Secure Transmission With Large Numbers of Antennas and Finite Alphabet Inputs

In this paper, we investigate secure transmission over the large-scale multiple-antenna wiretap channel with finite alphabet inputs. First, we investigate the case where instantaneous channel state information (CSI) of the eavesdropper is known at the transmitter. We show analytically that a generalized singular value decomposition (GSVD)-based design, which is optimal for Gaussian inputs, may exhibit a severe performance loss for finite alphabet inputs in the high signal-to-noise ratio regime. In light of this, we propose a novel Per-Group-GSVD (PG-GSVD) design, which can effectively compensate the performance loss caused by the GSVD design. More importantly, the computational complexity of the PG-GSVD design is by orders of magnitude lower than that of the existing design for finite alphabet inputs while the resulting performance loss is minimal. Then, we extend the PG-GSVD design to the case where only statistical CSI of the eavesdropper is available at the transmitter. Numerical results indicate that the proposed PG-GSVD design can be efficiently implemented in large-scale multiple-antenna systems and achieves significant performance gains compared with the GSVD design.

[1]  Xiaoming Chen,et al.  Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF? , 2015, IEEE Transactions on Wireless Communications.

[2]  Pekka Kyosti,et al.  MATLAB implementation of the 3GPP spatial channel model (3GPP TR 25.996) , 2005 .

[3]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[4]  Sw. Banerjee,et al.  Linear Algebra and Matrix Analysis for Statistics , 2014 .

[5]  Yi Hong,et al.  Precoding by Pairing Subchannels to Increase MIMO Capacity With Discrete Input Alphabets , 2010, IEEE Transactions on Information Theory.

[6]  Vijay K. Bhargava,et al.  Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.

[7]  Zhi Ding,et al.  On the Secrecy Rate of Multi-Antenna Wiretap Channel under Finite-Alphabet Input , 2011, IEEE Communications Letters.

[8]  Angel Lozano,et al.  Low-complexity MIMO precoding with discrete signals and statistical CSI , 2015, 2016 IEEE International Conference on Communications (ICC).

[9]  Li Wang,et al.  Secrecy Enhancement Analysis Against Unknown Eavesdropping in Spatial Modulation , 2015, IEEE Communications Letters.

[10]  Caijun Zhong,et al.  Multi-antenna relay aided wireless physical layer security , 2015, IEEE Communications Magazine.

[11]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[12]  Giuseppe Caire,et al.  Joint Spatial Division and Multiplexing—The Large-Scale Array Regime , 2013, IEEE Transactions on Information Theory.

[13]  Zhi Ding,et al.  Linear Precoding for MIMO Broadcast Channels With Finite-Alphabet Constraints , 2012, IEEE Transactions on Wireless Communications.

[14]  Thomas L. Marzetta,et al.  Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas , 2010, IEEE Transactions on Wireless Communications.

[15]  Miguel R. D. Rodrigues,et al.  MIMO Gaussian Channels With Arbitrary Inputs: Optimal Precoding and Power Allocation , 2010, IEEE Transactions on Information Theory.

[16]  Yahong Rosa Zheng,et al.  Multiantenna Secure Cognitive Radio Networks With Finite-Alphabet Inputs: A Global Optimization Approach for Precoder Design , 2016, IEEE Transactions on Wireless Communications.

[17]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.

[18]  P. Halmos Finite-Dimensional Vector Spaces , 1960 .

[19]  Derrick Wing Kwan Ng,et al.  Artificial Noise Assisted Secure Transmission Under Training and Feedback , 2015, IEEE Transactions on Signal Processing.

[20]  Tao Zhang,et al.  Physical-Layer Security for Full Duplex Communications With Self-Interference Mitigation , 2016, IEEE Transactions on Wireless Communications.

[21]  Yulong Zou,et al.  Physical-Layer Security for Spectrum Sharing Systems , 2016, IEEE Transactions on Wireless Communications.

[22]  Antonia Maria Tulino,et al.  Optimum power allocation for parallel Gaussian channels with arbitrary input distributions , 2006, IEEE Transactions on Information Theory.

[23]  Erik G. Larsson,et al.  Massive MIMO for next generation wireless systems , 2013, IEEE Communications Magazine.

[24]  Li Wang,et al.  SNR Analysis of Time Reversal Signaling on Target and Unintended Receivers in Distributed Transmission , 2016, IEEE Transactions on Communications.

[25]  Jianhua Lu,et al.  Linear Precoding for Finite-Alphabet Inputs Over MIMO Fading Channels With Statistical CSI , 2012, IEEE Transactions on Signal Processing.

[26]  Chung G. Kang,et al.  MIMO-OFDM Wireless Communications with MATLAB , 2010 .

[27]  Feifei Gao,et al.  Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.

[28]  Zhi Ding,et al.  Globally Optimal Linear Precoders for Finite Alphabet Signals Over Complex Vector Gaussian Channels , 2011, IEEE Transactions on Signal Processing.

[29]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[30]  Xiqi Gao,et al.  Linear Precoding for the MIMO Multiple Access Channel With Finite Alphabet Inputs and Statistical CSI , 2014, IEEE Transactions on Wireless Communications.

[31]  Tolga M. Duman,et al.  Low complexity precoding for MIMOME wiretap channels based on cut-off rate , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[32]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[33]  Zhi Ding,et al.  On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input , 2011, IEEE Transactions on Communications.

[34]  Derrick Wing Kwan Ng,et al.  Artificial Noise Assisted Secure Transmission for Distributed Antenna Systems , 2016, IEEE Transactions on Signal Processing.

[35]  David Gesbert,et al.  Dealing With Interference in Distributed Large-Scale MIMO Systems: A Statistical Approach , 2014, IEEE Journal of Selected Topics in Signal Processing.

[36]  Zhi Ding,et al.  Linear Precoding for Finite-Alphabet Signaling Over MIMOME Wiretap Channels , 2012, IEEE Transactions on Vehicular Technology.

[37]  Zhi Ding,et al.  Linear Precoder Design for MIMO Interference Channels with Finite-Alphabet Signaling , 2013, IEEE Transactions on Communications.

[38]  Athina P. Petropulu,et al.  On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels , 2011, IEEE Transactions on Wireless Communications.

[39]  Daniel Pérez Palomar,et al.  Gradient of mutual information in linear vector Gaussian channels , 2006, IEEE Transactions on Information Theory.

[40]  P. Halmos Naive Set Theory , 1961 .

[41]  Vijay K. Bhargava,et al.  Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.

[42]  Derrick Wing Kwan Ng,et al.  Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.

[43]  Kai-Kit Wong,et al.  A Deterministic Equivalent for the Analysis of Non-Gaussian Correlated MIMO Multiple Access Channels , 2011, IEEE Transactions on Information Theory.

[44]  Mustafa Cenk Gursoy Secure Communication in the Low-SNR Regime , 2012, IEEE Transactions on Communications.

[45]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[46]  Kee Chaing Chua,et al.  Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[47]  Ender Ayanoglu,et al.  Linear Precoding for MIMO With LDPC Coding and Reduced Complexity , 2015, IEEE Transactions on Wireless Communications.

[48]  Mohamed-Slim Alouini,et al.  Ergodic Secret Message Capacity of the Wiretap Channel with Finite-Rate Feedback , 2014 .

[49]  George E. Andrews,et al.  Number theory , 1971, Bicycle or Unicycle?.

[50]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.