On Secrecy Capacity of Fast Fading MIMOME Wiretap Channels with Statistical CSIT

In this paper, we consider secure transmissions in ergodic Rayleigh fast-faded multiple-input multiple-output multiple-antenna-eavesdropper (MIMOME) wiretap channels with only statistical channel state information at the transmitter (CSIT). When the antennas at the legitimate receiver are more than...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on wireless communications Vol. 13; no. 6; pp. 3293 - 3306
Main Authors Lin, Shih-Chun, Lin, Cheng-Liang
Format Journal Article
LanguageEnglish
Published New York, NY IEEE 01.06.2014
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract In this paper, we consider secure transmissions in ergodic Rayleigh fast-faded multiple-input multiple-output multiple-antenna-eavesdropper (MIMOME) wiretap channels with only statistical channel state information at the transmitter (CSIT). When the antennas at the legitimate receiver are more than (or equal to) those at the eavesdropper, we prove the first MIMOME secrecy capacity with partial CSIT by establishing a new secrecy capacity upper-bound. The key step is to form an MIMOME degraded channel by dividing the legitimate receiver's channel matrix into two submatrices, and setting one of the submatrices to be the same as the eavesdropper's channel matrix. Next, under the total power constraint over all transmit antennas, we analytically solve the channel-input covariance matrix optimization problem to fully characterize the MIMOME secrecy capacity. Typically, the MIMOME optimization problems are non-concave. However, thanks to the proposed degraded channel, we can transform the stochastic MIMOME optimization problem to be a Schur-concave one and then find its solution. Besides total power constraint, we also investigate the secrecy capacity when the transmitter is subject to the practical per-antenna power constraint. The corresponding optimization problem is even more difficult since it is not Schur-concave. Under the two power constraints considered, the corresponding MIMOME secrecy capacities can both scale with the signal-to-noise ratios (SNR) when the difference between numbers of antennas at legitimate receiver and eavesdropper are large enough. However, when the legitimate receiver and eavesdropper have a single antenna each, such SNR scalings do not exist for both cases.
AbstractList In this paper, we consider secure transmissions in ergodic Rayleigh fast-faded multiple-input multiple-output multiple-antenna-eavesdropper (MIMOME) wiretap channels with only statistical channel state information at the transmitter (CSIT). When the antennas at the legitimate receiver are more than (or equal to) those at the eavesdropper, we prove the first MIMOME secrecy capacity with partial CSIT by establishing a new secrecy capacity upper-bound. The key step is to form an MIMOME degraded channel by dividing the legitimate receiver's channel matrix into two submatrices, and setting one of the submatrices to be the same as the eavesdropper's channel matrix. Next, under the total power constraint over all transmit antennas, we analytically solve the channel-input covariance matrix optimization problem to fully characterize the MIMOME secrecy capacity. Typically, the MIMOME optimization problems are non-concave. However, thanks to the proposed degraded channel, we can transform the stochastic MIMOME optimization problem to be a Schur-concave one and then find its solution. Besides total power constraint, we also investigate the secrecy capacity when the transmitter is subject to the practical per-antenna power constraint. The corresponding optimization problem is even more difficult since it is not Schur-concave. Under the two power constraints considered, the corresponding MIMOME secrecy capacities can both scale with the signal-to-noise ratios (SNR) when the difference between numbers of antennas at legitimate receiver and eavesdropper are large enough. However, when the legitimate receiver and eavesdropper have a single antenna each, such SNR scalings do not exist for both cases.
