Probabilistic Constrained Secure Transmissions: Variable-Rate Design and Performance Analysis

In a wiretap channel, due to the passive nature of eavesdropper and the inevitable errors during channel estimation or feedback, the channel state information is usually imperfectly known at the transmitter. While probabilistic constrained secure transmission provides an elegant formulation to tackle these uncertainties, current works mostly focus on the fixed-rate secure transmission design. To exploit the dynamic channel state information for performance enhancement, this paper investigates a variable-rate transmission scheme with adjustable rate and power, under the outage probabilistic constraints and upper bounding rate constraint. By leveraging the first-order and log-concavity properties of the Marcum Q-function, closed-form optimal secure transmission design is obtained. Furthermore, the optimality of the proposed method empowers us to concisely quantify the performance gain brought by rate variation. Numerical results show that the proposed scheme achieves significantly lower average outage probability and higher throughput than the fixed-rate scheme no matter with or without upper bound rate limitation.

[1]  Eduard A. Jorswieck,et al.  Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.

[2]  Tong-Xing Zheng,et al.  Nonadaptive Transmission for Slow Fading MISOSE Wiretap Channel with Adjustable Power Allocation , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[3]  Xiangyun Zhou,et al.  Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.

[4]  George C. Alexandropoulos,et al.  Secrecy Outage Analysis Over Correlated Composite Nakagami- $m$ /Gamma Fading Channels , 2017, IEEE Communications Letters.

[5]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[6]  Diethard Klatte,et al.  Strong stability in nonlinear programming revisited , 1999, The Journal of the Australian Mathematical Society. Series B. Applied Mathematics.

[7]  Huiming Wang,et al.  A new scheme to improve the secrecy throughput under the constraints of secrecy outage probability and average transmit power , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).

[8]  Kwok Hung Li,et al.  Secrecy Throughput Maximization for MISO Multi-Eavesdropper Wiretap Channels , 2017, IEEE Transactions on Information Forensics and Security.

[9]  A. Lee Swindlehurst,et al.  Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.

[10]  Shuai Ma,et al.  Outage Constrained Robust Secure Transmission for MISO Wiretap Channels , 2013, IEEE Transactions on Wireless Communications.

[11]  Aashish Mathur,et al.  Secrecy Performance of Correlated $\alpha$ - $\mu$ Fading Channels , 2019, IEEE Commun. Lett..

[12]  Thorsten Gerber,et al.  Handbook Of Mathematical Functions , 2016 .

[13]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[14]  W. K. Pratt,et al.  Partial differentials of Marcum's Q function , 1968 .

[15]  Yueming Cai,et al.  Secure Transmission Design With Feedback Compression for the Internet of Things , 2018, IEEE Transactions on Signal Processing.

[16]  Furqan Jameel,et al.  A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security , 2019, IEEE Communications Surveys & Tutorials.

[17]  Gerd Wachsmuth,et al.  On LICQ and the uniqueness of Lagrange multipliers , 2013, Oper. Res. Lett..

[18]  Georges Kaddoum,et al.  Secrecy Analysis in Wireless Network With Passive Eavesdroppers by Using Partial Cooperation , 2019, IEEE Transactions on Vehicular Technology.

[19]  M. Kojima Strongly Stable Stationary Solutions in Nonlinear Programs. , 1980 .

[20]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.

[21]  Feng Liu,et al.  Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.

[22]  R. P. Soni On an Inequality for Modified Bessel Functions , 1965 .

[23]  Yaming Yu,et al.  On Log-concavity of the Generalized Marcum Q Function , 2011, ArXiv.

[24]  Bo Wang,et al.  Artificial-Noise-Aided Beamforming Design in the MISOME Wiretap Channel Under the Secrecy Outage Probability Constraint , 2017, IEEE Transactions on Wireless Communications.

[25]  Robert W. Heath,et al.  An overview of limited feedback in wireless communication systems , 2008, IEEE Journal on Selected Areas in Communications.

[26]  Hui-Ming Wang,et al.  An Adaptive Transmission Scheme for Slow Fading Wiretap Channel with Channel Estimation Errors , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[27]  Ufuk Topcu,et al.  Convex Optimal Uncertainty Quantification , 2013, SIAM J. Optim..

[28]  Bo Wang,et al.  Secure On–Off Transmission in Slow Fading Wiretap Channel With Imperfect CSI , 2017, IEEE Transactions on Vehicular Technology.

[29]  Boris S. Mordukhovich,et al.  Characterizations of Full Stability in Constrained Optimization , 2013, SIAM J. Optim..

[30]  Caijun Zhong,et al.  Secrecy Analysis of MIMO Wiretap Channels With Low-Complexity Receivers Under Imperfect Channel Estimation , 2017, IEEE Transactions on Information Forensics and Security.

[31]  Zhu Han,et al.  Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy , 2017, IEEE Transactions on Wireless Communications.

[32]  Derrick Wing Kwan Ng,et al.  Resource Allocation for a Massive MIMO Relay Aided Secure Communication , 2016, IEEE Transactions on Information Forensics and Security.

[33]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[34]  G. Wachsmuth Differentiability of implicit functions: Beyond the implicit function theorem , 2014 .

[35]  Mohamed-Slim Alouini,et al.  Secure Broadcasting With Imperfect Channel State Information at the Transmitter , 2016, IEEE Transactions on Wireless Communications.

[36]  Derrick Wing Kwan Ng,et al.  Optimal Resource Allocation for Power-Efficient MC-NOMA With Imperfect Channel State Information , 2017, IEEE Transactions on Communications.

[37]  Xiangyun Zhou,et al.  A Versatile Secure Transmission Strategy in the Presence of Outdated CSI , 2016, IEEE Transactions on Vehicular Technology.

[38]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[39]  Xin Liu,et al.  Joint Beamforming and User Selection in Multicast Downlink Channel under Secrecy-Outage Constraint , 2014, IEEE Communications Letters.

[40]  Arkadi Nemirovski,et al.  Lectures on modern convex optimization - analysis, algorithms, and engineering applications , 2001, MPS-SIAM series on optimization.

[41]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[42]  Xingqin Lin,et al.  A Primer on 3GPP Narrowband Internet of Things , 2016, IEEE Communications Magazine.