Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs

Optimal power allocation for orthogonal frequency division multiplexing (OFDM) wiretap channels with Gaussian channel inputs has already been studied in some previous works from an information theoretical viewpoint. However, these results are not sufficient for practical system designs. One reason is that discrete channel inputs, such as quadrature amplitude modulation (QAM) signals, instead of Gaussian channel inputs, are deployed in current practical wireless systems to maintain moderate peak transmission power and receiver complexity. In this paper, we investigate the power allocation and artificial noise design for OFDM wiretap channels with discrete channel inputs. We first prove that the secrecy rate function for discrete channel inputs is nonconcave with respect to the transmission power. To resolve the corresponding nonconvex secrecy rate maximization problem, we develop a low-complexity power allocation algorithm, which yields a duality gap diminishing in the order of O(1/√N), where N is the number of subcarriers of OFDM. We then show that independent frequency-domain artificial noise cannot improve the secrecy rate of single-antenna wiretap channels. Towards this end, we propose a novel time-domain artificial noise design which exploits temporal degrees of freedom provided by the cyclic prefix of OFDM systems to jam the eavesdropper and boost the secrecy rate even with a single antenna at the transmitter. Numerical results are provided to illustrate the performance of the proposed design schemes.

[1]  Carles Padró,et al.  Information Theoretic Security , 2013, Lecture Notes in Computer Science.

[2]  H. Vincent Poor,et al.  Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels , 2012, IEEE Transactions on Information Forensics and Security.

[3]  Cong Shen,et al.  The Wireless Communications Physical Layer , 2006 .

[4]  Miguel R. D. Rodrigues,et al.  MIMO Gaussian Channels With Arbitrary Inputs: Optimal Precoding and Power Allocation , 2010, IEEE Transactions on Information Theory.

[5]  G. Giannakis,et al.  Wireless Multicarrier Communications where Fourier Meets , 2022 .

[6]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[7]  Qiang Li,et al.  Safe convex approximation to outage-based MISO secrecy rate optimization under imperfect CSI and with artificial noise , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[8]  Zhi-Quan Luo,et al.  Duality Gap Estimation and Polynomial Time Approximation for Optimal Spectrum Management , 2009, IEEE Transactions on Signal Processing.

[9]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[10]  Philip M. Morse,et al.  Methods of Mathematical Physics , 1947, The Mathematical Gazette.

[11]  Jos F. Sturm,et al.  A Matlab toolbox for optimization over symmetric cones , 1999 .

[12]  Stephen G. Wilson,et al.  Digital Modulation and Coding , 1995 .

[13]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[14]  Aylin Yener,et al.  MIMO multiple access channel with an arbitrarily varying eavesdropper , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[15]  Shlomo Shamai,et al.  Estimation in Gaussian Noise: Properties of the Minimum Mean-Square Error , 2010, IEEE Transactions on Information Theory.

[16]  J. L. Massey,et al.  An introduction to contemporary cryptology , 1988, Proc. IEEE.

[17]  Chong-Yung Chi,et al.  Training Sequence Design for Discriminatory Channel Estimation in Wireless MIMO Systems , 2010, IEEE Transactions on Signal Processing.

[18]  H. Vincent Poor,et al.  A Unified Framework for Key Agreement Over Wireless Fading Channels , 2009, IEEE Transactions on Information Forensics and Security.

[19]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[20]  Gordon P. Wright,et al.  Technical Note - A General Inner Approximation Algorithm for Nonconvex Mathematical Programs , 1978, Oper. Res..

[21]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[22]  A. Lee Swindlehurst,et al.  Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer , 2011, IEEE Transactions on Signal Processing.

[23]  Houman Zarrinkoub Modulation and Coding , 2014 .

[24]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[25]  Roy D. Yates,et al.  Secrecy capacity of independent parallel channels , 2009 .

[26]  Daniel Pérez Palomar,et al.  Gradient of mutual information in linear vector Gaussian channels , 2006, IEEE Transactions on Information Theory.

[27]  Zhi Ding,et al.  On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input , 2011, IEEE Transactions on Communications.

[28]  Anelia Somekh-Baruch,et al.  On Gaussian wiretap channels with M-PAM inputs , 2010, 2010 European Wireless Conference (EW).

[29]  Roy D. Yates,et al.  Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[30]  Zhi Ding,et al.  Linear Precoding for Finite-Alphabet Signaling Over MIMOME Wiretap Channels , 2012, IEEE Transactions on Vehicular Technology.

[31]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[32]  Qiang Li,et al.  Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming , 2010, IEEE Transactions on Signal Processing.

[33]  Zhi Ding,et al.  On the Secrecy Rate of Multi-Antenna Wiretap Channel under Finite-Alphabet Input , 2011, IEEE Communications Letters.

[34]  Ruoheng Liu,et al.  Securing Wireless Communications at the Physical Layer , 2014 .

[35]  Wade Trappe,et al.  Achieving Secret Communication for Fast Rayleigh Fading Channels , 2010, IEEE Transactions on Wireless Communications.

[36]  Shlomo Shamai,et al.  Mutual information and minimum mean-square error in Gaussian channels , 2004, IEEE Transactions on Information Theory.

[37]  Andrey Garnaev,et al.  An Eavesdropping Game with SINR as an Objective Function , 2009, SecureComm.

[38]  A. Papoulis Signal Analysis , 1977 .

[39]  Jon W. Wallace,et al.  Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.

[40]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[41]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[42]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[43]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[44]  Eduard A. Jorswieck,et al.  Resource allocation for the wire-tap multi-carrier broadcast channel , 2008, 2008 International Conference on Telecommunications.

[45]  Antonia Maria Tulino,et al.  Optimum power allocation for parallel Gaussian channels with arbitrary input distributions , 2006, IEEE Transactions on Information Theory.

[46]  H. Vincent Poor,et al.  The Wiretap Channel With Feedback: Encryption Over the Channel , 2007, IEEE Transactions on Information Theory.

[47]  Randall K. Nichols,et al.  Wireless Security: Models, Threats, and Solutions , 2001 .

[48]  Daniel Pérez Palomar,et al.  Gradient of mutual information in linear vector Gaussian channels , 2005, ISIT.

[49]  Georgios B. Giannakis,et al.  Wireless multicarrier communications , 2000, IEEE Signal Process. Mag..

[50]  B. Sundar Rajan,et al.  Secrecy Capacity of the Gaussian Wire-Tap Channel with Finite Complex Constellation Input , 2010, ArXiv.

[51]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[52]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .