scispace - formally typeset
Open AccessJournal ArticleDOI

Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming

Qiang Li, +1 more
- 01 Aug 2011 - 
- Vol. 59, Iss: 8, pp 3799-3812
Reads0
Chats0
TLDR
This paper considers the scenario of an intended multi-input single-output channel overheard by multiple multi-antenna eavesdroppers, and addresses the transmit covariance optimization for secrecy-rate maximization (SRM) of that scenario.
Abstract
In recent years there has been growing interest in study of multi-antenna transmit designs for providing secure communication over the physical layer. This paper considers the scenario of an intended multi-input single-output channel overheard by multiple multi-antenna eavesdroppers. Specifically, we address the transmit covariance optimization for secrecy-rate maximization (SRM) of that scenario. The challenge of this problem is that it is a nonconvex optimization problem. This paper shows that the SRM problem can actually be solved in a convex and tractable fashion, by recasting the SRM problem as a semidefinite program (SDP). The SRM problem we solve is under the premise of perfect channel state information (CSI). This paper also deals with the imperfect CSI case. We consider a worst-case robust SRM formulation under spherical CSI uncertainties, and we develop an optimal solution to it, again via SDP. Moreover, our analysis reveals that transmit beamforming is generally the optimal transmit strategy for SRM of the considered scenario, for both the perfect and imperfect CSI cases. Simulation results are provided to illustrate the secrecy-rate performance gains of the proposed SDP solutions compared to some suboptimal transmit designs.

read more

Citations
More filters
Posted Content

Secure Video Streaming in Heterogeneous Small Cell Networks with Untrusted Cache Helpers

TL;DR: Joint caching and scalable video coding of video files are proposed to enable secure cooperative multiple-input multiple-output (MIMO) transmission and exploit the cache memory of all BSs for improving system performance.
Journal ArticleDOI

Evolutionary game-based secrecy rate adaptation in wireless sensor networks

TL;DR: By developing the classical wire-tap channel, an approach to compute the secrecy rate between a sensor node and its responsible cluster head in the clustered WSNs is constructed and it is proved the game is stable; that is, there exist evolutionarily stable strategies that explain which strategies will be selected by a sensor nodes in the end.
Proceedings ArticleDOI

Robust artificial-noise aided transmit design for multi-user MISO systems with integrated services

TL;DR: A general case of imperfect channel state information (CSI) is considered, aiming at a joint and robust design of the input covariances for the multicast message, confidential message and AN, such that the worst-case secrecy rate region is maximized subject to the sum power constraint.
Posted Content

Robust Transmission Design for Intelligent Reflecting Surface Aided Secure Communication Systems with Imperfect Cascaded CSI

TL;DR: This paper develops a suboptimal algorithm based on alternating optimization, the penalty-based and semidefinite relaxation methods and reveals that the proposed scheme significantly reduces the transmit power compared to other benchmark schemes.
Journal ArticleDOI

Game Theory-Based Resource Allocation for Secure WPCN Multiantenna Multicasting Systems

TL;DR: This paper investigates a secure wireless-powered multiantenna multicasting system, where multiple power beacons supply power to a transmitter in order to establish a reliable communication link with multiple legitimate users in the presence of multiple eavesdroppers.
References
More filters
Book

Convex Optimization

TL;DR: In this article, the focus is on recognizing convex optimization problems and then finding the most appropriate technique for solving them, and a comprehensive introduction to the subject is given. But the focus of this book is not on the optimization problem itself, but on the problem of finding the appropriate technique to solve it.
Book

Matrix Analysis

TL;DR: In this article, the authors present results of both classic and recent matrix analyses using canonical forms as a unifying theme, and demonstrate their importance in a variety of applications, such as linear algebra and matrix theory.
Journal ArticleDOI

Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones

TL;DR: This paper describes how to work with SeDuMi, an add-on for MATLAB, which lets you solve optimization problems with linear, quadratic and semidefiniteness constraints by exploiting sparsity.
Journal ArticleDOI

The wire-tap channel

TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Related Papers (5)