On the Secrecy Capacity of MIMO Wiretap Channels: Convex Reformulation and Efficient Numerical Methods
This paper presents novel numerical approaches to finding the secrecy capacity of the multiple-input multiple-output (MIMO) wiretap channel subject to multiple linear transmit covariance constraints, including sum power constraint, per antenna power constraints and interference power constraint. An...
Saved in:
Published in | IEEE transactions on communications Vol. 69; no. 10; pp. 6865 - 6878 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.10.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper presents novel numerical approaches to finding the secrecy capacity of the multiple-input multiple-output (MIMO) wiretap channel subject to multiple linear transmit covariance constraints, including sum power constraint, per antenna power constraints and interference power constraint. An analytical solution to this problem is not known and existing numerical solutions suffer from slow convergence rate and/or high per-iteration complexity. Deriving computationally efficient solutions to the secrecy capacity problem is challenging since the secrecy rate is expressed as a difference of convex functions (DC) of the transmit covariance matrix, for which its convexity is only known for some special cases. In this paper we propose two low-complexity methods to compute the secrecy capacity along with a convex reformulation for degraded channels. In the first method we capitalize on the accelerated DC algorithm which requires solving a sequence of convex subproblems, for which we propose an efficient iterative algorithm where each iteration admits a closed-form solution. In the second method, we rely on the concave-convex equivalent reformulation of the secrecy capacity problem which allows us to derive the so-called partial best response algorithm to obtain an optimal solution. Notably, each iteration of the second method can also be done in closed form. The simulation results demonstrate a faster convergence rate of our methods compared to other known solutions. We carry out extensive numerical experiments to evaluate the impact of various parameters on the achieved secrecy capacity. |
---|---|
AbstractList | This paper presents novel numerical approaches to finding the secrecy capacity of the multiple-input multiple-output (MIMO) wiretap channel subject to multiple linear transmit covariance constraints, including sum power constraint, per antenna power constraints and interference power constraint. An analytical solution to this problem is not known and existing numerical solutions suffer from slow convergence rate and/or high per-iteration complexity. Deriving computationally efficient solutions to the secrecy capacity problem is challenging since the secrecy rate is expressed as a difference of convex functions (DC) of the transmit covariance matrix, for which its convexity is only known for some special cases. In this paper we propose two low-complexity methods to compute the secrecy capacity along with a convex reformulation for degraded channels. In the first method we capitalize on the accelerated DC algorithm which requires solving a sequence of convex subproblems, for which we propose an efficient iterative algorithm where each iteration admits a closed-form solution. In the second method, we rely on the concave-convex equivalent reformulation of the secrecy capacity problem which allows us to derive the so-called partial best response algorithm to obtain an optimal solution. Notably, each iteration of the second method can also be done in closed form. The simulation results demonstrate a faster convergence rate of our methods compared to other known solutions. We carry out extensive numerical experiments to evaluate the impact of various parameters on the achieved secrecy capacity. |
