On the Secrecy Capacity of MIMO Wiretap Channels: Convex Reformulation and Efficient Numerical Methods

This paper presents novel numerical approaches to finding the secrecy capacity of the multiple-input multiple-output (MIMO) wiretap channel subject to multiple linear transmit covariance constraints, including sum power constraint, per antenna power constraints and interference power constraint. An...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on communications Vol. 69; no. 10; pp. 6865 - 6878
Main Authors Mukherjee, Anshu, Ottersten, Bjorn, Tran, Le-Nam
Format Journal Article
LanguageEnglish
Published New York IEEE 01.10.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This paper presents novel numerical approaches to finding the secrecy capacity of the multiple-input multiple-output (MIMO) wiretap channel subject to multiple linear transmit covariance constraints, including sum power constraint, per antenna power constraints and interference power constraint. An analytical solution to this problem is not known and existing numerical solutions suffer from slow convergence rate and/or high per-iteration complexity. Deriving computationally efficient solutions to the secrecy capacity problem is challenging since the secrecy rate is expressed as a difference of convex functions (DC) of the transmit covariance matrix, for which its convexity is only known for some special cases. In this paper we propose two low-complexity methods to compute the secrecy capacity along with a convex reformulation for degraded channels. In the first method we capitalize on the accelerated DC algorithm which requires solving a sequence of convex subproblems, for which we propose an efficient iterative algorithm where each iteration admits a closed-form solution. In the second method, we rely on the concave-convex equivalent reformulation of the secrecy capacity problem which allows us to derive the so-called partial best response algorithm to obtain an optimal solution. Notably, each iteration of the second method can also be done in closed form. The simulation results demonstrate a faster convergence rate of our methods compared to other known solutions. We carry out extensive numerical experiments to evaluate the impact of various parameters on the achieved secrecy capacity.
AbstractList This paper presents novel numerical approaches to finding the secrecy capacity of the multiple-input multiple-output (MIMO) wiretap channel subject to multiple linear transmit covariance constraints, including sum power constraint, per antenna power constraints and interference power constraint. An analytical solution to this problem is not known and existing numerical solutions suffer from slow convergence rate and/or high per-iteration complexity. Deriving computationally efficient solutions to the secrecy capacity problem is challenging since the secrecy rate is expressed as a difference of convex functions (DC) of the transmit covariance matrix, for which its convexity is only known for some special cases. In this paper we propose two low-complexity methods to compute the secrecy capacity along with a convex reformulation for degraded channels. In the first method we capitalize on the accelerated DC algorithm which requires solving a sequence of convex subproblems, for which we propose an efficient iterative algorithm where each iteration admits a closed-form solution. In the second method, we rely on the concave-convex equivalent reformulation of the secrecy capacity problem which allows us to derive the so-called partial best response algorithm to obtain an optimal solution. Notably, each iteration of the second method can also be done in closed form. The simulation results demonstrate a faster convergence rate of our methods compared to other known solutions. We carry out extensive numerical experiments to evaluate the impact of various parameters on the achieved secrecy capacity.
Author Mukherjee, Anshu
Tran, Le-Nam
Ottersten, Bjorn
Author_xml – sequence: 1
  givenname: Anshu
  orcidid: 0000-0002-5093-3840
  surname: Mukherjee
  fullname: Mukherjee, Anshu
  email: anshu.mukherjee@ucdconnect.ie
  organization: School of Electrical and Electronic Engineering, University College Dublin, Dublin 4, Ireland
– sequence: 2
  givenname: Bjorn
  orcidid: 0000-0003-2298-6774
  surname: Ottersten
  fullname: Ottersten, Bjorn
  email: bjorn.ottersten@uni.lu
  organization: Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Esch-sur-Alzette, Luxembourg
– sequence: 3
  givenname: Le-Nam
  orcidid: 0000-0002-9317-9980
  surname: Tran
  fullname: Tran, Le-Nam
  email: nam.tran@ucd.ie
  organization: School of Electrical and Electronic Engineering, University College Dublin, Dublin 4, Ireland
BackLink https://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-312621$$DView record from Swedish Publication Index
BookMark eNp9kU1v1DAQhi1UJLaFPwAXS5yz-DOxuVWhQKWGlaDA0fI6Y9Yla6eOA-y_J-0WDhw4zeV5Ru_Me4pOYoqA0HNK1pQS_eq63XTdmhFG15xo1RDyCK2olKoiSjYnaEWIJlXdNOoJOp2mG0KIIJyvkN9EXHaAP4HL4A64taN1oRxw8ri77Db4a8hQ7IjbnY0Rhuk1blP8Ab_wR_Ap7-fBlpAitrHHF94HFyAW_GHeQw7ODriDskv99BQ99naY4NnDPEOf315ct--rq827y_b8qnK8aUplpeqBeiF1b2ltFXAKilLBBMitVcL5xtd2K4X0DdMUqOVCk5oDhd457vkZqo57p58wzlsz5rC3-WCSDeZN-HJuUv5mvped4ZTVjC78yyM_5nQ7w1TMTZpzXCIaJhVjopZaLJQ6Ui6nacrgzfKi-7tLtmEwlJi7Fsx9C-auBfPQwqKyf9Q_kf4rvThKAQD-ClpoRoXgvwGqzJVn
CODEN IECMBT
CitedBy_id crossref_primary_10_1109_TWC_2024_3403995
crossref_primary_10_3390_e25101397
crossref_primary_10_1109_ACCESS_2023_3344654
crossref_primary_10_1109_LWC_2024_3457158
crossref_primary_10_1109_LWC_2021_3128331
crossref_primary_10_1109_TIT_2023_3336648
crossref_primary_10_1109_TWC_2022_3229077
crossref_primary_10_1109_LCOMM_2023_3299288
crossref_primary_10_1109_TIFS_2023_3337719
crossref_primary_10_1109_TVT_2024_3450528
Cites_doi 10.1017/CBO9780511804441
10.1109/ICASSP.2013.6638483
10.1109/TVT.2013.2285244
10.1109/TIT.1978.1055917
10.1109/TIFS.2019.2929474
10.1016/j.orl.2010.08.005
10.1109/ICC40277.2020.9149178
10.1109/JSAC.2002.801223
10.1109/TSP.2003.821107
10.1109/CISS.2007.4298439
10.1109/JSAC.2013.130906
10.1515/9781400833344
10.1002/j.1538-7305.1949.tb00928.x
10.1109/TSP.2007.893762
10.1002/j.1538-7305.1975.tb02040.x
10.1109/TIT.2011.2158487
10.1109/4234.951380
10.1109/TIT.2010.2048445
10.1109/TWC.2018.2880436
10.1109/TWC.2015.2395414
10.1109/TIT.2010.2068852
10.1109/ICASSP.2014.6854692
10.1109/CACSD.2004.1393890
10.1109/ICASSP.2010.5495998
10.24963/ijcai.2018/190
10.1109/VTCSpring.2018.8417596
10.1109/LWC.2018.2793264
10.1109/JSAC.2018.2824758
10.1109/TIT.2017.2710058
10.1137/1.9780898718829
10.1109/18.985982
10.1109/TSP.2020.3010451
10.1007/s10107-015-0946-6
10.1109/TIT.2016.2618857
10.1109/TCOMM.2015.2424235
10.1109/TCOMM.2012.091212.110199
10.1155/2009/370970
10.1109/TSP.2013.2253774
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SP
8FD
L7M
ADTPV
AFDQA
AOWAS
D8T
D8V
ZZAVC
DOI 10.1109/TCOMM.2021.3098700
