Efficient Numerical Methods for Secrecy Capacity of Gaussian MIMO Wiretap Channel

被引:4
作者
Mukherjee, Anshu [1 ]
Ottersten, Bjorn [2 ]
Le Nam Tran [1 ]
机构
[1] Univ Coll Dublin, Sch Elect & Elect Engn, Dublin, Ireland
[2] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust, Luxembourg, Luxembourg
来源
2021 IEEE 93RD VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-SPRING) | 2021年
基金
爱尔兰科学基金会;
关键词
MIMO; secrecy capacity; sum power constraint; convex-concave; closed form solution; SECURE TRANSMISSION;
D O I
10.1109/VTC2021-Spring51267.2021.9448796
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents two different low-complexity methods for obtaining the secrecy capacity of multiple-input multiple-output (MIMO) wiretap channel subject to a sum power constraint (SPC). The challenges in deriving computationally efficient solutions to the secrecy capacity problem are due to the fact that the secrecy rate is a difference of convex functions (DC) of the transmit covariance matrix, for which its convexity is only known for the degraded case. In the first method, we capitalize on the accelerated DC algorithm, which requires solving a sequence of convex subproblems. In particular, we show that each subproblem indeed admits a water-filling solution. In the second method, based on the equivalent convex-concave reformulation of the secrecy capacity problem, we develop a so-called partial best response algorithm (PBRA). Each iteration of the PBRA is also done in closed form. Simulation results are provided to demonstrate the superior performance of the proposed methods.
引用
收藏
页数:5
相关论文
共 17 条
[1]   A Fast Iterative Shrinkage-Thresholding Algorithm for Linear Inverse Problems [J].
Beck, Amir ;
Teboulle, Marc .
SIAM JOURNAL ON IMAGING SCIENCES, 2009, 2 (01) :183-202
[2]   Capacity scaling in MIMO wireless systems under correlated fading [J].
Chuah, CN ;
Tse, DNC ;
Kahn, JM ;
Valenzuela, RA .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2002, 48 (03) :637-650
[3]   Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper [J].
Cumanan, Kanapathippillai ;
Ding, Zhiguo ;
Sharif, Bayan ;
Tian, Gui Yun ;
Leung, Kin K. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (04) :1678-1690
[4]  
Phan DN, 2018, PROCEEDINGS OF THE TWENTY-SEVENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P1369
[5]   Full Rank Solutions for the MIMO Gaussian Wiretap Channel With an Average Power Constraint [J].
Fakoorian, S. Ali A. ;
Swindlehurst, A. Lee .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (10) :2620-2631
[6]   Secure Transmission With Multiple Antennas-Part II: The MIMOME Wiretap Channel [J].
Khisti, Ashish ;
Wornell, Gregory W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (11) :5515-5532
[7]   Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel [J].
Khisti, Ashish ;
Wornell, Gregory W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (07) :3088-3104
[8]  
LEUNGYANCHEONG SK, 1978, IEEE T INFORM THEORY, V24, P451, DOI 10.1109/TIT.1978.1055917
[9]   OPTIMAL INPUT COVARIANCE FOR ACHIEVING SECRECY CAPACITY IN GAUSSIAN MIMO WIRETAP CHANNELS [J].
Li, Jiangyuan ;
Petropulu, Athina .
2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, :3362-3365
[10]   Secret communication via multi-antenna transmission [J].
Li, Zang ;
Trappe, Wade ;
Yates, Roy .
2007 41ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2, 2007, :905-910