Increasing Security Degree of Freedom in Multi-user and Multi-eve Systems
Abstract
Secure communication in the Multi-user and Multi-eavesdropper (MUME) scenario is considered in this paper. It has be shown that secrecy can be improved when the transmitter simultaneously transmits information-bearing signal to the intended receivers and artificial noise to confuse the eavesdroppers. Several processing schemes have been proposed to limit the co-channel interference (CCI). In this paper, we propose the increasing security degree of freedom (ISDF) method, which takes idea from the dirty-paper coding (DPC) and ZF beam-forming. By means of known interference pre-cancelation at the transmitter, we design each precoder according to the previously designed precoding matrices, rather than other users’ channels, which in return provides extra freedom for the design of precoders. Simulations demonstrate that the proposed method achieves the better performance and relatively low complexity.
Index Terms:
MUME-MIMO, Block Diagonalization, ZF beam-forming, ISDF, Secrecy Capacity,I Introduction
The growing interest in security at the physical layer of wireless communications has sparked a resurgence of research in secure communication. In the early works on information theoretic security, Wyner introduces the wiretap channel model, in which the eavesdropper’s channel is defined to be a degraded version of the legitimate receiver’s channel [1]. It is shown that a non-zero secrecy capacity can be obtained only if the eavesdropper’s channel is of lower quality than that of the intended recipient. Csiszár and Körner extend this problem to a general non-degraded channel condition in which a common message is transmitted to the two receivers and the confidential message to only one of them [2]. Another main assumption in the aforementioned works is that the eavesdropper’s channel is known at the transmitter [3, 4], and then the generalized singular value decomposition (GSVD) 111The generalized singular value decomposition (GSVD) of an matrix and a matrix is given by the pair of factorizations and , where , and are orthogonal matrices, is an upper triangular nonsingular matrix, and are nonnegative diagonal matrice satisfying . method can be used to transmit the signal to the null space of the channel from transmitter to eavesdropper. Clearly, these assumptions are usually impractical and unreasonable, particularly for passive eavesdroppers. In this paper, we overcome this problem and propose a scheme without using any CSI of eavesdroppers.
In order to achieve secure communication, even when the receiver’s channel is worse than the eavesdropper’s channel, or the absence of eavesdroppers’ channel state information (CSI), various physical-layer techniques have been proposed. One of the most common techniques is the use of cooperative interference or artificial noise to confuse the eavesdropper. The cooperative interference method can be divided into two categories: (i) the trust-friend model, in which two base stations connected by a high-capacity backbone such as optical fiber, and one base station can continuously transmit an interfering signal to secure the uplink communication for the other base station [5, 6]; (ii) the helper-relay model, where the secrecy level can be increased by having the cooperative interferer [7] or relay [8] to send codewords independent to the source message, which can be canceled at the intended receiver.
Another major techniques for secure communication is the use of multiple antennas. When multiple antennas are equipped at the transmitter, it is possible for the transmitter to simultaneously transmit both the information-bearing signal and artificial noise to achieve secrecy in a fading environment [9]-[11], which may replace the role of the cooperative interference method in [5]-[8]. In the design of secure communication with artificial noise, the transmit power allocation between the information signal and the artificial noise is an important issue, which has not been discussed in [9, 10, 11]. A suboptimal power allocation strategy is considered in [12], which aims to meet an ideal signal-to-interference-and-noise ratio (SINR) at the intended receiver to satisfy a quality of service requirement. The secure communication with artificial noise is also discussed in [11], in which the closed-form expression of achievable rate and the optimal power allocation has been obtained, however only single-receiver and single-antenna at receiver was considered.
Most of the previous papers focus on the single-user systems. However most practical communication systems have more than one user and the eavesdroppers may not appear alone as well, and they may choose to cooperate or not [11]. In addition, each terminal may be equipped with multiple antennas, which is representative, for example, of downlink transmission in LTE systems and wireless local area networks. This is the so called Multi-User and Multi-Eve (MUME) MIMO systems, which have been seldom investigated before. In this paper, we will focus on investigating the MUME systems.
