Artificial Noise Revisited

The artificial noise (AN) scheme, proposed by Goel and Negi, is being considered as one of the key enabling technology for secure communications over multiple-output multiple-input wiretap channels. However, the decrease in secrecy rate due to the increase in the number of Eve's antennas is not well understood. In this paper, we develop an analytical framework to characterize the secrecy rate of the AN scheme as a function of Eve's SNR, Bob's SNR, the number of antennas in each terminal, and the power allocation scheme. We first derive a closed-form expression for the average secrecy rate. We then derive a closed-form expression for the asymptotic instantaneous secrecy rate with large number of antennas at all terminals. Finally, we derive simple lower and upper bounds on the average/instantaneous secrecy rate that provide a tool for the system design.

[1]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[2]  H. Vincent Poor,et al.  Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.

[3]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[4]  Xin Wang,et al.  Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.

[5]  Emre Telatar,et al.  Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..

[6]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[7]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[8]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[9]  Joseph H. Silverman,et al.  NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.

[10]  Matthew R. McKay,et al.  Enhancing Secrecy With Multi-Antenna Transmission in Wireless Ad Hoc Networks , 2013, IEEE Transactions on Information Forensics and Security.

[11]  Yi Hong,et al.  Practical Secrecy using Artificial Noise , 2013, IEEE Communications Letters.

[12]  Jean-Claude Belfiore,et al.  Lattice Codes for the Wiretap Gaussian Channel: Construction and Analysis , 2011, IEEE Transactions on Information Theory.

[13]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[14]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[15]  Alexander Vardy,et al.  Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.

[16]  Hyundong Shin,et al.  MIMO Networks: The Effects of Interference , 2008, IEEE Transactions on Information Theory.

[17]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[18]  E. Lukács,et al.  A Property of the Normal Distribution , 1954 .

[19]  Cong Ling,et al.  Semantically Secure Lattice Codes for the Gaussian Wiretap Channel , 2012, IEEE Transactions on Information Theory.

[20]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[21]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[22]  Hyundong Shin,et al.  Closed-form formulas for ergodic capacity of MIMO Rayleigh fading channels , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[23]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[24]  Antonia Maria Tulino,et al.  Random Matrix Theory and Wireless Communications , 2004, Found. Trends Commun. Inf. Theory.

[25]  H. Luetkepohl The Handbook of Matrices , 1996 .

[26]  Yi Hong,et al.  Artificial noise revisited: When Eve has more antennas than Alice , 2014, 2014 International Conference on Signal Processing and Communications (SPCOM).

[27]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..