Securing Wireless Network , 2019, IEEE Transactions on Signal Processing.

[6]  Lizhong Zheng,et al.  Communication on the Grassmann manifold: A geometric approach to the noncoherent multiple-antenna channel , 2002, IEEE Trans. Inf. Theory.

[7]  Yingbo Hua,et al.  Secrecy Analyses of a Full-Duplex MIMOME Network , 2019, IEEE Transactions on Signal Processing.

[8]  Tao Zhang,et al.  Physical-Layer Security for Full Duplex Communications With Self-Interference Mitigation , 2016, IEEE Transactions on Wireless Communications.

[9]  Moustafa Youssef,et al.  Achievable Secrecy Rate Regions for the Two-Way Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[10]  Zhi Xue,et al.  Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable Secrecy Rate based Optimization , 2014, IEEE Signal Processing Letters.

[11]  Rudolf Mathar,et al.  Secrecy Energy Efficiency of MIMOME Wiretap Channels With Full-Duplex Jamming , 2017, IEEE Transactions on Communications.

[12]  Timothy N. Davidson,et al.  Noncoherent MIMO Communication: Grassmannian Constellations and Efficient Detection , 2009, IEEE Transactions on Information Theory.

[13]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[14]  Qi Zhang,et al.  Robust Secure Beamforming in MISO Full-Duplex Two-Way Secure Communications , 2016, IEEE Transactions on Vehicular Technology.

[15]  Ananthanarayanan Chockalingam,et al.  Sum Secrecy Rate in MISO Full-Duplex Wiretap Channel with Imperfect CSI , 2013, 2015 IEEE Globecom Workshops (GC Wkshps).

[16]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[17]  Pritam Mukherjee,et al.  Secure Degrees of Freedom of MIMO Rayleigh Block Fading Wiretap Channels With No CSI Anywhere , 2015, IEEE Transactions on Wireless Communications.

[18]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.

[19]  Yingbo Hua,et al.  Optimal Pilots for Anti-Eavesdropping Channel Estimation , 2020, IEEE Transactions on Signal Processing.

[20]  Thomas L. Marzetta,et al.  Capacity of a Mobile Multiple-Antenna Communication Link in Rayleigh Flat Fading , 1999, IEEE Trans. Inf. Theory.

[21]  张旗,et al.  Optimal and Suboptimal Full-Duplex Secure Beamforming Designs for MISO Two-Way Communications , 2015 .