Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel

The role of multiple antennas for secure communication is investigated within the framework of Wyner's wiretap channel. We characterize the secrecy capacity in terms of generalized eigenvalues when the sender and eavesdropper have multiple antennas, the intended receiver has a single antenna, and the channel matrices are fixed and known to all the terminals, and show that a beamforming strategy is capacity-achieving. In addition, we study a masked beamforming scheme that radiates power isotropically in all directions and show that it attains near-optimal performance in the high SNR regime. Insights into the scaling behavior of the capacity in the large antenna regime as well as extensions to ergodic fading channels are also provided.

[1]  Ashish Khisti,et al.  Interference Alignment for the Multiantenna Compound Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[2]  Shlomo Shamai,et al.  An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009, 2009 IEEE International Symposium on Information Theory.

[3]  Vinod M. Prabhakaran,et al.  The secrecy capacity of a class of parallel Gaussian compound wiretap channels , 2008, 2008 IEEE International Symposium on Information Theory.

[4]  Gregory W. Wornell,et al.  Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.

[5]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[6]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[7]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[8]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[9]  Gregory W. Wornell,et al.  The MIMOME Channel , 2007, ArXiv.

[10]  Nan Liu,et al.  Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.

[11]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[12]  Ami Wiesel,et al.  On the Gaussian MIMO Wiretap Channel , 2007, 2007 IEEE International Symposium on Information Theory.

[13]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.

[14]  Roy D. Yates,et al.  Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[15]  Gregory W. Wornell,et al.  Secure Broadcasting , 2007, ArXiv.

[16]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[17]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[18]  Shlomo Shamai,et al.  The Capacity Region of the Gaussian Multiple-Input Multiple-Output Broadcast Channel , 2006, IEEE Transactions on Information Theory.

[19]  Wei Yu,et al.  Uplink-downlink duality via minimax duality , 2006, IEEE Transactions on Information Theory.

[20]  Richard E. Blahut,et al.  Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[21]  R. Negi,et al.  Secret communication in presence of colluding eavesdroppers , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[22]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[23]  Antonia Maria Tulino,et al.  Random Matrix Theory and Wireless Communications , 2004, Found. Trends Commun. Inf. Theory.

[24]  Suhas N. Diggavi,et al.  The worst additive noise under a covariance constraint , 2001, IEEE Trans. Inf. Theory.

[25]  Chi-Kwong Li,et al.  Extremal Characterizations of the Schur Complement and Resulting Inequalities , 2000, SIAM Rev..

[26]  Ueli Maurer,et al.  Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.

[27]  Gene H. Golub,et al.  Matrix computations (3rd ed.) , 1996 .

[28]  J. W. Silverstein The Limiting Eigenvalue Distribution of a Multivariate F Matrix , 1985 .

[29]  M. Saunders,et al.  Towards a Generalized Singular Value Decomposition , 1981 .

[30]  I. Olkin,et al.  Inequalities: Theory of Majorization and Its Applications , 1980 .

[31]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[32]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[33]  Hiroshi Sato,et al.  An outer bound to the capacity region of broadcast channels (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[34]  C. Loan Generalizing the Singular Value Decomposition , 1976 .

[35]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[36]  M. Sion On general minimax theorems , 1958 .

[37]  Venkat Chandar,et al.  Sparse graph codes for compression, sensing, and secrecy , 2010 .

[38]  Roy D. Yates,et al.  Secrecy capacity of independent parallel channels , 2009 .

[39]  Shlomo Shamai,et al.  Compound wire-tap channels , 2007 .

[40]  Kaare Brandt Petersen,et al.  The Matrix Cookbook , 2006 .

[41]  Mohamed-Slim Alouini,et al.  Hotelling's generalized distribution and performance of 2D-RAKE receivers , 2003, IEEE Trans. Inf. Theory.

[42]  J. W. Silverstein,et al.  No eigenvalues outside the support of the limiting spectral distribution of large-dimensional sample covariance matrices , 1998 .

[43]  R. Muirhead Aspects of Multivariate Statistical Theory , 1982, Wiley Series in Probability and Statistics.