On the Role of Artificial Noise in Training and Data Transmission for Secret Communications

This paper considers the joint design of training and data transmission in physical-layer secret communications, and examines the role of artificial noise (AN) in both of these phases. In particular, AN in the training phase is used to prevent the eavesdropper from obtaining accurate channel state information (CSI), whereas AN in the data transmission phase can be used to mask the transmission of confidential messages. By considering AN-assisted training and secrecy beamforming, we first derive bounds on the achievable secrecy rate and utilize them to obtain approximate secrecy rate expressions that are asymptotically tight at high SNR. By maximizing these expressions, power allocation policies between signal and AN in both training and data transmission phases are then proposed for conventional and AN-assisted training-based schemes, respectively. We show that the optimal AN power at high SNR should be non-vanishing with respect to the total power, and that AN usage can be more effective in the training phase than in the data transmission phase when the coherence time is large. However, at low SNR, we show that AN cannot be effectively utilized due to the lack of accurate CSI, and thus, one can often do better without. Numerical results are presented to verify our theoretical claims.

[1]  Xiangyun Zhou,et al.  Two-Way Training for Discriminatory Channel Estimation in Wireless MIMO Systems , 2011, IEEE Transactions on Signal Processing.

[2]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[3]  Babak Hassibi,et al.  Analysis of multiple-antenna wireless links at low SNR , 2004, IEEE Transactions on Information Theory.

[4]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[5]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[6]  Yao-Win Peter Hong,et al.  How much training is enough for secrecy beamforming with artificial noise , 2012, 2012 IEEE International Conference on Communications (ICC).

[7]  Nan Liu,et al.  Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.

[8]  Chong-Yung Chi,et al.  Training Sequence Design for Discriminatory Channel Estimation in Wireless MIMO Systems , 2010, IEEE Transactions on Signal Processing.

[9]  Mohamed-Slim Alouini,et al.  On the Secrecy Capacity of the Wiretap Channel With Imperfect Main Channel Estimation , 2014, IEEE Transactions on Communications.

[10]  Giuseppe Caire,et al.  Multiuser MIMO Achievable Rates With Downlink Training and Channel State Feedback , 2007, IEEE Transactions on Information Theory.

[11]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[12]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[13]  Tung-Sang Ng,et al.  Joint CFO and Channel Estimation for Multiuser MIMO-OFDM Systems With Optimal Training Sequences , 2008, IEEE Transactions on Signal Processing.

[14]  Daniel Pérez Palomar,et al.  Power Control By Geometric Programming , 2007, IEEE Transactions on Wireless Communications.

[15]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[16]  Andrea J. Goldsmith,et al.  Capacity and power allocation for fading MIMO channels with channel estimation error , 2006, IEEE Trans. Inf. Theory.

[17]  Tan F. Wong,et al.  Training sequence optimization in MIMO systems with colored interference , 2004, IEEE Transactions on Communications.

[18]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[19]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[20]  H. Vincent Poor,et al.  Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages , 2007, IEEE Transactions on Information Theory.

[21]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[22]  Aylin Yener,et al.  MIMO Wiretap Channels With Unknown and Varying Eavesdropper Channel States , 2014, IEEE Transactions on Information Theory.

[23]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[24]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[25]  Chong-Yung Chi,et al.  On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise: The Noise Leakage Problem , 2009, IEEE Transactions on Wireless Communications.

[26]  Mung Chiang,et al.  Geometric Programming for Communication Systems , 2005, Found. Trends Commun. Inf. Theory.

[27]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[28]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[29]  Sergio Verdú,et al.  Second-order asymptotics of mutual information , 2004, IEEE Transactions on Information Theory.

[30]  Xin-She Yang,et al.  Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.

[31]  Babak Hassibi,et al.  How much training is needed in multiple-antenna wireless links? , 2003, IEEE Trans. Inf. Theory.

[32]  Alex B. Gershman,et al.  Training-based MIMO channel estimation: a study of estimator tradeoffs and optimal training signals , 2006, IEEE Transactions on Signal Processing.

[33]  Derrick Wing Kwan Ng,et al.  Artificial Noise Assisted Secure Transmission Under Training and Feedback , 2015, IEEE Transactions on Signal Processing.

[34]  Eduard A. Jorswieck,et al.  To avoid or not to avoid CSI leakage in physical layer secret communication systems , 2015, IEEE Communications Magazine.

[35]  Chong-Yung Chi,et al.  Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.