Linear Precoder Design for an MIMO Gaussian Wiretap Channel With Full-Duplex Source and Destination Nodes

This paper investigates and quantifies the advantages of a Full-Duplex (FD) transmitter/receiver pair in improving the secrecy rate of the system. We consider a linear precoder design for a multiple-input multiple-output Gaussian wiretap channel, which comprises two legitimate nodes, i.e., Alice and Bob, operating in FD mode and exchanging confidential messages in the presence of a passive eavesdropper. Using the sum secrecy degrees of freedoms (sum SDoFs) as metric, we formulate an optimization problem with respect to Alice’s and Bob’s precoding matrices. In order to solve this problem, we first propose a cooperative secrecy transmission scheme, whose feasible set is sufficient to achieve the maximum sum SDoF. Based on that feasible set, we then determine in closed form the maximum achievable sum SDoF and also provide a method for constructing the precoding matrix pair, which achieves the maximum sum SDoF. The latter pair would be near-optimal in terms of the achievable secrecy sum rate in the high signal-to-noise ratio (SNR) regime. By providing the maximum achievable sum SDoF as a function of the number of antennas, one could select the optimal system parameters to further maximize the achievable sum SDoF. We use simulations to evaluate the performance of the proposed precoding matrices in realistic channel scenarios and at various levels of the SNR.

[1]  Jianwei Xie,et al.  Secure Degrees of Freedom of $K$ -User Gaussian Interference Channels: A Unified View , 2013, IEEE Transactions on Information Theory.

[2]  A. Lee Swindlehurst,et al.  Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer , 2011, IEEE Transactions on Signal Processing.

[3]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[4]  Alexandre J. Pierrot,et al.  Strongly Secure Communications Over the Two-Way Wiretap Channel , 2010, IEEE Transactions on Information Forensics and Security.

[5]  Zhi Xue,et al.  Enhanced MIMOME wiretap channel via adopting full-duplex MIMO radios , 2014, 2014 IEEE Global Communications Conference.

[6]  Shlomo Shamai,et al.  Compound Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..

[7]  H. Vincent Poor,et al.  Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.

[8]  Trung Quang Duong,et al.  On the Interference Alignment Designs for Secure Multiuser MIMO Systems , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[9]  Günes Karabulut-Kurt,et al.  A High Data Rate Wireless Communication System With Improved Secrecy: Full Duplex Beamforming , 2014, IEEE Communications Letters.

[10]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[11]  Jianwei Xie,et al.  Secure degrees of freedom region of the Gaussian interference channel with secrecy constraints , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[12]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[13]  Tao Zhang,et al.  Physical-Layer Security for Full Duplex Communications With Self-Interference Mitigation , 2016, IEEE Transactions on Wireless Communications.

[14]  Zhu Han,et al.  Resource allocation in full-duplex communications for future wireless networks , 2015, IEEE Wireless Communications.

[15]  Moustafa Youssef,et al.  Achievable Secrecy Rate Regions for the Two-Way Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[16]  H. Vincent Poor,et al.  The Gaussian wiretap channel with a helping interferer , 2008, 2008 IEEE International Symposium on Information Theory.

[17]  Jeffrey G. Andrews,et al.  MIMO Interference Alignment Over Correlated Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[18]  张旗,et al.  Optimal and Suboptimal Full-Duplex Secure Beamforming Designs for MISO Two-Way Communications , 2015 .

[19]  Qi Zhang,et al.  Robust Secure Beamforming in MISO Full-Duplex Two-Way Secure Communications , 2016, IEEE Transactions on Vehicular Technology.

[20]  M. Saunders,et al.  Towards a Generalized Singular Value Decomposition , 1981 .

[21]  Ya-Feng Liu,et al.  Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization , 2013, IEEE Journal on Selected Areas in Communications.

[22]  Symeon Chatzinotas,et al.  Joint Power Control in Wiretap Interference Channels , 2014, IEEE Transactions on Wireless Communications.

[23]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[24]  Ying Zhang,et al.  Full-Duplex Bidirectional Secure Communications Under Perfect and Distributionally Ambiguous Eavesdropper's CSI , 2017, IEEE Transactions on Signal Processing.

[25]  Aylin Yener,et al.  Gaussian two-way wiretap channel with an arbitrarily varying eavesdropper , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[26]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[27]  Mounir Ghogho,et al.  Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.

[28]  Zhi Chen,et al.  Improving Wireless Physical Layer Security via Exploiting Co-Channel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.

[29]  Aylin Yener,et al.  The Role of Feedback in Two-Way Secure Communications , 2009, IEEE Transactions on Information Theory.

[30]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[31]  Zhi Chen,et al.  A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance , 2016, IEEE Signal Processing Letters.

[32]  Zhi Chen,et al.  Secrecy degrees of freedom of a MIMO Gaussian wiretap channel with a cooperative jammer , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[33]  Zhi Xue,et al.  Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable Secrecy Rate based Optimization , 2014, IEEE Signal Processing Letters.

[34]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[35]  W. Marsden I and J , 2012 .

[36]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[37]  Tiejun Lv,et al.  Secrecy Transmit Beamforming for Heterogeneous Networks , 2015, IEEE Journal on Selected Areas in Communications.

[38]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[39]  H. Vincent Poor,et al.  On unbounded path-loss models: effects of singularity on wireless network performance , 2009, IEEE Journal on Selected Areas in Communications.

[40]  Risto Wichman,et al.  In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.

[41]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.

[42]  James S. Lehnert,et al.  Optimal cooperative jamming for security , 2011, 2011 - MILCOM 2011 Military Communications Conference.