It’s also worth noting that the achievable secrecy rate of MUME systems is different from that of single-user and single-antenna systems studied before, which must make sure that any legitimate user will not be wiretapped by any eavesdropper. The authors in [13] put forward an MUME model in which all other users are viewed as potential eavesdroppers by the targeted user. They also give a definition of the achievable secrecy rate of multiuser wiretap model in terms of secrecy sum rate. The authors in [14] give another definition of achievable secrecy rate in Gaussian MIMO multi-receiver Wiretap channel, which is named secrecy capacity region. Besides, the authors in [15, 16] considers the compound wire-tap channel, which is based on the classical wire-tap channel with channel from the source to the destination and the channel from the source to the wiretapper taking a number of states respectively. It can be viewed as the multicast wire-tap channel with multiple destinations and multiple wire-tappers with the same massage transmitted to different destinations, which is slightly different from the broadcast wire-tap channels in this paper. They also give another significant definition of the achievable secrecy rate in terms of absolute secrecy rate, which idea is to take the security of the poorest-performance receive-wiretap pair into consideration. If the poorest-performance pair can meet the quality of service requirement, then all other pairs can do. Therefore this definition of achievable secrecy rate may be more reasonable and constructive in the practical secure communication systems. The authors in [16, 17] discussed the realization of the achievable secrecy rate of multiple users (multiple eavesdroppers) with artificial noise separately, in which, however, the system model is compound wiretap channel but broadcast MUME wiretap channel [18].
Since the transmitter needs to transmit different message to different receivers in the broadcast MUME wiretap model, there must be considerable co-channel interference (CCI) in the system. In order to limit the CCI from the signals transmitted to other users and mask receivers’ own message signal simultaneously, two practical linear transmission schemes were often used in the early works: (i) the SVD method discussed in [9, 11], which conducts an SVD decomposition on each user’s channel matrix to get a maximum channel gain for their own message but can not suppress the interference from other user’s message; (ii) the ZF beamforming method [19] and its promotion—-the BD method [20, 21], in which all the information is transmitted in the null space of all other receivers’ channels. The SVD method and ZF beamforming method are simple, but of little ideal performance. While the BD method is of somewhat ideal performance but more complicated than the formers.
In view of the drawbacks of the previous schemes, we propose an alternative approach, which takes idea from dirty-paper coding (DPC) [22, 23] and ZF beam-forming [19]. It can directly increase the degree of freedom when designing the transmission precoders, which in return make obvious improvement not only at the achievable secrecy rate, but also at the antenna constraints at transmitter compared with the BD method. What’s more, in our proposed scheme, we choose to map the artificial noise into the null space of co-precoder matrix instead of the null space of legitimate receivers’ channels in the existing schemes, which may offer extra improvement on the secrecy rate in the low SNR region. The performance will be further improved when the water-filling (WF) method is used. Besides, the power allocation between the information signal and the artificial noise are also discussed.
In this paper, and denote the Hermitian transpose and trace of a matrix. denotes expectation, and denotes an identity matrix. denotes mutual information. = max.
II System Model
In this paper, we consider the broadcast MUME wiretap model as shown in Fig. 1, in which there is one transmitter named Alice, legitimate users named Bobs and passive eavesdroppers named Eves. Alice tries to send independent messages to all the legitimate receivers while keeping each of the eavesdropper ignorant of all the messages. All of the terminals are equipped with multiple antennas. antennas are equipped at the -th Bob, antennas at the -th Eve, and antennas at the single Alice. This scenario is representative, for example, of downlink transmission in the LTE systems and wireless local area networks.
Let the transmit signal , where is the information bearing signal vector for user , and is the artificial noise signal vector to interference Eves. Then the received signals at Bobs and Eves are respectively:
flushleft
\onelinecaptionstrue
(1) | ||||
where is the channel matrix between the transmitter and Bob , is the channel matrix between the transmitter and eavesdropper , and are respectively the additive white Gaussian noise vectors observed at the -th Bob and -th Eve, which covariance matrices satisfy , and respectively.
