4.7 Article

The Secrecy Capacity of Gaussian MIMO Wiretap Channels Under Interference Constraints

Journal

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
Volume 36, Issue 4, Pages 704-722

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSAC.2018.2824758

Keywords

MIMO; wiretap channel; secrecy capacity; interference; cognitive radio

Funding

  1. Innovation Foundation for Doctoral Dissertation of Northwestern Polytechnical University [CX201812]

Ask authors/readers for more resources

Secure signaling over multiple-input multipleoutput (MIMO) wiretap channel (WTC) is studied under interference and transmit power constraints. The classical MIMO WTC model is extended to interference-limited scenarios, so that interference to other users does not exceed a given threshold while ensuring simultaneously no information leakage to an eavesdropper. The operational secrecy capacity of the Gaussian MIMO WTC under interference and transmit power constraints is rigorously established in two forms (a non-convex max problem and a convex-concave max-min problem), to which per-antenna power constraints can be added as well. Optimal signaling directions are characterized in the general case, from which (tight) upper bounds to the rank of optimal transmit covariance matrix are derived. A sufficient condition for the optimality of beamforming and a necessary condition for optimal full-rank signaling are given. Closed-form rank-1 and high-rank solutions are obtained in the case of zero interference constraints. Sufficient and necessary conditions for non-zero secrecy capacity are established. The results are extended to multi-user scenarios. A sufficient and necessary condition for the unbounded growth of the secrecy capacity with transmit power is obtained. The interplay between transmit and interference power constraints is studied, and its significant impact on optimal signaling is demonstrated (so that neither constraint can be absorbed into the other one in general, as was sometimes suggested in the literature). Overall, these results provide insights into fundamental information-theoretic limits and optimal signaling strategies for secure communications under interference constraints.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available