Secure degrees of freedom of MIMO X-channels with output feedback and delayed CSI

We investigate the problem of secure transmission over a two-user multi-input multi-output (MIMO) X-channel with noiseless local feedback and delayed channel state information (CSI) available at transmitters. The transmitters are equipped with M antennas each, and the receivers are equipped with N antennas each. For this model, we characterize the optimal sum secure degrees of freedom (SDoF) region. We show that, in presence of local feedback and delayed CSI, the sum SDoF region of the MIMO X-channel is same as the SDoF region of a two-user MIMO BC with 2M antennas at the transmitter and N antennas at each receiver. This result shows that, upon availability of feedback and delayed CSI, there is no performance loss in sum SDoF due to the distributed nature of the transmitters. Next, we show that this result also holds if only global feedback is conveyed to the transmitters. We also study the case in which only local feedback is provided to the transmitters, i.e., without CSI, and derive a lower bound on the sum SDoF for this model. Furthermore, we specialize our results to the case in which there are no security constraints. In particular, similar to the setting with security constraints, we show that the optimal sum degrees of freedom (sum DoF) region of the (M, M, N, N)-MIMO X-channel is same of the DoF region of a two-user MIMO BC with 2M antennas at the transmitter and N antennas at each receiver. We illustrate our results with some numerical examples.

[1]  Shlomo Shamai,et al.  Secrecy Degrees of Freedom of MIMO Broadcast Channels With Delayed CSIT , 2011, IEEE Transactions on Information Theory.

[2]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[3]  Syed Ali Jafar,et al.  On the secure degrees of freedom of wireless X networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[4]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[5]  Amir K. Khandani,et al.  On the degrees of freedom of three-user MIMO broadcast channel with delayed CSIT , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[6]  Amir K. Khandani,et al.  On the Degrees of Freedom of K-User SISO Interference and X Channels With Delayed CSIT , 2011, IEEE Transactions on Information Theory.

[7]  Shlomo Shamai,et al.  An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009, 2009 IEEE International Symposium on Information Theory.

[8]  H. Vincent Poor,et al.  Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.

[9]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[10]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[11]  H. Vincent Poor,et al.  Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.

[12]  Shlomo Shamai,et al.  Retrospective Interference Alignment Over Interference Networks , 2012, IEEE Journal of Selected Topics in Signal Processing.

[13]  Amir K. Khandani,et al.  Interference Alignment for the MIMO Interference Channel with Delayed Local CSIT , 2011, ArXiv.

[14]  Luc Vandendorpe,et al.  Multiaccess Channel With Partially Cooperating Encoders and Security Constraints , 2012, IEEE Transactions on Information Forensics and Security.

[15]  Shlomo Shamai,et al.  An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009 .

[16]  Shlomo Shamai,et al.  Degrees of Freedom Region of the MIMO Interference Channel With Output Feedback and Delayed CSIT , 2011, IEEE Transactions on Information Theory.

[17]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[18]  Mahesh K. Varanasi,et al.  The degrees of freedom region of the two-user MIMO broadcast channel with delayed CSIT , 2010, 2011 IEEE International Symposium on Information Theory Proceedings.

[19]  Roy D. Yates,et al.  Secrecy capacity region of a class of one-sided interference channel , 2008, 2008 IEEE International Symposium on Information Theory.

[20]  Onur Ozan Koyluoglu,et al.  Cooperative Encoding for Secrecy in Interference Channels , 2011, IEEE Transactions on Information Theory.

[21]  Hua Sun,et al.  Topological interference management with alternating connectivity , 2013, 2013 IEEE International Symposium on Information Theory.

[22]  Ender Tekin,et al.  The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.

[23]  Luc Vandendorpe,et al.  On secure transmission over parallel relay eavesdropper channel , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[24]  Amir K. Khandani,et al.  On the degrees of freedom of MIMO X channel with delayed CSIT , 2011, 2012 IEEE International Symposium on Information Theory Proceedings.

[25]  Shlomo Shamai,et al.  Secure Degrees of Freedom of MIMO X-Channels With Output Feedback and Delayed CSIT , 2013, IEEE Transactions on Information Forensics and Security.

[26]  Amir K. Khandani,et al.  On the Secure Degrees-of-Freedom of the Multiple-Access-Channel , 2010, ArXiv.

[27]  Luc Vandendorpe,et al.  Secure Communication Over Parallel Relay Channel , 2010, IEEE Transactions on Information Forensics and Security.

[28]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[29]  Mahesh K. Varanasi,et al.  The Degrees of Freedom Regions of MIMO Broadcast, Interference, and Cognitive Radio Channels with No CSIT , 2009, ArXiv.

[30]  Wei Zhang,et al.  On Achievable Degrees of Freedom for MIMO X Channels , 2012, ArXiv.

[31]  Mahesh K. Varanasi,et al.  The Degrees of Freedom Region and Interference Alignment for the MIMO Interference Channel With Delayed CSIT , 2011, IEEE Transactions on Information Theory.

[32]  Shlomo Shamai,et al.  New Results on Multiple-Input Multiple-Output Broadcast Channels With Confidential Messages , 2011, IEEE Transactions on Information Theory.

[33]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[34]  AbdoliMohammad Javad,et al.  On the Degrees of Freedom of K-User SISO Interference and X Channels With Delayed CSIT , 2013 .

[35]  Syed A. Jafar,et al.  Interference Alignment: A New Look at Signal Dimensions in a Communication Network , 2011, Found. Trends Commun. Inf. Theory.

[36]  Mohammad Ali Maddah-Ali,et al.  Completely Stale Transmitter Channel State Information is Still Very Useful , 2010, IEEE Transactions on Information Theory.

[37]  Shlomo Shamai,et al.  On X-channels with feedback and delayed CSI , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[38]  Luc Vandendorpe,et al.  On multiaccess channel with unidirectional cooperation and security constraints , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[39]  Carles Padró,et al.  Information Theoretic Security , 2013, Lecture Notes in Computer Science.

[40]  Syed Ali Jafar,et al.  Index coding: An interference alignment perspective , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[41]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[42]  Shlomo Shamai,et al.  Degrees of Freedom Region of the MIMO $X$ Channel , 2008, IEEE Transactions on Information Theory.