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Electronics & Communications Abstracts
Technology Research Database
Advanced Technologies Database with Aerospace
SwePub
SWEPUB Kungliga Tekniska Högskolan full text
SwePub Articles
SWEPUB Freely available online
SWEPUB Kungliga Tekniska Högskolan
SwePub Articles full text
DatabaseTitle CrossRef
Technology Research Database
Advanced Technologies Database with Aerospace
Electronics & Communications Abstracts
DatabaseTitleList Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-0857
EndPage 6878
ExternalDocumentID oai_DiVA_org_kth_312621
10_1109_TCOMM_2021_3098700
9492144
Genre orig-research
GrantInformation_xml – fundername: Science Foundation Ireland
  grantid: 17/CDA/4786
  funderid: 10.13039/501100001602
– fundername: FNR project CI-PHY
  grantid: 11607830
GroupedDBID -~X
.DC
0R~
29I
3EH
4.4
5GY
5VS
6IK
85S
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABFSI
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
ACKIV
ACNCT
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
E.L
EBS
EJD
ESBDL
HZ~
H~9
IAAWW
IBMZZ
ICLAB
IES
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
RIA
RIE
RNS
TAE
TN5
VH1
ZCA
ZCG
AAYOK
AAYXX
CITATION
RIG
7SP
8FD
L7M
ADTPV
AFDQA
AOWAS
D8T
D8V
ZZAVC
ID FETCH-LOGICAL-c377t-a58de1f459da16a8e31e811424e5ba84cf7f6ab545f7291e1a349063e1edcc3f3
IEDL.DBID RIE
ISSN 0090-6778
IngestDate Thu Aug 21 06:45:38 EDT 2025
Mon Jun 30 10:16:06 EDT 2025
Tue Jul 01 02:51:35 EDT 2025
Thu Apr 24 23:06:33 EDT 2025
Wed Aug 27 02:46:19 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 10
Language English
License https://creativecommons.org/licenses/by/4.0/legalcode
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c377t-a58de1f459da16a8e31e811424e5ba84cf7f6ab545f7291e1a349063e1edcc3f3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-5093-3840
0000-0003-2298-6774
0000-0002-9317-9980
OpenAccessLink https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/9492144
PQID 2582246594
PQPubID 85472
PageCount 14
ParticipantIDs ieee_primary_9492144
swepub_primary_oai_DiVA_org_kth_312621
crossref_primary_10_1109_TCOMM_2021_3098700
proquest_journals_2582246594
crossref_citationtrail_10_1109_TCOMM_2021_3098700
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-10-01
PublicationDateYYYYMMDD 2021-10-01
PublicationDate_xml – month: 10
  year: 2021
  text: 2021-10-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on communications
PublicationTitleAbbrev TCOMM
PublicationYear 2021
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref35
ref13
ref34
ref12
ref37
ref15
ref36
ref14
ref31
ref11
ref32
ref10
ref2
ref39
ref17
li (ref26) 2009
ref38
ref16
ref18
ref24
juditsky (ref44) 2011
ref23
ref25
mukherjee (ref1) 2021
ref20
ref41
ref22
ref21
ref43
grant (ref30) 2020
ref28
ref27
ref29
ref8
ref7
aps (ref33) 2020
ref9
ref4
ref3
ref6
ref5
ref40
clerckx (ref42) 2013
cao (ref19) 2019; 15
References_xml – ident: ref36
  doi: 10.1017/CBO9780511804441
– ident: ref17