We assume that the channel matrix and are block-fading, whose entries are complex Gaussian variables with zero-mean and unit-variance. We also assume that perfect channel state information (CSI) of the receiver, i.e., the channel matrices , , are available at Alice, e.g., either through reverse channel estimation in time-division-duplex (TDD) or feedback in frequency-division-duplex (FDD). While the channel matrices , , are unavailable at Alice due to the passive nature of eavesdroppers.
Our objective is to transmit different secret message to the corresponding Bobs. We try to reduce the CCI from the others, and make sure that the underlying Eves can not wiretap any communication between Alice and Bobs. In the following, we provide lower and upper bounds on the achievable secrecy rate of the generalized broadcast MUME wire-tap channel.
Let denote the mutual information rate between Alice and Bob , and denote that between Alice and Eve for Bob . Then
(2) | ||||
In the sequel, the achievable secrecy rate of the receive-wiretap pair (for Bob and Eve ) can be denoted by [24]
(3) |
The achievable secrecy rate of MUME wiretap model is usually noted by secrecy sum rate () [13] or secrecy rate region [14]. However, in the practical broadcast MUME wireless communication systems, the massages transmitted vary with different users, we should take each user into consideration, once it is chosen according to some criterion. Therefore we must make sure that any user’s communication can not be wiretapped by any eavesdropper. Hence the secrecy rate of the system is determined neither by the best transmission pair nor the total rate gap between Bobs and Eves, but by the poorest-performance transmission pair in reality. Then we propose an alternative definition of the secrecy rate for MUME wire-tap channel, which is called absolute secrecy rate (). Obviously, the absolute secrecy rate actually is just the lower bound of the achievable secrecy rate, and can be given by
(4) | ||||
where is an input distribution. As for the secrecy sum rate , we have
(5) | ||||
III the Design of Precoders in MUME-MIMO Network Based on ISDF
At Alice, the data for each user is processed before transmission. Then it is launched into the MIMO channel with the random artificial noise. Let be an linear precoder, be a symbol vector for Bob , and be the number of parallel data symbols transmitted simultaneously for Bob [22] satisfying . Let be the artificial noise signal vector, be the transmission preprocessing matrix, and be the symbol vector. They are both used for the artificial noise. Then the transmission signal is
(6) |
The received signal at Bobs and Eves are respectively
(7) | ||||
The emphasis of this paper is to design the precoders for and . In the SVD method all the data is transmitted in their own channel image space, so that each Bob can get the maximum channel gain for the corresponding message. Another one is the block diagonalization (BD) method, in which all the data is transmitted in the null space of all other Bobs, which is the promotion of the ZF beamforming method and can reduce the interference from the other users’ message signal. Here, we propose an alternative approach—-the increasing security degrees of freedom (ISDF) method, which is based on dirty-paper coding (DPC) [22, 23] and ZF beam-forming [19]. In this paper, a single data stream is to be sent to each receiver when , and multiple data streams are sent when . Note that, only a maximum of streams can be transmitted simultaneously for user , else the message will not be decoded. Criterion of judging the design is whether the secrecy rate is sufficiently good under the given power constraints, which will be discussed in detail with the design of precoders in the following part.
In MUME scenarios, several co-channel Bobs with multiple antennas aim to communicate with Alice in the same frequency and time slots. In this case, it is necessary to design transmission scheme that is able to suppress the CCI at Bobs. In multi-user wireless security communications with artificial noise, the precoding matrix is usually designed in the null space of channel matrix . We may called it precoding selection space as well. Obviously, the smaller the rank of matrix is, the larger the dimension of its corresponding precoding selection space will be. In return, the design of the corresponding precoder has more freedom and the secrecy performance will be better. Therefore we define the dimension of the precoding selection space as the security degrees of freedom (SDF).
