Transmitter Beamforming and Artificial Noise with Delayed Feedback: Secrecy Rate and Power Allocation

  • Yang, Yunchuan (Wireless Signal Processing and Network Lab., the Key Laboratory of Universal Wireless Communication, Ministry of Education, Beijing University of Posts and Telecommunications) ;
  • Wang, Wenbo (Wireless Signal Processing and Network Lab., the Key Laboratory of Universal Wireless Communication, Ministry of Education, Beijing University of Posts and Telecommunications) ;
  • Zhao, Hui (Wireless Signal Processing and Network Lab., the Key Laboratory of Universal Wireless Communication, Ministry of Education, Beijing University of Posts and Telecommunications) ;
  • Zhao, Long (Wireless Signal Processing and Network Lab., the Key Laboratory of Universal Wireless Communication, Ministry of Education, Beijing University of Posts and Telecommunications)
  • Received : 2011.12.15
  • Published : 2012.08.31

Abstract

Utilizing artificial noise (AN) is a good means to guarantee security against eavesdropping in a multi-inputmulti-output system, where the AN is designed to lie in the null space of the legitimate receiver's channel direction information (CDI). However, imperfect CDI will lead to noise leakage at the legitimate receiver and cause significant loss in the achievable secrecy rate. In this paper, we consider a delayed feedback system, and investigate the impact of delayed CDI on security by using a transmit beamforming and AN scheme. By exploiting the Gauss-Markov fading spectrum to model the feedback delay, we derive a closed-form expression of the upper bound on the secrecy rate loss, where $N_t$ = 2. For a moderate number of antennas where $N_t$ > 2, two special cases, based on the first-order statistics of the noise leakage and large number theory, are explored to approximate the respective upper bounds. In addition, to maintain a constant signal-to-interferenceplus-noise ratio degradation, we analyze the corresponding delay constraint. Furthermore, based on the obtained closed-form expression of the lower bound on the achievable secrecy rate, we investigate an optimal power allocation strategy between the information signal and the AN. The analytical and numerical results obtained based on first-order statistics can be regarded as a good approximation of the capacity that can be achieved at the legitimate receiver with a certain number of antennas, $N_t$. In addition, for a given delay, we show that optimal power allocation is not sensitive to the number of antennas in a high signal-to-noise ratio regime. The simulation results further indicate that the achievable secrecy rate with optimal power allocation can be improved significantly as compared to that with fixed power allocation. In addition, as the delay increases, the ratio of power allocated to the AN should be decreased to reduce the secrecy rate degradation.

Keywords

References

  1. A. D. Wyner, "The wire-tap channel," Bell Syst. Technical J., vol. 54, pp. 1355-1387, 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  2. I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, 1978. https://doi.org/10.1109/TIT.1978.1055892
  3. F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. IEEE ISIT, July 2008, pp. 524-528.
  4. H. D. Ly, T. Liu, and Y. Liang, "Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages," IEEE Trans. Inf. Theory, vol. 56, no. 11. pp. 5477-5487, Nov. 2010.
  5. E. Ekrem and S. Ulukus, "Secure broadcasting using multiple antennas," J. Commun. Netw., vol. 12, no. 5, pp. 411-432, Oct. 2010.
  6. J. Li and A. Petropulu, "Transmitter optimization for achieving secrecy capacity in Gaussian MIMO wiretap channels," IEEE Trans. Inf. Theory, submitted 2010.
  7. A. Khisti and G. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010.
  8. A. Khisti and G. Wornell, "Secure transmission with multiple antennas II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010
  9. S. A. Fakoorian and A. L. Swindlehurst. (2010). Optimal power allocation for GSVD-based beamforming in the MIMO wiretap channel. [Online]. Available: http://arxiv.org/abs/1006.1890
  10. R. Negi and S. Goel, "Secret communication using artificial noise," in Proc. IEEE VTC, vol. 3, Dallas, Sept. 2005, pp. 1906-1910.
  11. S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, 2008.
  12. X. Zhou and M. R. McKay, "Physical layer security with artificial noise: Secrecy capacity and optimal power allocation," in Proc. IEEE ICSPCS, Omaha, NE, Sept. 2009.
  13. N. R. Zurita, M. Ghogho, and D. Mclernon, "Physical layer security of MIMO frequency selective channels by beamforming and noise generation," in Proc. ESPC, Barcelona, Spain, Aug.-Sept. 2011.
  14. N. Jindal, "MIMO broadcast channels with finite-rate feedback," IEEE Trans. Inf. Theory, vol. 52, no. 11, pp. 5045-5060, 2006.
  15. Y. L. Liang, Y. S. Wang, T. H. Chang, Y. W. Hong, and C. Y. Chi, "On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise," in Proc. IEEE ISIT, Seoul, Korea, June-July 2009, pp. 2351-2355.
  16. S. C. Lin, T. H. Chang, Y.W. Hong, and C. Y. Chi, "On the impact of quantized channel direction feedback in multiple-antenna wiretap channels," in Proc. IEEE ICC, Cape Town, South Africa, May 2010.
  17. S. C. Lin, T. H. Chang, Y. l. Yang, Y. W. Petet Hong, and C. Y. Chi, "On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem," IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 901-915, 2011.
  18. S. Haykin, Adaptive Filter Theory. 4th ed., Prentice Hall: Englewood Cliffs, NJ, 2002.
  19. C. C. Tan and N. C. Beaulieu, "On first-order Markov modeling for the Rayleigh fading channel," IEEE Trans. Commun., vol. 48, no. 12, pp. 2032-2040, Dec. 2000. https://doi.org/10.1109/26.891214
  20. Y. Ma, D. Zhang, A. Leith, and Z. Wang, "Error performance of transmit beamforming with delayed and limited feedback," IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1164-1170, 2009.
  21. K. Huang, B. Mondal, R. W. Heath, and J. G. Andrews, "Effect of feedback delay on multi-antenna limited feedback for temporally correlated channels," in Proc. IEEE GLOBECOM, Dec. 2006.
  22. M. Abramowitz and I. A. Stegun. Handbook of Mathematical Functions with Formulaes, Graphs, and Mathematical Tables. Dover Publications Inc., New York: NY, 1974.
  23. T. R. Ramya and S. Bhashyam, "Eigen-beamforming with delayed feedback and channel prediction," in Proc. IEEE ISIT, June 2009, pp. 403-407.