Power Allocation for Artificial-Noise Secure MIMO Precoding Systems

This paper investigates the power allocation problem for artificial noise (AN) secure precoding systems, and proposes closed-form solutions for maximizing the achievable secrecy rate. It is assumed that the transmitter knows the full channel information at the legitimate receiver, and knows only the statistics of the channel information at the eavesdropper. Lower bounds are derived for the secrecy rates in multiple-input single-output channels with single or multiple eavesdroppers and multiple-input multiple-output channels with multiple eavesdroppers. When the number of transmit antennas is sufficiently large, the bounds are tight, and closed-form solutions can be derived from these bounds. The analytical results suggest simple and yet informative solutions as follows: Let the numbers of receive antennas at the legitimate receiver and at the eavesdropper be Nr and Nr,e, respectively. The system should distribute Nr,e/(Nr+Nr,e) of the power to AN in the high SNR regime, and distribute zero power to AN in the low SNR regime; the rate loss due to the eavesdropper is -Nr log(Nr/(Nr+Nr,e))-Nr,e log(Nr,e/(Nr+Nr,e)) bits/sec/Hz in the high SNR regime and nearly negligible in the low SNR regime. The derived results also show that equal power and water-filling power allocations lead to similar solutions and rate loss. Simulation results corroborate the theoretical results.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  I. Miller Probability, Random Variables, and Stochastic Processes , 1966 .

[3]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[4]  A. Edelman Eigenvalues and condition numbers of random matrices , 1988 .

[5]  A. Goldsmith,et al.  Capacity of Rayleigh fading channels under different adaptive transmission and diversity-combining techniques , 1999, IEEE Transactions on Vehicular Technology.

[6]  Emre Telatar,et al.  Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..

[7]  Upamanyu Madhow,et al.  Space-Time transmit precoding with imperfect feedback , 2001, IEEE Trans. Inf. Theory.

[8]  Robert W. Heath,et al.  Grassmannian beamforming for multiple-input multiple-output wireless systems , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[9]  Ilse C. F. Ipsen,et al.  Determinant Approximations , 2011, 1105.0437.

[10]  Anja Vogler,et al.  An Introduction to Multivariate Statistical Analysis , 2004 .

[11]  Thomas L. Marzetta,et al.  Multiple-antenna channel hardening and its implications for rate feedback and scheduling , 2004, IEEE Transactions on Information Theory.

[12]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[13]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.

[14]  David James Love,et al.  On the performance of random vector quantization limited feedback beamforming in a MISO system , 2007, IEEE Transactions on Wireless Communications.

[15]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[16]  Nan Liu,et al.  Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.

[17]  Shlomo Shamai,et al.  An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009 .

[18]  Shlomo Shamai,et al.  An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009, 2009 IEEE International Symposium on Information Theory.

[19]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[20]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[21]  Shlomo Shamai,et al.  Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.

[22]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[23]  Zhi Ding,et al.  On Secrecy of Codebook-Based Transmission Beamforming under Receiver Limited Feedback , 2011, IEEE Transactions on Wireless Communications.

[24]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[25]  A. Lee Swindlehurst,et al.  MIMO Interference Channel With Confidential Messages: Achievable Secrecy Rates and Precoder Design , 2011, IEEE Transactions on Information Forensics and Security.

[26]  Charalambos D. Charalambous,et al.  On optimal signaling over secure MIMO channels , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[27]  A. Lee Swindlehurst,et al.  Full Rank Solutions for the MIMO Gaussian Wiretap Channel With an Average Power Constraint , 2012, IEEE Transactions on Signal Processing.

[28]  Shlomo Shamai,et al.  New Results on Multiple-Input Multiple-Output Broadcast Channels With Confidential Messages , 2011, IEEE Transactions on Information Theory.

[29]  Mérouane Debbah,et al.  Massive MIMO in the UL/DL of Cellular Networks: How Many Antennas Do We Need? , 2013, IEEE Journal on Selected Areas in Communications.

[30]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[31]  Charalambos D. Charalambous,et al.  Further results on optimal signaling over secure MIMO channels , 2013, 2013 IEEE International Symposium on Information Theory.

[32]  Erik G. Larsson,et al.  Massive MIMO for next generation wireless systems , 2013, IEEE Communications Magazine.