III-A Design of Precoders for Bobs Based on ISDF
In the existing schemes e.g., the SVD method, ZF beamforming method and BD method, the precoder is designed based on their corresponding user’s own channel matrix or the other users’ channel matrices, which means the SDF will be largely limited by the rank of their corresponding channel matrices and the performance will be inevitably affected. To solve this problem, here we propose a new method, which are designed based on the previously designed precoders instead. Because the new method can directly increase the SDF when designing each precoder, we just name it as the increasing security degree of freedom (ISDF) method. This method is similar to the idea of DPC method [23] in some sense. For example, Alice first picks a precoder for Bob 1 and then chooses a precoder for Bob 2 with full (noncausal) knowledge of the precoder for Bob 1. Therefore, Bob 1 does not see the signal intended for Bob 2 as interference. Similarly, the precoder for Bob 3 is chosen such that Bob 1 and Bob 2 do not see the signals intended for Bob 3 as interference. This process continues for all Bobs. Bob J subsequently sees the signals intended for all other users as interference, Bob 2 sees the signals intended for Bob 1 as interference, etc.
Suppose that the Bobs has been sorted as Bob 1, Bob 2, , Bob according to some criterion, which will be discussed in the simulation section. We first design for Bob 1 without loss of generality.
(8) |
where Eq. means that is composed by the eigenvectors corresponding to the largest eigenvalues of , .
Then the following precoders are designed to satisfy an basic condition that each of them must be located in the null space of all previously designed precoders.
(9) |
where denotes the null space (the kernel) of some matrix, and represents the intersection of subspaces. Here, we define the co-designed-precoders matrix for the Bob as
(10) |
From Eq. , we know that the design of each precoder should satisfy .
Let be the dimension of . Then the precoder can be composed by
(11) |
where is used to suppress the interference, which is an matrix. is an matrix used for streams selection, which can make better use of the space resource and therefore improve the capacity.
Note that the precoding matrix should be a nonzero matrix, otherwise, no signal is transmitted. To guarantee the existence of a nonzero precoding matrix, a sufficient condition is that the number of the transmit antennas is larger than the previous users’ total data streams, i.e.,
(12) |
Under this sufficient condition, let be an orthnormal basis of the subspace . Then the kernel space is spanned by the generator . Then Eq. can be rewritten as
(13) |
where the generator matrix can be computed through singular value decomposition (SVD) [25] as
(14) |
where is a diagonal matrix whose diagonal entries are in descending order. Then we can get , which is an matrix.
As for whose role is to linearly combine the orthnomral basis to compose a precoder with columns, it therefore can make better use of the space resource. The design of can be achieved by applying SVD to the equivalent channel matrix ,
(15) |
where is a diagonal matrix whose diagonal entries are in descending order. Then we get , which is an matrix. Then Eq. can be rewritten as:
(16) |
The dimension of is . If , there is a single data stream sent to Bob , and contains the singular vector corresponding to the largest singular value, i.e., the data stream is transmitted through the equivalent channel with the largest singular value. So does for . If , the data streams will be transmitted through all the sub-channels with non-zero singular value. In order to simplify the analysis, we assume that the power are uniformly allocated for the message of user . The secrecy rate can be further increased if Water-Filling (WF) method is used, which will be discussed in section IV.
Obviously, we can get the SDF for each method as following:
(17) | ||||
Since the dimension of is usually greater than that of , and the intersection operation in ISDF scheme takes less terms than that of BD and ZF schems, we have the SDF of the ISDF scheme is usually greater than those of the BD and ZF-beamforming schemes. But the SDF of the ISDF scheme may not be greater than that of the SVD scheme. Since the SVD method can not well cancel the CCI, the secrecy performance of ISDF scheme outperforms that of the SVD scheme, which will be verified by the simulation results.
III-B Precoder Design for Eves Based on ISDF
Since the CSI of all receivers (except for the eavesdroppers) is available at the transmitter, in order to guarantee that it does not impact the desired receivers, the artificial noise is often mapped into the subspace orthogonal to the effective downlink co-channel matrix [11][17], where
(18) |
Then we can get the precoder , i.e., the kernel of . Note that the precoding matrix should also be a nonzero matrix. To guarantee the existence of a nonzero power of artificial noise, a sufficient condition is that the number of the transmit antennas is larger than the rank of matrix . Because the practical channel matrix is usually assumed to be full-rank, must satisfies , which is a very tight constraint.