Author | Mukherjee, Anshu Tran, Le-Nam Ottersten, Bjorn |
Author_xml | – sequence: 1 givenname: Anshu orcidid: 0000-0002-5093-3840 surname: Mukherjee fullname: Mukherjee, Anshu email: anshu.mukherjee@ucdconnect.ie organization: School of Electrical and Electronic Engineering, University College Dublin, Dublin 4, Ireland – sequence: 2 givenname: Bjorn orcidid: 0000-0003-2298-6774 surname: Ottersten fullname: Ottersten, Bjorn email: bjorn.ottersten@uni.lu organization: Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Esch-sur-Alzette, Luxembourg – sequence: 3 givenname: Le-Nam orcidid: 0000-0002-9317-9980 surname: Tran fullname: Tran, Le-Nam email: nam.tran@ucd.ie organization: School of Electrical and Electronic Engineering, University College Dublin, Dublin 4, Ireland |
BackLink | https://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-312621$$DView record from Swedish Publication Index |
BookMark | eNp9kU1v1DAQhi1UJLaFPwAXS5yz-DOxuVWhQKWGlaDA0fI6Y9Yla6eOA-y_J-0WDhw4zeV5Ru_Me4pOYoqA0HNK1pQS_eq63XTdmhFG15xo1RDyCK2olKoiSjYnaEWIJlXdNOoJOp2mG0KIIJyvkN9EXHaAP4HL4A64taN1oRxw8ri77Db4a8hQ7IjbnY0Rhuk1blP8Ab_wR_Ap7-fBlpAitrHHF94HFyAW_GHeQw7ODriDskv99BQ99naY4NnDPEOf315ct--rq827y_b8qnK8aUplpeqBeiF1b2ltFXAKilLBBMitVcL5xtd2K4X0DdMUqOVCk5oDhd457vkZqo57p58wzlsz5rC3-WCSDeZN-HJuUv5mvped4ZTVjC78yyM_5nQ7w1TMTZpzXCIaJhVjopZaLJQ6Ui6nacrgzfKi-7tLtmEwlJi7Fsx9C-auBfPQwqKyf9Q_kf4rvThKAQD-ClpoRoXgvwGqzJVn |
CODEN | IECMBT |
CitedBy_id | crossref_primary_10_1109_TWC_2024_3403995 crossref_primary_10_3390_e25101397 crossref_primary_10_1109_ACCESS_2023_3344654 crossref_primary_10_1109_LWC_2024_3457158 crossref_primary_10_1109_LWC_2021_3128331 crossref_primary_10_1109_TIT_2023_3336648 crossref_primary_10_1109_TWC_2022_3229077 crossref_primary_10_1109_LCOMM_2023_3299288 crossref_primary_10_1109_TIFS_2023_3337719 crossref_primary_10_1109_TVT_2024_3450528 |
Cites_doi | 10.1017/CBO9780511804441 10.1109/ICASSP.2013.6638483 10.1109/TVT.2013.2285244 10.1109/TIT.1978.1055917 10.1109/TIFS.2019.2929474 10.1016/j.orl.2010.08.005 10.1109/ICC40277.2020.9149178 10.1109/JSAC.2002.801223 10.1109/TSP.2003.821107 10.1109/CISS.2007.4298439 10.1109/JSAC.2013.130906 10.1515/9781400833344 10.1002/j.1538-7305.1949.tb00928.x 10.1109/TSP.2007.893762 10.1002/j.1538-7305.1975.tb02040.x 10.1109/TIT.2011.2158487 10.1109/4234.951380 10.1109/TIT.2010.2048445 10.1109/TWC.2018.2880436 10.1109/TWC.2015.2395414 10.1109/TIT.2010.2068852 10.1109/ICASSP.2014.6854692 10.1109/CACSD.2004.1393890 10.1109/ICASSP.2010.5495998 10.24963/ijcai.2018/190 10.1109/VTCSpring.2018.8417596 10.1109/LWC.2018.2793264 10.1109/JSAC.2018.2824758 10.1109/TIT.2017.2710058 10.1137/1.9780898718829 10.1109/18.985982 10.1109/TSP.2020.3010451 10.1007/s10107-015-0946-6 10.1109/TIT.2016.2618857 10.1109/TCOMM.2015.2424235 10.1109/TCOMM.2012.091212.110199 10.1155/2009/370970 10.1109/TSP.2013.2253774 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SP 8FD L7M ADTPV AFDQA AOWAS D8T D8V ZZAVC |
DOI | 10.1109/TCOMM.2021.3098700 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Electronics & Communications Abstracts Technology Research Database Advanced Technologies Database with Aerospace SwePub SWEPUB Kungliga Tekniska Högskolan full text SwePub Articles SWEPUB Freely available online SWEPUB Kungliga Tekniska Högskolan SwePub Articles full text |
DatabaseTitle | CrossRef Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-0857 |
EndPage | 6878 |
ExternalDocumentID | oai_DiVA_org_kth_312621 10_1109_TCOMM_2021_3098700 9492144 |
Genre | orig-research |
GrantInformation_xml | – fundername: Science Foundation Ireland grantid: 17/CDA/4786 funderid: 10.13039/501100001602 – fundername: FNR project CI-PHY grantid: 11607830 |
