Optimal Energy-Efficient Design of Confidential Multiple-Antenna Systems

Energy-efficient resource allocation in multiple-antenna wiretap channels is investigated, subject to maximum power and minimum secrecy capacity/rate constraints. Two energy-efficient metrics are optimized, namely the secrecy energy efficiency, defined as the ratio between the system secrecy capacity and the consumed power, and the secret-key energy efficiency, defined as the ratio between the system secret-key capacity and the consumed power. If the legitimate receiver and the eavesdropper have a single antenna, and the transmitter has multiple antennas, the global solution can be expressed by a simple formula that requires negligible complexity to be computed. Instead, if all nodes have multiple-antennas, provably convergent and computationally-friendly iterative algorithms are provided, which are able to determine the global maximum of the secret-key energy efficiency and candidate solutions of the secrecy energy efficiency maximization problem. Numerical results assess the performance of the proposed methods.

[1]  Are Hjørungnes Complex-Valued Matrix Derivatives: Preface , 2011 .

[2]  Mohamed-Slim Alouini,et al.  On Secure Underlay MIMO Cognitive Radio Networks With Energy Harvesting and Transmit Antenna Selection , 2017, IEEE Transactions on Green Communications and Networking.

[3]  Geoffrey Ye Li,et al.  Distributed Interference-Aware Energy-Efficient Power Optimization , 2011, IEEE Transactions on Wireless Communications.

[4]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[5]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[6]  Symeon Chatzinotas,et al.  Secrecy energy efficiency optimization for MISO and SISO communication networks , 2015, 2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[7]  Ya-Feng Liu,et al.  Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization , 2013, IEEE Journal on Selected Areas in Communications.

[8]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[9]  Simon L. Cotton,et al.  Secrecy Capacity Analysis Over κ-μ Fading Channels: Theory and Applications , 2015, IEEE Trans. Commun..

[10]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.

[11]  Daniel Pérez Palomar,et al.  Power Control By Geometric Programming , 2007, IEEE Transactions on Wireless Communications.

[12]  Muhammad Ali Imran,et al.  How much energy is needed to run a wireless network? , 2011, IEEE Wireless Communications.

[13]  Derrick Wing Kwan Ng,et al.  Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.

[14]  Athina P. Petropulu,et al.  On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels , 2011, IEEE Transactions on Wireless Communications.

[15]  A. Lee Swindlehurst,et al.  On the Optimality of Linear Precoding for Secrecy in the MIMO Broadcast Channel , 2013, IEEE Journal on Selected Areas in Communications.

[16]  Sumei Sun,et al.  Energy Efficient Power Control for Distributed Transmitters with ZF-Based Multiuser MIMO Precoding , 2013, IEEE Communications Letters.

[17]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[18]  H. Vincent Poor,et al.  On Energy-Secrecy Trade-Offs for Gaussian Wiretap Channels , 2013, IEEE Transactions on Information Forensics and Security.

[19]  Eduard A. Jorswieck,et al.  Energy Efficiency in Wireless Networks via Fractional Programming Theory , 2015, Found. Trends Commun. Inf. Theory.

[20]  Shlomo Shamai,et al.  Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.

[21]  Qiang Li,et al.  Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization , 2013, IEEE Transactions on Signal Processing.

[22]  Eduard A. Jorswieck,et al.  Energy Efficiency of Confidential Multi-Antenna Systems With Artificial Noise and Statistical CSI , 2016, IEEE Journal of Selected Topics in Signal Processing.

[23]  Matthieu Bloch,et al.  Secret Sharing over Fast-Fading MIMO Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..

[24]  Costas N. Georghiades,et al.  Secrecy Capacity per Unit Cost , 2013, IEEE Journal on Selected Areas in Communications.

[25]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[26]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[27]  Charalambos D. Charalambous,et al.  On optimal signaling over secure MIMO channels , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[28]  Andrea J. Goldsmith,et al.  Transmitter optimization and optimality of beamforming for multiple antenna systems , 2004, IEEE Transactions on Wireless Communications.

[29]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[30]  Luca Venturino,et al.  Energy-Efficient Scheduling and Power Allocation in Downlink OFDMA Networks With Base Station Coordination , 2014, IEEE Transactions on Wireless Communications.

[31]  Wei-Ping Zhu,et al.  Secrecy Energy Efficiency Maximization in Cognitive Radio Networks , 2017, IEEE Access.

[32]  Xiaoming Chen,et al.  Energy-Efficient Optimization for Physical Layer Security in Multi-Antenna Downlink Networks with QoS Guarantee , 2013, IEEE Communications Letters.

[33]  Caijun Zhong,et al.  Multi-antenna relay aided wireless physical layer security , 2015, IEEE Communications Magazine.

[34]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[35]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[36]  I. S. Ansari,et al.  Secrecy Capacity Analysis Over $\alpha - \mu $ Fading Channels , 2017, IEEE Communications Letters.

[37]  N. P. Kumar Energy-Efficient Resource Allocation in OFDMA Systems with Large Numbers of Base Station Antennas , 2017 .

[38]  Eduard A. Jorswieck,et al.  Energy Efficiency and Interference Neutralization in Two-Hop MIMO Interference Channels , 2014, IEEE Transactions on Signal Processing.

[39]  Venkat Anantharam,et al.  Information-Theoretic Key Agreement of Multiple Terminals—Part II: Channel Model , 2010, IEEE Transactions on Information Theory.

[40]  Eduard A. Jorswieck,et al.  Maximization of worst-case secret key rates in MIMO systems with eavesdropper , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[41]  Wan Choi,et al.  Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.

[42]  Gordon P. Wright,et al.  Technical Note - A General Inner Approximation Algorithm for Nonconvex Mathematical Programs , 1978, Oper. Res..

[43]  Matthew R. McKay,et al.  On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.

[44]  Jeffrey G. Andrews,et al.  Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.

[45]  Iain B. Collings,et al.  Large System Analysis of Linear Precoding in MISO Broadcast Channels with Confidential Messages , 2013, IEEE Journal on Selected Areas in Communications.

[46]  Yongming Huang,et al.  Energy-Efficient Precoder Design for MIMO Wiretap Channels , 2014, IEEE Communications Letters.

[47]  Athina P. Petropulu,et al.  Transmitter Optimization for Achieving Secrecy Capacity in Gaussian MIMO Wiretap Channels , 2009, ArXiv.

[48]  Cheng-Liang Lin,et al.  On Secrecy Capacity of Fast Fading MIMOME Wiretap Channels with Statistical CSIT , 2013, IEEE Transactions on Wireless Communications.

[49]  Huan Zhang,et al.  Secrecy Outage Performance for SIMO Underlay Cognitive Radio Systems With Generalized Selection Combining Over Nakagami-$m$ Channels , 2016, IEEE Transactions on Vehicular Technology.

[50]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[51]  Athina P. Petropulu,et al.  Explicit Solution of Worst-Case Secrecy Rate for MISO Wiretap Channels With Spherical Uncertainty , 2011, IEEE Transactions on Signal Processing.

[52]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[53]  Jin Xu,et al.  Secure Transmission in MISOME Wiretap Channel With Multiple Assisting Jammers: Maximum Secrecy Rate and Optimal Power Allocation , 2017, IEEE Transactions on Communications.

[54]  Werner Dinkelbach On Nonlinear Fractional Programming , 1967 .

[55]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[56]  Mohamed-Slim Alouini,et al.  On the diversity-multiplexing tradeoff of secret-key agreement over multiple-antenna channels , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[57]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.