However, we actually don’t have to make W orthogonal to each user’s channel matrix . We can achieve the goal by transmitting the artificial noise into the null space of all users’ precoder matrices instead. Define the effective co-precoder matrix as
(19) |
To transmit the artificial noise more effectively, it may be mapped into the subspace orthogonal to the effective co-precoder matrix . Then we can get , i.e., lies in the null space of . Because inequality is always valid, the rank of is usually smaller than that of . Therefore, we have more freedom to transmit the artificial noise, and the constraint on can therefore be relaxed as .
To distinguish the two schemes of transmitting artificial noise, we category them as the ISDF1 scheme and the ISDF2 scheme. If the noise is mapped into the subspace orthogonal to the effective downlink co-channel matrix , it is called ISDF1; if If the noise is mapped into the subspace orthogonal to the effective co-precoder matrix , it is called ISDF2. In the simulation section, we will compare the two schemes.
III-C The analysis of complexity
In this section, we will make a discussion on the computational complexity of the proposed approach versus the other threes methods. As introduced in section II, The SVD method and ZF beamforming method are simple, but of little ideal performance. The BD method get somewhat better performance on secrecy rate, but its computational complexity becomes higher compared with the former.
Then, the emphasis is the comparison of complexity between the proposed ISDF method and the BD method. Essentially, the main difference between the ISDF and BD method lies on solving the precoding selection matrix (PSM). In the ISDF method, the PSM is obtained by implementing an SVD decomposition on the previously designed precoders , which is a matrix. The complexity of this SVD decomposition is . While the PSM in the BD method is obtained by an SVD decomposition on all others’ channel matrixes , where , which is a matrix. And the complexity of this SVD decomposition is , which is higher than the former. Since both of the two methods have precoders to design, there are PSMs need to be solven accordingly. Therefore, the complexity of the ISDF method is , on the other hand, that of the BD method is . Obviously, the complexity of the our proposed approach is lower.
IV The secrecy rate of MUME-MIMO system
In this section, we will analyze the secrecy rate of ISDF1 and ISDF2. Suppose that the variance of the transmit symbol vector is , and the complex Gaussian random elements of are i.i.d whose variance is . It is assumed that Alice has a total amount of transmit power budget . Due to the normalization of the noise variance at Bob, we can also refer to as the transmission SNR. One important parameter should be designed is the power ratio, denoted by , allocated for the user ’s information transmission. We define the power ratio for transmitting artificial noise as (). Let
(20) |
Then we have
(21) |
and
(22) |
in which, we have used the following facts
(23) | ||||
In order to analyze the secrecy rate concisely, Eq. can be rewritten as:
(24) | ||||
where we have defined
(25) | |||
(26) |
for .
The secrecy rate is the maximum transmission rate at which the intended receiver can decode the data with arbitrarily small error, which is bounded by the difference in the capacity between Alice and Bob and that between Alice and Eve [2]. In the following part, the secrecy rate will be given in terms of secrecy sum rate [13] and absolute secrecy rate, where the secrecy sum rate is noted by and the absolute secrecy rate is noted by .
IV-A The secrecy rate of ISDF1
As in [11], we can normalize the distance of each Bob to make the variance of the elements of equal to unity without loss of generality, and the noise vector is of unit variance. Since the artificial noise is transmitted in the null space of all legitimate users’ matrixes, it will be nulled in any user’s received signal. Then the capacity between Alice and Bob is
(27) | ||||
where we used the fact .
Next, we study the capacity between Alice and the multiple colluding or non-concluding Eves. When multiple Eves are allocated at different places, the noise at each Eve may be different. In addition, the receiver noise levels at Eves may not be known by Alice or Bobs. To guarantee secure communication, it is therefore reasonable to consider the worst-case scenario where the noises at Eves are arbitrarily small. Note that this approach has been also taken in [9] and [11]. In this case, the noiseless eavesdropper assumption gives an upper bound on the rate between Alice’s message for the user and the eavesdropper as
(28) | ||||
After deriving the expressions of and , the ergodic secrecy rate can now be obtained as .
