On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis
详细信息    查看全文
  • 作者:Maksym A. Girnyk (2)
    Frédéric Gabry (2)
    Mikko Vehkaper? (2)
    Lars K. Rasmussen (2)
    Mikael Skoglund (2)
  • 关键词:MIMO wiretap channel ; Large ; system approximation ; Random matrix theory ; Beamforming.
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2014
  • 出版时间:2014
  • 年:2014
  • 卷:1
  • 期:1
  • 页码:90-102
  • 全文大小:384 KB
  • 参考文献:1. Wyner, A.D.: The wire-tap channel. Bell Syst. Tech. J. 54(8), 1334-387 (1975) CrossRef
    2. Foschini, G., Gans, M.: On limits of wireless communications in a fading environment when using multiple antennas. Wirel. Pers. Commun. 6(3), 311-35 (1998) CrossRef
    3. Telatar, E.: Capacity of multi-antenna gaussian channels. Eur. Trans. Telecommun. 10(6), 585-95 (1999) CrossRef
    4. Oggier, F., Hassibi, B.: The secrecy capacity of the MIMO wiretap channel. IEEE Trans. Inf. Theory 57(8), 4961-972 (2011) CrossRef
    5. Shafiee, S., Liu, N., Ulukus, S.: Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel. IEEE Trans. Inf. Theory 55(9), 4033-039 (2009) CrossRef
    6. Liu, T., Shamai, S.: A note on the secrecy capacity of the multiple-antenna wiretap channel. IEEE Trans. Inf. Theory 55(6), 2547-553 (2009) CrossRef
    7. Khisti, A., Wornell, G.: Secure transmission with multiple antennas II: the MIMOME wiretap channel. IEEE Trans. Inf. Theory 56(11), 5515-532 (2011) CrossRef
    8. Bloch, M., Barros, J., Rodrigues, M., McLaughlin, M.: Wireless information-theoretic security. IEEE Trans. Inf. Theory 54(6), 2515-534 (2008) CrossRef
    9. Wong, T., Bloch, M., Shea, J.M.: Secret sharing over fast-fading MIMO wiretap channels. EURASIP J. Wirel. Commun. Network. 2009, 506 973/1-06 973/17 (2009)
    10. Gursoy, M.: Secure communication in the low-SNR regime: a characterization of the energy-secrecy tradeoff. In: Proceedings of IEEE International Symposium on Information Theory (ISIT) (2009)
    11. Li, J. Petropulu, A.: Optimal input covariance for achieving secrecy? capacity in gaussian mimo wiretap channels. In: IEEE International Conference Acoustical Speech Signal Processing (ICASSP), pp. 3362-365 (2010)
    12. Fakoorian, S.A., Swindlehurst, A.L.: Optimal power allocation for GSVD-based beamforming in the MIMO Gaussian wiretap channel. In: Proceedings of IEEE International Symposium on Information Theory (ISIT), pp. 2321-325 (2012)
    13. Loyka, S., Charalambous, C.D.: Further results on optimal signaling over secure MIMO channels. In: Proceedings of International Symposium on Inforamtion Theory (ISIT) (2013)
    14. Liang, Y., Poor, H.V., Shamai, S.: Secure communication over fading channels. IEEE Trans. Inf. Theory 54(6), 2470-492 (2008) CrossRef
    15. Gopala, P., Lai, L., El Gamal, H.: On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory 54, 4687-698 (2008) CrossRef
    16. Khisti, A., Wornell, G.: Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans. Inf. Theory 56(7), 3088-104 (2010) CrossRef
    17. Li, J., Petropulu, A.P.: On ergodic secrecy rate for Gaussian MISO wiretap channels. IEEE Trans. Wirel. Commun. 10(4), 1176-187 (2011) CrossRef
    18. Van Nguyen, T., Shin, H.: Power allocation and achievable secrecy rates in MISOME wiretap channels. IEEE Commun. Lett. 15(11), 1196-198 (2011) CrossRef
    19. Lin, S.-C. Lin, P.-H.: On secrecy capacity of fast fading MIMOME wiretap channels with statistical CSIT. arXiv:1309.1516 (2013)
    20. Lin, S.-C., Lin, P.-H.: On secrecy capacity of fast fading multiple-input wiretap channels with statistical CSIT. IEEE Trans. Inf. Forensics Secur. 8(2), 414-19 (2013) CrossRef
    21. Couillet, R., Debbah, M.: Random Matrix Methods for Wireless Communications. Cambridge University Press, New York (2011) CrossRef
    22. Chizhik, D., Rashid-Farrokhi, F., Ling, J., Lozano, A.: Effect of antenna separation on the capacity of BLAST in correlated channels. IEEE Commun. Lett. 4(11), 337-39 (2000) CrossRef
    23. Hachem, W., Loubaton, P., Najim, J.: Deterministic equivalents for certain functionals of large random matrices. Ann. Appl. Probab. 17(3), 875-30 (2007) CrossRef
    24. Couillet, R., Debbah, M., Silverstein, J.W.: A deterministic equivalent for the analysis of correlated MIMO multiple access channels. IEEE Trans. Inf. Theory 57(6), 3493-514 (2011) CrossRef
    25. Billingsley, P.: Probability and Measure. Wiley, New York (2008)
    26. Tulino, A.M., Verdú, S.: Random Matrix Theory and Wireless Communications. Now Publishers Inc., vol. 1: 1-2 (2004)
    27. Wen, C.-K., Wong, K.-K.: Asymptotic analysis of spatially correlated MIMO multiple-access channels with arbitrary signaling inputs for joint and separate decoding. IEEE Trans. Inf. Theory 53(1), 252-68 (2007) CrossRef
    28. Moustakas, A.L., Simon, S.H., Sengupta, A.M.: Statistical mechanics of multi-antenna communications: replicas and correlations. Acta Phys. Pol. 36(9), 2719-732 (2005)
  • 作者单位:Maksym A. Girnyk (2)
    Frédéric Gabry (2)
    Mikko Vehkaper? (2)
    Lars K. Rasmussen (2)
    Mikael Skoglund (2)

    2. Communication Theory Laboratory, KTH Royal Institute of Technology, Osquldas v?g 10, 10044, Stockholm, Sweden
  • ISSN:1611-3349
文摘
With the growth of wireless networks, security has become a fundamental issue in wireless communications due to the broadcast nature of these networks. In this work, we consider MIMO wiretap channels in a fast fading environment, for which the overall performance is characterized by the ergodic MIMO secrecy rate. Unfortunately, the direct solution to finding ergodic secrecy rates is prohibitive due to the expectations in the rates expressions in this setting. To overcome this difficulty, we invoke the large-system assumption, which allows a deterministic approximation to the ergodic mutual information. Leveraging results from random matrix theory, we are able to characterize the achievable ergodic secrecy rates. Based on this characterization, we address the problem of covariance optimization at the transmitter. Our numerical results demonstrate a good match between the large-system approximation and the actual simulated secrecy rates, as well as some interesting features of the precoder optimization.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700