Author Shih-Chun Lin
Cheng-Liang Lin
Author_xml – sequence: 1
  givenname: Shih-Chun
  surname: Lin
  fullname: Lin, Shih-Chun
– sequence: 2
  givenname: Cheng-Liang
  surname: Lin
  fullname: Lin, Cheng-Liang
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=28602970$$DView record in Pascal Francis
BookMark eNqFkU1rGzEQhkVJoUnaX1AKglDIZV2NvnaXnsqSD0OMCzbkKBTtbKKw0bqSTPC_r1wnOeTSi0aH55Vm5jkhR2EKSMg3YDMA1v5Y33YzzkDOmIS6FACt5AdyDEo1FeeyOdrfha6A1_oTOUnpkTGotVLH5Pcy0BW6iG5HO7uxzucdnQZ6aVMuR-_DPV3MF8vFBb31EbPd0O7BhoBjos8-P9BVttmn7J0dabearz-Tj4MdE355qadkfXmx7q6rm-XVvPt1UzkpZK56jQ3D0ilybgfNHbTKIrSu4VAL4eBOwh0D0VvVNlozx3U_9O3AZTsIzsUpOT88u4nTny2mbJ58cjiONuC0TQZ0XcZnuq0LevYOfZy2MZTmDCipmeBKQaG-v1A2lVmGaIPzyWyif7JxZ3ijGW9rVrifB87FKaWIgykrKyuYQo7WjwaY2UsxRYrZSzEHKeaflJJW79KvH_wv9_WQ84j4ltENU0JI8RcuYpci
CODEN ITWCAX
CitedBy_id crossref_primary_10_1109_TIFS_2015_2477050
crossref_primary_10_1109_TWC_2016_2615902
crossref_primary_10_1109_TWC_2018_2868935
crossref_primary_10_1109_TWC_2023_3264491
crossref_primary_10_1109_ACCESS_2019_2935206
crossref_primary_10_1109_COMST_2016_2633387
crossref_primary_10_1109_TIT_2022_3186238
crossref_primary_10_1007_s11265_015_1076_3
crossref_primary_10_1109_TIFS_2015_2476464
crossref_primary_10_1109_TWC_2015_2390234
crossref_primary_10_1109_JSTSP_2016_2607690
crossref_primary_10_1109_TIFS_2019_2891231
crossref_primary_10_1049_iet_com_2016_0073
crossref_primary_10_1109_TSP_2015_2465301
crossref_primary_10_1109_LWC_2015_2426709
crossref_primary_10_1109_TWC_2015_2417886
crossref_primary_10_1109_JIOT_2023_3262818
crossref_primary_10_1109_JPROC_2015_2469602
crossref_primary_10_1109_TIT_2018_2857487
crossref_primary_10_1109_TCOMM_2018_2877329
crossref_primary_10_1109_ACCESS_2017_2671878
crossref_primary_10_1109_TIFS_2017_2746009
crossref_primary_10_1049_iet_ifs_2018_5185
crossref_primary_10_1002_ett_2924
crossref_primary_10_1109_TII_2020_3017767
Cites_doi 10.1109/TIT.2009.2025549
10.1002/0471200611
10.1109/TWC.2010.080210.090948
10.1109/JSAC.2013.130907
10.1109/TIT.1978.1055892
10.1109/TIT.2008.928990
10.1109/TCOMM.2012.12.110670
10.1109/TIT.2006.880064
10.1002/j.1538-7305.1975.tb02040.x
10.1109/TWC.2011.010411.090943
10.1109/TIT.2009.2023749
10.1561/0100000036
10.1109/ICC.2012.6364653
10.1109/TIFS.2012.2233735
10.1017/CBO9780511807213
10.1109/TCOMM.2012.091212.110199
10.1017/CBO9780511921490
10.1109/TSP.2010.2048564
10.1109/TIT.2006.872984
10.1109/MMW.2004.1284943
10.1561/9781933019505
10.1109/TIT.2010.2068852
10.1017/CBO9780511810817
10.1109/TWC.2010.112310.101008
10.1109/ISPACS.2010.5704665
ContentType Journal Article
Copyright 2015 INIST-CNRS
Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jun 2014
Copyright_xml – notice: 2015 INIST-CNRS
– notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jun 2014
DBID 97E
RIA
RIE
AAYXX
CITATION
IQODW
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
DOI 10.1109/TWC.2014.041714.11654
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Pascal-Francis
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
Engineering Research Database
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList Technology Research Database

Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Applied Sciences
EISSN 1558-2248
EndPage 3306
ExternalDocumentID 3378115721
28602970
10_1109_TWC_2014_041714_11654
6805334
Genre orig-research
GroupedDBID -~X
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AIBXA
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IES
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
RIA
RIE
RNS
AAYXX
CITATION
RIG
IQODW
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
ID FETCH-LOGICAL-c434t-d6e80e116e22af62c195ae19c821733c1b41b013da598660c26dfd9f249f3223
IEDL.DBID RIE
ISSN 1536-1276