IV-A1 Secrecy Sum-Rate
As proposed in [13], the secrecy rate for Bob is
Then the secrecy sum rate is
(29) | ||||
IV-A2 Absolute secrecy rate
As we have discussed, for the broadcast MUME-MIMO wiretap system, the absolute secrecy capacity is the lower bound of the ergodic secrecy rate, which is given by
(30) | ||||
IV-B The secrecy rate of ISDF2
In the ISDF2 method, the rate between Alice and Bob is
(31) | ||||
Similar to Eq. , the rate between Alice’s message for the user and the eavesdropper can be rewritten as:
(32) | ||||
IV-B1 Secrecy Sum-Rate
Accordingly, the secrecy sum-rate is
(33) | ||||
IV-B2 Absolute secrecy rate
we can also get the lower bound of ergodic secrecy rate for ISDF2 method,
(34) | ||||
IV-C The secrecy rate of ISDF1 with Water Filling method
This section focuses on improving the secrecy rate with water-filling method based on ISDF1 method introduced in section III. As mentioned in section III-A, when the users have multiple antennas and () data streams are transmitted to user simultaneously, the water-filling method may be employed together with ISDF1 to further improved the performance of achievable secrecy rate. Our goal is to implement single-user water-filling on each legitimate user to maximize their rate under the given power ratio constraint.
The single-user optimization problem has a well-known water-filling solution. The water-filling algorithm takes advantage of the problem structure by decomposing the channel into orthogonal modes, which greatly reduces the optimization complexity. Here, without loss of generality, we just take user for example with the constraint of the given total power (). As derived in Eq. , the signal received at user can be written as:
(35) |
where is the interference towards user from the message signal transmitted to other users. We first implement an Whiting processing on the interference vector in Eq. , before conducting the water-filling algorithm. Let , which unitary decomposition is . The we can whiten by
(36) |
Then the corresponding mutual information rate is
(37) |
Suppose that is the rate from the -th subcarrier to Bob , and the corresponding effective sub-channel after whitening and orthgononalizing. Since only streams are transmitted to user , the optimal problem on the dynamic power allocation aiming to maximize the rate between transmitter and user can be expressed as following:
(38) | ||||
where denotes the power allocated for the -th subcarrier of user . Based on Eq. , we use the classical Lagrange algorithm to construct an Lagrange function,
(39) |
Let
and . Then we can obtain
Then solving the optimal problem depends on the computation of and . The paper [26] put forward a fast iterative algorithm, which give the preliminary value of and its update method. That is
(40) | |||
(41) |
In this paper, we will employ this fast iterative algorithm to perform simulations.
V Simulation Results
In this section, we will carry out some simulations to show the achievable secrecy rate. In all simulations, the entries of all channel matrices are assumed to be independent, zero-mean Gaussian random variables with unit variance. All results are based on an average of independent trials. The background noise power is the same for all Bobs with a variance . To guarantee the secure communication, it is therefore reasonable to consider the worst case scenario, where the noises variance at Eves are arbitrarily small (approaching zero). The desired rate for Bobs and Eves will be measured by the ergodic capacity rather than the outage capacity.
V-A Secrecy Rate and Power Efficiency
Fig. 2, Fig. 3 and Fig. 4, are corresponding to the cases , which exhibits the comparison of secrecy rate and information power ratio for information signal among the methods. Fig. 2 and Fig. 3 demonstrate that that the ISDF1 method offers the best performance compared with the other methods, in term of secrecy sum rate and absolute secrecy rate respectively. From Fig. 2 and Fig. 3, we can see that ISDF2 performs best in the low SNR region but performs worse in the high SNR region. This is because that at the high SNR region, the artificial noise is not well canceled at receive terminal by using the null space of the co-precoder matrix to design W. Since ISF1 uses the nulll space of the co-channel matrix to desing W, which can well cancel the artificial noise. From Fig. 4, we can see that both ISDF1 and ISDF2 methods have less power efficiency (information power over total power) than the ZF Beamforming method. While in secure communications, the secrecy rate is the major concern. Therefore the ISDF scheme provides a good candidate for secure communications.
