On the Secrecy Rate and Optimal Power Allocation for Artificial Noise Assisted MIMOME Channels

This paper considers the artificial noise (AN) scheme, proposed by Goel and Negi for securing wireless communications over multiple-input multiple-output multiantenna eavesdropper (MIMOME) channels. In this paper, we develop a lower bound on the ergodic secrecy rate of the AN scheme and derive an analytic expression of the bound without assuming any asymptotes for system parameters. Thus, the derived bound explicitly elucidates how the system parameters exert influence on the secrecy rate in various cases to some of which the previous work cannot be applied. It will also be shown that the bound is tight over wide combinations of system parameters, and a normalized difference between the bound and secrecy rate vanishes with a growing number of antennas at the transmitter. The derived bound is analytically so amenable that it enables one to not only extend the results of the previous work but also explore untouched aspects of the AN scheme. The bound answers an intriguing question: When is the AN signal beneficial? Besides, it makes possible to study a new important system parameter called the minimum required transmit power for a certain target secrecy rate, which has never been touched before.

[1]  F. Topsøe Some Bounds for the Logarithmic Function , 2004 .

[2]  Armin Straub,et al.  Bounds for the logarithm of the Euler gamma function and its derivatives , 2015, 1508.03267.

[3]  Bo Wang,et al.  Optimal Semiadaptive Transmission With Artificial-Noise-Aided Beamforming in MISO Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.

[4]  Bo Wang,et al.  Secrecy Rate Maximization With Artificial-Noise-Aided Beamforming for MISO Wiretap Channels Under Secrecy Outage Constraint , 2015, IEEE Communications Letters.

[5]  D. Harville Matrix Algebra From a Statistician's Perspective , 1998 .

[6]  Namseok Chang,et al.  Secrecy Rate for MISO Rayleigh Fading Channels with Relative Distance of Eavesdropper , 2012, IEEE Communications Letters.

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  H. Vincent Poor,et al.  Power Allocation for Artificial-Noise Secure MIMO Precoding Systems , 2014, IEEE Transactions on Signal Processing.

[9]  Shihao Yan,et al.  Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels , 2015, IEEE Transactions on Communications.

[10]  Xin Wang,et al.  Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.

[11]  Qinye Yin,et al.  Artificial-noise-aided beamforming design against a multi-antenna eavesdropper under secrecy outage constraint , 2017, 2017 IEEE International Conference on Communications (ICC).

[12]  Yi Hong,et al.  Artificial Noise Revisited , 2014, IEEE Transactions on Information Theory.

[13]  R. Bellman,et al.  A Survey of Matrix Theory and Matrix Inequalities , 1965 .

[14]  Trung Quang Duong,et al.  Optimal Transmission With Artificial Noise in MISOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.

[15]  S.M. Moser Expectations of a noncentral chi-square distribution with application to IID MIMO Gaussian fading , 2008, 2008 International Symposium on Information Theory and Its Applications.

[16]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[17]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[18]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[19]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[20]  M. Marcus,et al.  A Survey of Matrix Theory and Matrix Inequalities , 1965 .

[21]  Thomas L. Marzetta,et al.  Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas , 2010, IEEE Transactions on Wireless Communications.

[22]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[23]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[24]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[25]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[26]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[27]  Babak Hassibi,et al.  How much training is needed in multiple-antenna wireless links? , 2003, IEEE Trans. Inf. Theory.