Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming
Qiang Li,Wing-Kin Ma +1 more
Reads0
Chats0
TLDR
This paper considers the scenario of an intended multi-input single-output channel overheard by multiple multi-antenna eavesdroppers, and addresses the transmit covariance optimization for secrecy-rate maximization (SRM) of that scenario.Abstract:
In recent years there has been growing interest in study of multi-antenna transmit designs for providing secure communication over the physical layer. This paper considers the scenario of an intended multi-input single-output channel overheard by multiple multi-antenna eavesdroppers. Specifically, we address the transmit covariance optimization for secrecy-rate maximization (SRM) of that scenario. The challenge of this problem is that it is a nonconvex optimization problem. This paper shows that the SRM problem can actually be solved in a convex and tractable fashion, by recasting the SRM problem as a semidefinite program (SDP). The SRM problem we solve is under the premise of perfect channel state information (CSI). This paper also deals with the imperfect CSI case. We consider a worst-case robust SRM formulation under spherical CSI uncertainties, and we develop an optimal solution to it, again via SDP. Moreover, our analysis reveals that transmit beamforming is generally the optimal transmit strategy for SRM of the considered scenario, for both the perfect and imperfect CSI cases. Simulation results are provided to illustrate the secrecy-rate performance gains of the proposed SDP solutions compared to some suboptimal transmit designs.read more
Citations
More filters
Journal ArticleDOI
Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges
TL;DR: This survey introduces the fundamental theories of PHy-security, covering confidentiality and authentication, and provides an overview on the state-of-the-art works on PHY-security technologies that can provide secure communications in wireless systems, along with the discussions on challenges and their proposed solutions.
Journal ArticleDOI
On Cooperative Relaying Schemes for Wireless Physical Layer Security
TL;DR: A cooperative wireless network in the presence of one or more eavesdroppers, and node cooperation for achieving physical (PHY) layer based security is considered, and an analytical solution is obtained for the DF scheme with a single eavesdropper and the multivariate problem is reduced to a problem of one variable.
Journal ArticleDOI
A Survey on Multiple-Antenna Techniques for Physical Layer Security
TL;DR: A detailed investigation on multiple-antenna techniques for guaranteeing secure communications in point-to-point systems, dual-hop relaying systems, multiuser systems, and heterogeneous networks is provided.
Journal ArticleDOI
Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted Multi-Antenna Communications
TL;DR: In this article, the authors investigate transmission optimization for intelligent reflecting surface (IRS) assisted multi-antenna systems from the physical-layer security perspective, where the design goal is to maximize the system secrecy rate subject to the source transmit power constraint and the unit modulus constraints imposed on phase shifts at the IRS.
Journal ArticleDOI
Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization
Qiang Li,Wing-Kin Ma +1 more
TL;DR: This paper considers joint optimization of the transmit and AN covariances for secrecy rate maximization (SRM), with a design flexibility that the AN can take any spatial pattern, and derives an optimization approach to the SRM problem through both analysis and convex conic optimization machinery.
References
More filters
Posted Content
Secure Communication over Fading Channels
TL;DR: In this paper, the secrecy capacity region of the parallel Gaussian broadcast channel with confidential messages (BCC) with independent sub-channels is investigated, and the optimal source power allocations that achieve the boundary of the secrecy region are derived.
Proceedings ArticleDOI
The secrecy capacity of the MIMO wiretap channel
Frederique Oggier,Babak Hassibi +1 more
TL;DR: This paper compute the perfect secrecy capacity of the multiple antenna MIMO broadcast channel, where the number of antennas is arbitrary for both the transmitter and the two receivers.
Posted Content
The Secrecy Capacity of the MIMO Wiretap Channel
Frederique Oggier,Babak Hassibi +1 more
TL;DR: This paper compute the perfect secrecy capacity of the multiple antenna MIMO broadcast channel, where the number of antennas is arbitrary for both the transmitter and the two receivers.
Journal ArticleDOI
A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel
Tie Liu,Shlomo Shamai +1 more
TL;DR: This paper presents an alternative characterization of the secrecy capacity of the multiple-antenna wiretap channel under a more general matrix constraint on the channel input using a channel-enhancement argument.
Journal ArticleDOI
Programming with linear fractional functionals
TL;DR: In this paper, it was shown that if a finite solution to the problem exists, only one linear programming problem must be solved, and this is because the denominator cannot have two different signs in the feasible region except in ways which are not of practical importance.