  doi: 10.1109/ICASSP.2013.6638483
– start-page: 1
  year: 2021
  ident: ref1
  article-title: Efficient numerical methods for secrecy capacity of Gaussian MIMO wiretap channel
  publication-title: Proc IEEE Veh Technol Conf (VTC Spring)
– ident: ref13
  doi: 10.1109/TVT.2013.2285244
– ident: ref4
  doi: 10.1109/TIT.1978.1055917
– year: 2009
  ident: ref26
  article-title: Transmitter optimization for achieving secrecy capacity in Gaussian MIMO wiretap channels
  publication-title: arXiv 0909 2622
– volume: 15
  start-page: 829
  year: 2019
  ident: ref19
  article-title: Optimal transmit strategies for Gaussian MISO wiretap channels
  publication-title: IEEE Trans Inf Forensics Security
  doi: 10.1109/TIFS.2019.2929474
– ident: ref23
  doi: 10.1016/j.orl.2010.08.005
– ident: ref14
  doi: 10.1109/ICC40277.2020.9149178
– ident: ref40
  doi: 10.1109/JSAC.2002.801223
– ident: ref35
  doi: 10.1109/TSP.2003.821107
– ident: ref5
  doi: 10.1109/CISS.2007.4298439
– ident: ref25
  doi: 10.1109/JSAC.2013.130906
– ident: ref43
  doi: 10.1515/9781400833344
– ident: ref2
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– ident: ref24
  doi: 10.1109/TSP.2007.893762
– ident: ref3
  doi: 10.1002/j.1538-7305.1975.tb02040.x
– ident: ref8
  doi: 10.1109/TIT.2011.2158487
– ident: ref41
  doi: 10.1109/4234.951380
– year: 2020
  ident: ref33
  publication-title: The MOSEK optimization toolbox for MATLAB manual Version 9 2
– ident: ref6
  doi: 10.1109/TIT.2010.2048445
– ident: ref16
  doi: 10.1109/TWC.2018.2880436
– ident: ref29
  doi: 10.1109/TWC.2015.2395414
– ident: ref7
  doi: 10.1109/TIT.2010.2068852
– ident: ref12
  doi: 10.1109/ICASSP.2014.6854692
– ident: ref31
  doi: 10.1109/CACSD.2004.1393890
– ident: ref9
  doi: 10.1109/ICASSP.2010.5495998
– ident: ref22
  doi: 10.24963/ijcai.2018/190
– ident: ref15
  doi: 10.1109/VTCSpring.2018.8417596
– ident: ref21
  doi: 10.1109/LWC.2018.2793264
– ident: ref20
  doi: 10.1109/JSAC.2018.2824758
– ident: ref27
  doi: 10.1109/TIT.2017.2710058
– ident: ref32
  doi: 10.1137/1.9780898718829
– ident: ref39
  doi: 10.1109/18.985982
– year: 2020
  ident: ref30
  publication-title: CVX Matlab software for disciplined convex programming version 2 2
– ident: ref38
  doi: 10.1109/TSP.2020.3010451
– ident: ref37
  doi: 10.1007/s10107-015-0946-6
– year: 2011
  ident: ref44
  article-title: First-order methods for nonsmooth convex large-scale optimization, I: General purpose methods
  publication-title: Optimization for Machine Learning
– ident: ref11
  doi: 10.1109/TIT.2016.2618857
– year: 2013
  ident: ref42
  publication-title: MIMO Wireless Networks
– ident: ref18
  doi: 10.1109/TCOMM.2015.2424235
– ident: ref28
  doi: 10.1109/TCOMM.2012.091212.110199
– ident: ref34
  doi: 10.1155/2009/370970
– ident: ref10
  doi: 10.1109/TSP.2013.2253774
SSID ssj0004033
Score 2.459493
Snippet This paper presents novel numerical approaches to finding the secrecy capacity of the multiple-input multiple-output (MIMO) wiretap channel subject to multiple...