GroupedDBID | -~X .DC 0R~ 29I 3EH 4.4 5GY 5VS 6IK 85S 97E AAJGR AARMG AASAJ AAWTH ABAZT ABFSI ABQJQ ABVLG ACGFO ACGFS ACIWK ACKIV ACNCT AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD ESBDL HZ~ H~9 IAAWW IBMZZ ICLAB IES IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P RIA RIE RNS TAE TN5 VH1 ZCA ZCG AAYOK AAYXX CITATION RIG 7SP 8FD L7M ADTPV AFDQA AOWAS D8T D8V ZZAVC |
ID | FETCH-LOGICAL-c377t-a58de1f459da16a8e31e811424e5ba84cf7f6ab545f7291e1a349063e1edcc3f3 |
IEDL.DBID | RIE |
ISSN | 0090-6778 |
IngestDate | Thu Aug 21 06:45:38 EDT 2025 Mon Jun 30 10:16:06 EDT 2025 Tue Jul 01 02:51:35 EDT 2025 Thu Apr 24 23:06:33 EDT 2025 Wed Aug 27 02:46:19 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 10 |
Language | English |
License | https://creativecommons.org/licenses/by/4.0/legalcode |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c377t-a58de1f459da16a8e31e811424e5ba84cf7f6ab545f7291e1a349063e1edcc3f3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-5093-3840 0000-0003-2298-6774 0000-0002-9317-9980 |
OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/9492144 |
PQID | 2582246594 |
PQPubID | 85472 |
PageCount | 14 |
ParticipantIDs | ieee_primary_9492144 swepub_primary_oai_DiVA_org_kth_312621 crossref_primary_10_1109_TCOMM_2021_3098700 proquest_journals_2582246594 crossref_citationtrail_10_1109_TCOMM_2021_3098700 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-10-01 |
PublicationDateYYYYMMDD | 2021-10-01 |
PublicationDate_xml | – month: 10 year: 2021 text: 2021-10-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on communications |
PublicationTitleAbbrev | TCOMM |
PublicationYear | 2021 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref35 ref13 ref34 ref12 ref37 ref15 ref36 ref14 ref31 ref11 ref32 ref10 ref2 ref39 ref17 li (ref26) 2009 ref38 ref16 ref18 ref24 juditsky (ref44) 2011 ref23 ref25 mukherjee (ref1) 2021 ref20 ref41 ref22 ref21 ref43 grant (ref30) 2020 ref28 ref27 ref29 ref8 ref7 aps (ref33) 2020 ref9 ref4 ref3 ref6 ref5 ref40 clerckx (ref42) 2013 cao (ref19) 2019; 15 |
References_xml | – ident: ref36 doi: 10.1017/CBO9780511804441 – ident: ref17 doi: 10.1109/ICASSP.2013.6638483 – start-page: 1 year: 2021 ident: ref1 article-title: Efficient numerical methods for secrecy capacity of Gaussian MIMO wiretap channel publication-title: Proc IEEE Veh Technol Conf (VTC Spring) – ident: ref13 doi: 10.1109/TVT.2013.2285244 – ident: ref4 doi: 10.1109/TIT.1978.1055917 – year: 2009 ident: ref26 article-title: Transmitter optimization for achieving secrecy capacity in Gaussian MIMO wiretap channels publication-title: arXiv 0909 2622 – volume: 15 start-page: 829 year: 2019 ident: ref19 article-title: Optimal transmit strategies for Gaussian MISO wiretap channels publication-title: IEEE Trans Inf Forensics Security doi: 10.1109/TIFS.2019.2929474 – ident: ref23 doi: 10.1016/j.orl.2010.08.005 – ident: ref14 doi: 10.1109/ICC40277.2020.9149178 – ident: ref40 doi: 10.1109/JSAC.2002.801223 – ident: ref35 doi: 10.1109/TSP.2003.821107 – ident: ref5 doi: 10.1109/CISS.2007.4298439 – ident: ref25 doi: 10.1109/JSAC.2013.130906 – ident: ref43 doi: 10.1515/9781400833344 – ident: ref2 doi: 10.1002/j.1538-7305.1949.tb00928.x – ident: ref24 doi: 10.1109/TSP.2007.893762 – ident: ref3 doi: 10.1002/j.1538-7305.1975.tb02040.x – ident: ref8 doi: 10.1109/TIT.2011.2158487 – ident: ref41 doi: 10.1109/4234.951380 – year: 2020 ident: ref33 publication-title: The MOSEK optimization toolbox for MATLAB manual Version 9 2 – ident: ref6 doi: 10.1109/TIT.2010.2048445 – ident: ref16 doi: 10.1109/TWC.2018.2880436 – ident: ref29 doi: 10.1109/TWC.2015.2395414 – ident: ref7 doi: 10.1109/TIT.2010.2068852 – ident: ref12 doi: 10.1109/ICASSP.2014.6854692 – ident: ref31 doi: 10.1109/CACSD.2004.1393890 – ident: ref9 doi: 10.1109/ICASSP.2010.5495998 – ident: ref22 doi: 10.24963/ijcai.2018/190 – ident: ref15 doi: 10.1109/VTCSpring.2018.8417596 – ident: ref21 doi: 10.1109/LWC.2018.2793264 – ident: ref20 doi: 10.1109/JSAC.2018.2824758 – ident: ref27 doi: 10.1109/TIT.2017.2710058 – ident: ref32 doi: 10.1137/1.9780898718829 – ident: ref39 doi: 10.1109/18.985982 – year: 2020 ident: ref30 publication-title: CVX Matlab software for disciplined convex programming version 2 2 – ident: ref38 doi: 10.1109/TSP.2020.3010451 – ident: ref37 doi: 10.1007/s10107-015-0946-6 – year: 2011 ident: ref44 article-title: First-order methods for nonsmooth convex large-scale optimization, I: General purpose methods publication-title: Optimization for Machine Learning – ident: ref11 doi: 10.1109/TIT.2016.2618857 – year: 2013 ident: ref42 publication-title: MIMO Wireless Networks – ident: ref18 doi: 10.1109/TCOMM.2015.2424235 – ident: ref28 doi: 10.1109/TCOMM.2012.091212.110199 – ident: ref34 doi: 10.1155/2009/370970 – ident: ref10 doi: 10.1109/TSP.2013.2253774 |
SSID | ssj0004033 |
Score | 2.459493 |
Snippet | This paper presents novel numerical approaches to finding the secrecy capacity of the multiple-input multiple-output (MIMO) wiretap channel subject to multiple... |
SourceID | swepub proquest crossref ieee |
SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 6865 |
SubjectTerms | Algorithms Channels Complexity Convergence convex-concave Convexity Covariance matrices Covariance matrix Electronic surveillance Exact solutions Interference Iterative algorithms Iterative methods MIMO MIMO communication MISO communication Numerical methods Optimization per antenna power constraint Secrecy aspects secrecy capacity sum power constraint wiretap channel Wiretapping |
Title | On the Secrecy Capacity of MIMO Wiretap Channels: Convex Reformulation and Efficient Numerical Methods |
URI | https://ieeexplore.ieee.org/document/9492144 https://www.proquest.com/docview/2582246594 https://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-312621 |
Volume | 69 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB21PcGBFgpi-4F8QFwgWzuxk7i3atuqIKUrQYt6sxx7IlCrbNVmJeDX43Gyy7ZCiEsUKXbk6DmZ5_jNG4C3hSxdKnOf5IF-JtJx-g4iJqpw2pbW5dxHtcV5fnYpP12pqzX4sMyFQcQoPsMxnca9fD9zc_pVdqClJoevdVgPC7c-V-tPDiTPBsdJkrMX5SJBhuuDi8m0qsJSMBXjjIc1NmWzrQShWFXlIcFcNQ2NgeZ0E6rFEHt9yfV43tVj9-uRe-P_PsMWPBsYJzvqp8hzWMP2BTxd8SHchmbaskAE2RfikO4nm4QI6gI9Z7OGVR-rKSONbGdvGeUitCGaHrIJqdV_sM9IpHcoAcZs69lJ9KQIY2Dn83436IZVsUz1_Uu4PD25mJwlQwGGxGVF0SVWlR5FI5X2VuS2xExgScm3ElVtS-maosltHUhYEzi6QGEzqQPnQYHeuazJXsFGO2vxNbDaWSUa7suak51OobXnqGwdjpIMEkcgFogYN7iTU5GMGxNXKVybiKIhFM2A4gjeL_vc9t4c_2y9TWgsWw5AjGBvAbwZXt97kyoS1-ZKh8vv-smw7Ed-3Mffvx6ZAKu57r6ZTKR5Knb-fvtdeEKD6OV_e7DR3c1xP9CYrn4T5-9vVUDtrw |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Bb9MwFH4a4wA7MGAgChv4gLhAOjuxk3i3qWzqYGkl6NBuluO8CLQpnbZUAn79_Jy0FIQQlyhS7MjR5-R9jr_3PYDXmcxdLNMqSj39jKTj9B1EjFTmtM2tS3kV1BaTdHwmP5yr8w14t8qFQcQgPsMhnYa9_GruFvSrbF9LTQ5fd-Cuj_tKdNlav7IgedJ7TpKgPcuXKTJc789G06Lwi8FYDBPuV9mUz7YWhkJdld8p5rptaAg1x9tQLAfZKUwuhou2HLqff_g3_u9TPIQHPedkh90keQQb2DyGrTUnwh2opw3zVJB9JhbpfrCRj6HOE3Q2r1lxUkwZqWRbe8UoG6Hx8fSAjUiv_p19QqK9fREwZpuKHQVXCj8GNll0-0GXrAiFqm-ewNnx0Ww0jvoSDJFLsqyNrMorFLVUurIitTkmAnNKv5WoSptLV2d1aksPR-1ZukBhE6k960GBlXNJnTyFzWbe4DNgpbNK1LzKS06GOpnWFUdlS3-UZJE4ALFExLjen5zKZFyasE7h2gQUDaFoehQH8HbV56pz5_hn6x1CY9WyB2IAu0vgTf8C35hYkbw2VdpfftNNhlU_cuR-_-3LofGwmov2q0lEnMbi-d9v_wrujWfFqTk9mXx8AfdpQJ0YcBc22-sF7nlS05Yvw1y-BeBm8Pg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=On+the+Secrecy+Capacity+of+MIMO+Wiretap+Channels%3A+Convex+Reformulation+and+Efficient+Numerical+Methods&rft.jtitle=IEEE+transactions+on+communications&rft.au=Mukherjee%2C+Anshu&rft.au=Ottersten%2C+Bjorn&rft.au=Le-Nam%2C+Tran&rft.date=2021-10-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=0090-6778&rft.eissn=1558-0857&rft.volume=69&rft.issue=10&rft.spage=6865&rft_id=info:doi/10.1109%2FTCOMM.2021.3098700&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0090-6778&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0090-6778&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0090-6778&client=summon |