flushleft
\onelinecaptionstrue
flushleft
\onelinecaptionstrue
flushleft
\onelinecaptionstrue
flushleft
\onelinecaptionstrue
flushleft
\onelinecaptionstrue
flushleft
\onelinecaptionstrue
flushleft
\onelinecaptionstrue
V-B Secrecy Rate and Power Efficiency for Eves’ Colluding and Non-Colluding
Fig. 5 and Fig. 6 show the absolute secrecy rate and information power ratio of ISDF1 for the Eves’ colluding and non-colluding scenarios. If the Eves choose to wiretap the message jointly, we may think they are colluding, else non-colluding. As shown in Fig. 5, it will be more difficult to achieve secure communication if the Eves choose to cooperate, which is as we expected. We are interesting in whether we need to allocate more power to transmit information signal or artificial noise when the Eves choose to cooperate. Fig. 6 shows that more power needs to be allocated to artificial noise if Eves choose to cooperate. So does the case with more Eves. These demonstrate that when power has been optimized already and the eavesdroppers’ condition is getting better, the power allocating towards artificial noise can make more contribution for the secrecy rate than allocating towards users’ information signal.
V-C Power Ratio for different Ordering and Power Allocation
As mentioned in section III-A, since the ordering of the users will affect the performance, we wish to study how the power is allocated between the information signal and the artificial noise for giving different user priority of precoding. Fig. 7 illustrates that the the system performs better in term of absolute secrecy capacity when we give the user with least antennas or largest noise variance the priority of precoding. This is because that the absolute secrecy capacity is mainly determined by the poorest-performance receive-wiretap pair to a large extent. In order to get a large secrecy rate, we should make the secrecy rate for each user equivalently. Therefor should give the weaker user (less antennas or larger noise) more SDF by rendering them the priority of precoding. Fig. 8 shows that the secrecy capacity can be further increased as introduced in IV-C, if the water-filling (WF) algorithm is used.
VI Conclusions
This paper proposes the precoding strategy based on the ISDF method for providing secure communication at the physical layer in broadcast MUME-MIMO wiretap channels combined with artificial noise. We derive both the secrecy sum rate and absolute secrecy rate for the proposed ISDF1 and ISDF2 method. Simulations show that the ISDF2 perform best in low SNR region and ISDF1 outperforms other four methods in high SNR region in terms of achievable secrecy rate. Furthermore, we find that more power should be allocated to artificial noise instead of information signal when the eavesdroppers’ condition is better than the intended users, and we should first precode the user with bad condition (least antennas or largest noise variance).
References
- [1] A. Wyner, ”The wire-tap channel,” Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
- [2] I. Csiszár and J. Körner, ”Broadcast channels with confidential messages,” IEEE Trans. Information Theory, vol. 24, no. 3, pp. 339-348, May 1978.
- [3] J. Huang, A. L. Swindlehurst, ”Cooperative Jamming for Secure Communications in MIMO Relay Networks” IEEE Trans. on Signal Processing, No. 59, no. 10, pp. 2011 4871-4884, 2011.
- [4] S. A. Fakoorian, A. L. Swindlehurst, ”Optimal Power Allocation for GSVD-Based Beamforming in the MIMO Wiretap Channel,” IEEE International Symposium on Information Theory (ISIT), Cambridge, MA, August 2012, pp. 2321-2325.
- [5] M. L. Jorgensen, B. R. Yanakiev, F. E. Kirkelund, P. Popovski, H. Yomo, and T. Larsen, ”Shout to secure: Physical-layer wireless security with known interference,” in Proc. IEEE GLOBECOM, Washington, DC, Nov. 2007, pp. 33-38.
- [6] O. Simeone and P. Popovski, ”Secure communications via cooperating base stations,” IEEE Communications Letters, vol. 12, no. 3, pp. 188-190, Mar. 2008.
