Optimization of Code Rates in SISOME Wiretap Channels

We propose a new framework for determining the wiretap code rates of single-input-single-output multiantenna eavesdropper wiretap channels when the capacity of the eavesdropper's channel is not available at the transmitter. In our framework, we introduce the effective secrecy throughput (EST) as a new performance metric that explicitly captures the two key features of wiretap channels, namely, reliability and secrecy. Notably, the EST measures the average rate of the confidential information transmitted from the transmitter to the intended receiver without being eavesdropped on. We provide easy-to-implement methods to determine the wiretap code rates for two transmission schemes: 1) adaptive transmission scheme in which the capacity of the main channel is available at the transmitter and 2) fixed-rate transmission scheme in which the capacity of the main channel is not available at the transmitter. Such determinations are further extended into an absolute-passive eavesdropping scenario where even the average signal-to-noise ratio of the eavesdropper's channel is not available at the transmitter. Notably, our solutions for the wiretap code rates do not require us to set reliability or secrecy constraints for the transmission within wiretap channels.

[1]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[2]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[3]  Mehdi Bennis,et al.  Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.

[4]  Byung-Jae Kwak,et al.  LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.

[5]  A. Robert Calderbank,et al.  Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.

[6]  Jeffrey G. Andrews,et al.  Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.

[7]  Björn E. Ottersten,et al.  Physical Layer Security in Multibeam Satellite Systems , 2012, IEEE Transactions on Wireless Communications.

[8]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[9]  S. Leigh,et al.  Probability and Random Processes for Electrical Engineering , 1989 .

[10]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[11]  Matthew R. McKay,et al.  On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.

[12]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[13]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[14]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[15]  Alexander M. Haimovich,et al.  Performance analysis of maximal ratio combining and comparison with optimum combining for mobile radio communications with cochannel interference , 2000, IEEE Trans. Veh. Technol..

[16]  Branka Vucetic,et al.  Analysis of transmit antenna selection/maximal-ratio combining in Rayleigh fading channels , 2005, IEEE Transactions on Vehicular Technology.

[17]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.

[18]  Richard E. Blahut,et al.  Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[19]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[20]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[21]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .

[22]  Iain B. Collings,et al.  Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.

[23]  Moustafa Youssef,et al.  Keys Through ARQ: Theory and Practice , 2011, IEEE Transactions on Information Forensics and Security.

[24]  Nan Liu,et al.  Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.

[25]  Matthieu R. Bloch,et al.  Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.

[26]  Xiangyun Zhou,et al.  Physical Layer Security in Cellular Networks: A Stochastic Geometry Approach , 2013, IEEE Transactions on Wireless Communications.

[27]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[28]  Jinhong Yuan,et al.  On the target secrecy rate for SISOME wiretap channels , 2014, 2014 IEEE International Conference on Communications (ICC).

[29]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[30]  Hong Man,et al.  Maximal Ratio Diversity Combining Enhanced Security , 2011, IEEE Communications Letters.

[31]  Jinhong Yuan,et al.  Transmit Antenna Selection with Alamouti Coding and Power Allocation in MIMO Wiretap Channels , 2014, IEEE Transactions on Wireless Communications.