Secrecy Outage in MISO Systems With Partial Channel Information

Secrecy on the physical layer is a promising technique to simplify the overall cross-layer secrecy concept. In many recent works on the multiple antenna wiretap channel, perfect channel state information to the intended receiver as well as the passive eavesdropper are assumed. In this paper, the transmitter has only partial information about the channel to the eavesdropper, but full information on the main channel to the intended receiver. The applied channel model is the flat-fading multiple-input single-output wiretap channel. We minimize the outage probability of secure transmission under single-stream beamforming and the use of artificial noise in the null space of the main channel. Furthermore, we derive a suboptimal beamforming scheme based on a Markov bound, which performs reasonably well. The results generalize the cases with perfect as well as without channel state information of the eavesdropper channel. Numerical simulations illustrate the secrecy outage probability over the degree of channel knowledge and confirm the theoretical results.

[1]  Nan Liu,et al.  Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.

[2]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[3]  Matthew R. McKay,et al.  Physical layer security with artificial noise: Secrecy capacity and optimal power allocation , 2009, 2009 3rd International Conference on Signal Processing and Communication Systems.

[4]  Holger Boche,et al.  Majorization and Matrix-Monotone Functions in Wireless Communications , 2007, Found. Trends Commun. Inf. Theory.

[5]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[6]  Ruoheng Liu,et al.  Securing Wireless Communications at the Physical Layer , 2014 .

[7]  J. Norris Appendix: probability and measure , 1997 .

[8]  Eduard A. Jorswieck,et al.  Secrecy Rate Region of MISO Interference Channel : Pareto Boundary and Non-Cooperative Games , 2009 .

[9]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[10]  Chong-Yung Chi,et al.  On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise: The Noise Leakage Problem , 2009, IEEE Transactions on Wireless Communications.

[11]  Amir K. Khandani,et al.  The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel , 2009, IEEE Transactions on Information Theory.

[12]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[13]  Mustafa Cenk Gursoy Secure communication in the low-SNR regime: A Characterization of the energy-secrecy tradeoff , 2009, 2009 IEEE International Symposium on Information Theory.

[14]  Qiang Li,et al.  Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming , 2010, IEEE Transactions on Signal Processing.

[15]  Eduard A. Jorswieck,et al.  Secrecy on the Physical Layer in Wireless Networks , 2010 .

[16]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[17]  Andrea J. Goldsmith,et al.  Capacity limits of MIMO channels , 2003, IEEE J. Sel. Areas Commun..

[18]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[19]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[20]  I. Olkin,et al.  Inequalities: Theory of Majorization and Its Applications , 1980 .

[21]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[22]  Shidong Zhou,et al.  On the Monotonicity, Log-Concavity, and Tight Bounds of the Generalized Marcum and Nuttall $Q$-Functions , 2010, IEEE Transactions on Information Theory.

[23]  Erik G. Larsson,et al.  Complete Characterization of the Pareto Boundary for the MISO Interference Channel , 2008, IEEE Transactions on Signal Processing.

[24]  John G. Proakis,et al.  Digital Communications , 1983 .

[25]  Ingram Olkin,et al.  Inequalities: Theory of Majorization and Its Application , 1979 .

[26]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[27]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[28]  Elza Erkip,et al.  Diversity-multiplexing tradeoff for the multiple-antenna wire-tap channel , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[29]  Ness B. Shroff,et al.  Secrecy outage capacity of fading channels , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).

[30]  Richard E. Blahut,et al.  Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[31]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.