SourceID swepub
proquest
crossref
ieee
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 6865
SubjectTerms Algorithms
Channels
Complexity
Convergence
convex-concave
Convexity
Covariance matrices
Covariance matrix
Electronic surveillance
Exact solutions
Interference
Iterative algorithms
Iterative methods
MIMO
MIMO communication
MISO communication
Numerical methods
Optimization
per antenna power constraint
Secrecy aspects
secrecy capacity
sum power constraint
wiretap channel
Wiretapping
Title On the Secrecy Capacity of MIMO Wiretap Channels: Convex Reformulation and Efficient Numerical Methods
URI https://ieeexplore.ieee.org/document/9492144
https://www.proquest.com/docview/2582246594
https://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-312621
Volume 69
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB21PcGBFgpi-4F8QFwgWzuxk7i3atuqIKUrQYt6sxx7IlCrbNVmJeDX43Gyy7ZCiEsUKXbk6DmZ5_jNG4C3hSxdKnOf5IF-JtJx-g4iJqpw2pbW5dxHtcV5fnYpP12pqzX4sMyFQcQoPsMxnca9fD9zc_pVdqClJoevdVgPC7c-V-tPDiTPBsdJkrMX5SJBhuuDi8m0qsJSMBXjjIc1NmWzrQShWFXlIcFcNQ2NgeZ0E6rFEHt9yfV43tVj9-uRe-P_PsMWPBsYJzvqp8hzWMP2BTxd8SHchmbaskAE2RfikO4nm4QI6gI9Z7OGVR-rKSONbGdvGeUitCGaHrIJqdV_sM9IpHcoAcZs69lJ9KQIY2Dn83436IZVsUz1_Uu4PD25mJwlQwGGxGVF0SVWlR5FI5X2VuS2xExgScm3ElVtS-maosltHUhYEzi6QGEzqQPnQYHeuazJXsFGO2vxNbDaWSUa7suak51OobXnqGwdjpIMEkcgFogYN7iTU5GMGxNXKVybiKIhFM2A4gjeL_vc9t4c_2y9TWgsWw5AjGBvAbwZXt97kyoS1-ZKh8vv-smw7Ed-3Mffvx6ZAKu57r6ZTKR5Knb-fvtdeEKD6OV_e7DR3c1xP9CYrn4T5-9vVUDtrw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Bb9MwFH4a4wA7MGAgChv4gLhAOjuxk3i3qWzqYGkl6NBuluO8CLQpnbZUAn79_Jy0FIQQlyhS7MjR5-R9jr_3PYDXmcxdLNMqSj39jKTj9B1EjFTmtM2tS3kV1BaTdHwmP5yr8w14t8qFQcQgPsMhnYa9_GruFvSrbF9LTQ5fd-Cuj_tKdNlav7IgedJ7TpKgPcuXKTJc789G06Lwi8FYDBPuV9mUz7YWhkJdld8p5rptaAg1x9tQLAfZKUwuhou2HLqff_g3_u9TPIQHPedkh90keQQb2DyGrTUnwh2opw3zVJB9JhbpfrCRj6HOE3Q2r1lxUkwZqWRbe8UoG6Hx8fSAjUiv_p19QqK9fREwZpuKHQVXCj8GNll0-0GXrAiFqm-ewNnx0Ww0jvoSDJFLsqyNrMorFLVUurIitTkmAnNKv5WoSptLV2d1aksPR-1ZukBhE6k960GBlXNJnTyFzWbe4DNgpbNK1LzKS06GOpnWFUdlS3-UZJE4ALFExLjen5zKZFyasE7h2gQUDaFoehQH8HbV56pz5_hn6x1CY9WyB2IAu0vgTf8C35hYkbw2VdpfftNNhlU_cuR-_-3LofGwmov2q0lEnMbi-d9v_wrujWfFqTk9mXx8AfdpQJ0YcBc22-sF7nlS05Yvw1y-BeBm8Pg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=On+the+Secrecy+Capacity+of+MIMO+Wiretap+Channels%3A+Convex+Reformulation+and+Efficient+Numerical+Methods&rft.jtitle=IEEE+transactions+on+communications&rft.au=Mukherjee%2C+Anshu&rft.au=Ottersten%2C+Bjorn&rft.au=Le-Nam%2C+Tran&rft.date=2021-10-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=0090-6778&rft.eissn=1558-0857&rft.volume=69&rft.issue=10&rft.spage=6865&rft_id=info:doi/10.1109%2FTCOMM.2021.3098700&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0090-6778&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0090-6778&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0090-6778&client=summon