IngestDate Thu Jul 10 22:08:45 EDT 2025
Mon Jun 30 10:09:16 EDT 2025
Wed Apr 02 07:25:10 EDT 2025
Tue Jul 01 01:38:23 EDT 2025
Thu Apr 24 23:10:44 EDT 2025
Wed Aug 27 02:52:40 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords Fading channels
MIMO system
Parameter estimation
partial CSIT
Transmitter
Ergodicity
Covariance matrix
Stochastic method
Optimization
Eavesdropping
Upper bound
Transmitting antenna
Channel estimation
S matrix
MIMO
Secrecy capacity
Receiving antenna
Secrecy
Antenna array
Telecommunication security
Signal to noise ratio
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
CC BY 4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c434t-d6e80e116e22af62c195ae19c821733c1b41b013da598660c26dfd9f249f3223
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
PQID 1546032551
PQPubID 105736
PageCount 14
ParticipantIDs proquest_journals_1546032551
pascalfrancis_primary_28602970
crossref_citationtrail_10_1109_TWC_2014_041714_11654
proquest_miscellaneous_1671550697
crossref_primary_10_1109_TWC_2014_041714_11654
ieee_primary_6805334
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2014-06-01
PublicationDateYYYYMMDD 2014-06-01
PublicationDate_xml – month: 06
  year: 2014
  text: 2014-06-01
  day: 01
PublicationDecade 2010
PublicationPlace New York, NY
PublicationPlace_xml – name: New York, NY
– name: New York
PublicationTitle IEEE transactions on wireless communications
PublicationTitleAbbrev TWC
PublicationYear 2014
Publisher IEEE
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: Institute of Electrical and Electronics Engineers
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References payaro? (20) 2009; 55
24
25
marshall (23) 1979
tulino (26) 2004
10
11
12
13
14
15
16
17
18
19
cover (22) 1991
2
3
4
5
6
7
8
liang (1) 2009; 5
9
21
References_xml – ident: 5
  doi: 10.1109/TIT.2009.2025549
– year: 1991
  ident: 22
  publication-title: Elements of Information Theory
  doi: 10.1002/0471200611
– ident: 8
  doi: 10.1109/TWC.2010.080210.090948
– ident: 10
  doi: 10.1109/JSAC.2013.130907
– ident: 2
  doi: 10.1109/TIT.1978.1055892
– ident: 7
  doi: 10.1109/TIT.2008.928990
– ident: 9
  doi: 10.1109/TCOMM.2012.12.110670
– ident: 25
  doi: 10.1109/TIT.2006.880064
– year: 1979
  ident: 23
  publication-title: Inequalities Theory of Majorization and Its Application
– ident: 3
  doi: 10.1002/j.1538-7305.1975.tb02040.x
– ident: 12
  doi: 10.1109/TWC.2011.010411.090943
– volume: 55
  start-page: 3613
  year: 2009
  ident: 20
  article-title: Hessian and concavity of mutual information, differential entropy, and entropy power in linear vector Gaussian channels
  publication-title: IEEE Trans Inf Theory
  doi: 10.1109/TIT.2009.2023749
– volume: 5
  start-page: 355
  year: 2009
  ident: 1
  article-title: Information theoretic security
  publication-title: Foundations Trends Commun Inf Theory
  doi: 10.1561/0100000036
– ident: 15
  doi: 10.1109/ICC.2012.6364653
– ident: 11
  doi: 10.1109/TIFS.2012.2233735
– ident: 13
  doi: 10.1017/CBO9780511807213
– ident: 14
  doi: 10.1109/TCOMM.2012.091212.110199
– ident: 19
  doi: 10.1017/CBO9780511921490
– ident: 18
  doi: 10.1109/TSP.2010.2048564
– ident: 16
  doi: 10.1109/TIT.2006.872984
– ident: 17
  doi: 10.1109/MMW.2004.1284943
– year: 2004
  ident: 26
  publication-title: Random Matrix Theory and Wireless Communications
  doi: 10.1561/9781933019505
– ident: 6
  doi: 10.1109/TIT.2010.2068852
– ident: 24
  doi: 10.1017/CBO9780511810817
– ident: 4
  doi: 10.1109/TWC.2010.112310.101008
– ident: 21
  doi: 10.1109/ISPACS.2010.5704665
SSID ssj0017655
Score 2.3155484
Snippet In this paper, we consider secure transmissions in ergodic Rayleigh fast-faded multiple-input multiple-output multiple-antenna-eavesdropper (MIMOME) wiretap...