- [7] X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, ”Interference-assisted secret communication,” in Proc. IEEE ITW, Porto, Portugal, May 2008, pp. 164-168.
- [8] L. Lai and H. E. Gamal, ”The relay-eavesdropper channel: Cooperation for secrecy,” IEEE Trans. Information Theory, vol. 54, no. 9, pp. 4005-4019, 2008.
- [9] R. Negi and S. Goel, ”Secret communications using artificial noise,” in Proc. IEEE VTC, Dallas, TX, Sep. 2005, pp. 1906-1910.
- [10] S. Goel and R. Negi, ”Guaranteeing secrecy using artificial noise,” IEEE Trans. Wireless Communications, vol. 7, no. 6, pp. 2180-2189, 2008.
- [11] X. Zhou, M. McKay ”Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation,” IEEE Trans. on Vehicular Technology, vol. 59, no. 8, pp. 3831-3842, 2010.
- [12] A. L. Swindlehurst, ”Fixed SINR solutions for the MIMO wiretap channel,” in Proc. IEEE ICASSP, Taipei, Taiwan, Apr. 2009, pp. 2437-2440.
- [13] G. Geraci, J. Yuan, A. Razi and I. B. Collings, ”Secrecy Sum-Rates for Multi-User MIMO Linear Precoding,” 8th International Symposium on Wireless Communication Systems (ISWCS), 2011
- [14] E. Ekrem, and S. Ulukus ”The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel,” IEEE Trans. on Information Theory, vol. 57, no. 4, pp. 2083-2114, April 2011.
- [15] Y. Liang, H. V. Poor, and S. Shamai, ”Secure communication over fading channels,” IEEE Trans. on Information Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
- [16] Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), ”Compound wire-tap channels,” in Proc. 45th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, USA, 2007.
- [17] A. Mukherjee, S. A. A. Fakoorian, J. Huang, A. L. Swindlehurst, ”Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey”, available online: http://arxiv.org/abs/1011.3754
- [18] K. Xie, and W. Chen, ”Precoding Strategy Based on SLR for Secure Communication in MUME Wiretap Systems,” IEEE Global communications (GC), 2012.
- [19] A. Mukherjee and A. L. Swindlehurst, ”Utility of Beamforming Strategies for Secrecy in Multiuser MIMO Wiretap Channels,” In Proc. 47th Allerton Conf. on Communication, Control and Computing, October, 2009.
- [20] Q. H. Spencer, A. L. Swindlehurst, and M. Haardt, ”Zero-forcing methods for downlink spatial multiplexing in multiuser MIMO channels,” IEEE Trans. on Signal Processing, vol. 52, no. 2, pp. 461471, 2004.
- [21] Q. Spencer and A. Swindlehurst, ”A hybrid approach to spatial multiplexing in multi-user MIMO downlinks,” EURASIP Journal on Wireless Communications and Networking, pp. 236-247, Dec. 2004.
- [22] D. Gesbert, M. Kountouris, R. W. Heath Jr, C.-B. Chae, and T. Salzer, ”Shifting the MIMO paradigm: From single user to multiuser communications,” IEEE Signal Processing Magazine, vol. 24, no. 10, pp. 36 C46, 2007.
- [23] M. H. M. Costa, Writing on dirty paper, IEEE Trans. Information Theory, vol. IT-29, no. 5, pp. 439 C411, 1983.
- [24] F. Oggier and B. Hassibi, ”The secrecy capacity of the MIMO wiretap channel,” in Proc. IEEE ISIT, Toronto, ON, Canada, Jul. 2008, pp. 524-528.
- [25] L. Choi and R.D. Murch, ”A transmit preprocessing technique for multiuser MIMO systems using a decomposition approach,” IEEE Trans. on Wireless Communications, vol. 2, no. 4, pp. 773 C786, 2003.
- [26] Jang J, Lee K B, and Lee Y H. Transmit power and bit allocations for OFDM systems in a fading channel. in Proc. IEEE Global Communications Conference, San Francisco, CA, Dec. 2003: 283 C288.