scispace - formally typeset
Open AccessJournal ArticleDOI

Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming

Qiang Li, +1 more
- 01 Aug 2011 - 
- Vol. 59, Iss: 8, pp 3799-3812
Reads0
Chats0
TLDR
This paper considers the scenario of an intended multi-input single-output channel overheard by multiple multi-antenna eavesdroppers, and addresses the transmit covariance optimization for secrecy-rate maximization (SRM) of that scenario.
Abstract
In recent years there has been growing interest in study of multi-antenna transmit designs for providing secure communication over the physical layer. This paper considers the scenario of an intended multi-input single-output channel overheard by multiple multi-antenna eavesdroppers. Specifically, we address the transmit covariance optimization for secrecy-rate maximization (SRM) of that scenario. The challenge of this problem is that it is a nonconvex optimization problem. This paper shows that the SRM problem can actually be solved in a convex and tractable fashion, by recasting the SRM problem as a semidefinite program (SDP). The SRM problem we solve is under the premise of perfect channel state information (CSI). This paper also deals with the imperfect CSI case. We consider a worst-case robust SRM formulation under spherical CSI uncertainties, and we develop an optimal solution to it, again via SDP. Moreover, our analysis reveals that transmit beamforming is generally the optimal transmit strategy for SRM of the considered scenario, for both the perfect and imperfect CSI cases. Simulation results are provided to illustrate the secrecy-rate performance gains of the proposed SDP solutions compared to some suboptimal transmit designs.

read more

Citations
More filters
Journal ArticleDOI

Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges

TL;DR: This survey introduces the fundamental theories of PHy-security, covering confidentiality and authentication, and provides an overview on the state-of-the-art works on PHY-security technologies that can provide secure communications in wireless systems, along with the discussions on challenges and their proposed solutions.
Journal ArticleDOI

On Cooperative Relaying Schemes for Wireless Physical Layer Security

TL;DR: A cooperative wireless network in the presence of one or more eavesdroppers, and node cooperation for achieving physical (PHY) layer based security is considered, and an analytical solution is obtained for the DF scheme with a single eavesdropper and the multivariate problem is reduced to a problem of one variable.
Journal ArticleDOI

A Survey on Multiple-Antenna Techniques for Physical Layer Security

TL;DR: A detailed investigation on multiple-antenna techniques for guaranteeing secure communications in point-to-point systems, dual-hop relaying systems, multiuser systems, and heterogeneous networks is provided.
Journal ArticleDOI

Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted Multi-Antenna Communications

TL;DR: In this article, the authors investigate transmission optimization for intelligent reflecting surface (IRS) assisted multi-antenna systems from the physical-layer security perspective, where the design goal is to maximize the system secrecy rate subject to the source transmit power constraint and the unit modulus constraints imposed on phase shifts at the IRS.
Journal ArticleDOI

Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization

TL;DR: This paper considers joint optimization of the transmit and AN covariances for secrecy rate maximization (SRM), with a design flexibility that the AN can take any spatial pattern, and derives an optimization approach to the SRM problem through both analysis and convex conic optimization machinery.
References
More filters
Posted Content

Secure Communication over Fading Channels

TL;DR: In this paper, the secrecy capacity region of the parallel Gaussian broadcast channel with confidential messages (BCC) with independent sub-channels is investigated, and the optimal source power allocations that achieve the boundary of the secrecy region are derived.
Proceedings ArticleDOI

The secrecy capacity of the MIMO wiretap channel

TL;DR: This paper compute the perfect secrecy capacity of the multiple antenna MIMO broadcast channel, where the number of antennas is arbitrary for both the transmitter and the two receivers.
Posted Content

The Secrecy Capacity of the MIMO Wiretap Channel

TL;DR: This paper compute the perfect secrecy capacity of the multiple antenna MIMO broadcast channel, where the number of antennas is arbitrary for both the transmitter and the two receivers.
Journal ArticleDOI

A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel

TL;DR: This paper presents an alternative characterization of the secrecy capacity of the multiple-antenna wiretap channel under a more general matrix constraint on the channel input using a channel-enhancement argument.
Journal ArticleDOI

Programming with linear fractional functionals

TL;DR: In this paper, it was shown that if a finite solution to the problem exists, only one linear programming problem must be solved, and this is because the denominator cannot have two different signs in the feasible region except in ways which are not of practical importance.
Related Papers (5)