SourceID proquest
pascalfrancis
crossref
ieee
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 3293
SubjectTerms Algorithms
Antennas
Applied sciences
Channels
Codes
Degradation
Detection, estimation, filtering, equalization, prediction
Exact sciences and technology
Fading
Information, signal and communications theory
Mathematical analysis
MIMO
Optimization
partial CSIT
Radiocommunications
Receivers
Receivers & amplifiers
Receiving antennas
Secrecy capacity
Secret
Signal and communications theory
Signal to noise ratio
Signal, noise
Systems, networks and services of telecommunications
Telecommunications
Telecommunications and information theory
Transmission and modulation (techniques and equipments)
Transmitters
Transmitting antennas
Wireless communication
Title On Secrecy Capacity of Fast Fading MIMOME Wiretap Channels with Statistical CSIT
URI https://ieeexplore.ieee.org/document/6805334
https://www.proquest.com/docview/1546032551
https://www.proquest.com/docview/1671550697
Volume 13
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB21PcGBr4IIlMpIHEmaOI6zPqJVVy1SKFIX0VtkO-MLKFux2QP8emacbEQBCS5RpNiy47E9b-yZNwBvjHbW58Gl3kpMFRqbOqVkilgRunWV7CJdU_NBX3xS72-qmwN4O8fCIGJ0PsOMX-NdfrfxOz4qO9OLGDl6CIdkuI2xWvONQa1jhlNawJxXptZTtE6Rm7P15yX7cKksV5zuO2PGGXVHD8XEKuwWabc0MmFMafHH7hxVzuohNPvOjp4mX7Ld4DL_4zcex__9m0fwYMKe4t04WR7DAfZP4P4vjITH8PGqF9eMJP13sSQ96gmki00QK7sd6MGKTjSXzVVzLthvdrC3guMTetKwgo90BYPXyP1MDS2vL9dPYb06Xy8v0inpQupVqYa007jIkYYIpbRBS1-YymJh_IKMl7L0hVMFn512lpndde6l7kJnAplxgTaH8hkc9Zsen4PoJFbaOFsHSzAleBNM7SpXBQIxXgadgNpLoPUTITnnxfjaRsMkNy0JrmXBtaPg2ii4BLK52u3IyPGvCsc8-HPhadwTOL0j7vm75LRcps4TONnLv50W9rYlxKnzkuywIoHX82daknzPYnvc7KiMrtnw06Z-8femX8I97uXocXYCR8O3Hb4ibDO40zipfwI42vHO
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB2VcoAe-CqIQClG4kjSxHGc9RGtutqFpkVqEL1FtmNfQNmqmz3Ar2fGyUYUkOASRYotOx7b88aeeQPwVkmjbepNbDV3sXBKx0YIHjtXILo1BW8DXVN1LpefxYer4moP3k2xMM654HzmEnoNd_nt2m7pqOxEzkLk6B24i3q_yIZorenOoJQhxykuYcosU8oxXidL1Un9ZU5eXCJJBSX8TohzRtzSRCG1CjlG6g2OjR-SWvyxPwels3gI1a67g6_J12Tbm8T--I3J8X__5xE8GNEnez9Ml8ew57oncPALJ-EhfLro2CVhSfudzVGTWoTpbO3ZQm96fJCqY9WquqhOGXnO9vqaUYRChzqW0aEuI_ga2J-xofnlqn4K9eK0ni_jMe1CbEUu-riVbpY6HCLHufaS20wV2mXKztB8yXObGZHR6WmridtdppbL1rfKoyHncXvIn8F-t-7cc2Atd4VURpdeI1DxVnlVmsIUHmGM5V5GIHYSaOxISU6ZMb41wTRJVYOCa0hwzSC4JggugmSqdj1wcvyrwiEN_lR4HPcIjm-Je_rOKTGXKtMIjnbyb8alvWkQc8o0R0ssi-DN9BkXJd206M6tt1hGlmT6SVW--HvTr-Hesq7OmrPV-ceXcJ96PPifHcF-f7N1rxDp9OY4TPCf_qP1Fw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=On+Secrecy+Capacity+of+Fast+Fading+MIMOME+Wiretap+Channels+with+Statistical+CSIT&rft.jtitle=IEEE+transactions+on+wireless+communications&rft.au=Lin%2C+Shih-Chun&rft.au=Lin%2C+Cheng-Liang&rft.date=2014-06-01&rft.issn=1536-1276&rft.volume=13&rft.issue=6&rft.spage=3293&rft.epage=3306&rft_id=info:doi/10.1109%2FTWC.2014.041714.11654&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TWC_2014_041714_11654
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1276&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1276&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1276&client=summon