On Secrecy Capacity of Fast Fading MIMOME Wiretap Channels with Statistical CSIT
In this paper, we consider secure transmissions in ergodic Rayleigh fast-faded multiple-input multiple-output multiple-antenna-eavesdropper (MIMOME) wiretap channels with only statistical channel state information at the transmitter (CSIT). When the antennas at the legitimate receiver are more than...
Saved in:
Published in | IEEE transactions on wireless communications Vol. 13; no. 6; pp. 3293 - 3306 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York, NY
IEEE
01.06.2014
Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In this paper, we consider secure transmissions in ergodic Rayleigh fast-faded multiple-input multiple-output multiple-antenna-eavesdropper (MIMOME) wiretap channels with only statistical channel state information at the transmitter (CSIT). When the antennas at the legitimate receiver are more than (or equal to) those at the eavesdropper, we prove the first MIMOME secrecy capacity with partial CSIT by establishing a new secrecy capacity upper-bound. The key step is to form an MIMOME degraded channel by dividing the legitimate receiver's channel matrix into two submatrices, and setting one of the submatrices to be the same as the eavesdropper's channel matrix. Next, under the total power constraint over all transmit antennas, we analytically solve the channel-input covariance matrix optimization problem to fully characterize the MIMOME secrecy capacity. Typically, the MIMOME optimization problems are non-concave. However, thanks to the proposed degraded channel, we can transform the stochastic MIMOME optimization problem to be a Schur-concave one and then find its solution. Besides total power constraint, we also investigate the secrecy capacity when the transmitter is subject to the practical per-antenna power constraint. The corresponding optimization problem is even more difficult since it is not Schur-concave. Under the two power constraints considered, the corresponding MIMOME secrecy capacities can both scale with the signal-to-noise ratios (SNR) when the difference between numbers of antennas at legitimate receiver and eavesdropper are large enough. However, when the legitimate receiver and eavesdropper have a single antenna each, such SNR scalings do not exist for both cases. |
---|---|
AbstractList | In this paper, we consider secure transmissions in ergodic Rayleigh fast-faded multiple-input multiple-output multiple-antenna-eavesdropper (MIMOME) wiretap channels with only statistical channel state information at the transmitter (CSIT). When the antennas at the legitimate receiver are more than (or equal to) those at the eavesdropper, we prove the first MIMOME secrecy capacity with partial CSIT by establishing a new secrecy capacity upper-bound. The key step is to form an MIMOME degraded channel by dividing the legitimate receiver's channel matrix into two submatrices, and setting one of the submatrices to be the same as the eavesdropper's channel matrix. Next, under the total power constraint over all transmit antennas, we analytically solve the channel-input covariance matrix optimization problem to fully characterize the MIMOME secrecy capacity. Typically, the MIMOME optimization problems are non-concave. However, thanks to the proposed degraded channel, we can transform the stochastic MIMOME optimization problem to be a Schur-concave one and then find its solution. Besides total power constraint, we also investigate the secrecy capacity when the transmitter is subject to the practical per-antenna power constraint. The corresponding optimization problem is even more difficult since it is not Schur-concave. Under the two power constraints considered, the corresponding MIMOME secrecy capacities can both scale with the signal-to-noise ratios (SNR) when the difference between numbers of antennas at legitimate receiver and eavesdropper are large enough. However, when the legitimate receiver and eavesdropper have a single antenna each, such SNR scalings do not exist for both cases. |
Author | Shih-Chun Lin Cheng-Liang Lin |
Author_xml | – sequence: 1 givenname: Shih-Chun surname: Lin fullname: Lin, Shih-Chun – sequence: 2 givenname: Cheng-Liang surname: Lin fullname: Lin, Cheng-Liang |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=28602970$$DView record in Pascal Francis |
BookMark | eNqFkU1rGzEQhkVJoUnaX1AKglDIZV2NvnaXnsqSD0OMCzbkKBTtbKKw0bqSTPC_r1wnOeTSi0aH55Vm5jkhR2EKSMg3YDMA1v5Y33YzzkDOmIS6FACt5AdyDEo1FeeyOdrfha6A1_oTOUnpkTGotVLH5Pcy0BW6iG5HO7uxzucdnQZ6aVMuR-_DPV3MF8vFBb31EbPd0O7BhoBjos8-P9BVttmn7J0dabearz-Tj4MdE355qadkfXmx7q6rm-XVvPt1UzkpZK56jQ3D0ilybgfNHbTKIrSu4VAL4eBOwh0D0VvVNlozx3U_9O3AZTsIzsUpOT88u4nTny2mbJ58cjiONuC0TQZ0XcZnuq0LevYOfZy2MZTmDCipmeBKQaG-v1A2lVmGaIPzyWyif7JxZ3ijGW9rVrifB87FKaWIgykrKyuYQo7WjwaY2UsxRYrZSzEHKeaflJJW79KvH_wv9_WQ84j4ltENU0JI8RcuYpci |
CODEN | ITWCAX |
CitedBy_id | crossref_primary_10_1109_TIFS_2015_2477050 crossref_primary_10_1109_TWC_2016_2615902 crossref_primary_10_1109_TWC_2018_2868935 crossref_primary_10_1109_TWC_2023_3264491 crossref_primary_10_1109_ACCESS_2019_2935206 crossref_primary_10_1109_COMST_2016_2633387 crossref_primary_10_1109_TIT_2022_3186238 crossref_primary_10_1007_s11265_015_1076_3 crossref_primary_10_1109_TIFS_2015_2476464 crossref_primary_10_1109_TWC_2015_2390234 crossref_primary_10_1109_JSTSP_2016_2607690 crossref_primary_10_1109_TIFS_2019_2891231 crossref_primary_10_1049_iet_com_2016_0073 crossref_primary_10_1109_TSP_2015_2465301 crossref_primary_10_1109_LWC_2015_2426709 crossref_primary_10_1109_TWC_2015_2417886 crossref_primary_10_1109_JIOT_2023_3262818 crossref_primary_10_1109_JPROC_2015_2469602 crossref_primary_10_1109_TIT_2018_2857487 crossref_primary_10_1109_TCOMM_2018_2877329 crossref_primary_10_1109_ACCESS_2017_2671878 crossref_primary_10_1109_TIFS_2017_2746009 crossref_primary_10_1049_iet_ifs_2018_5185 crossref_primary_10_1002_ett_2924 crossref_primary_10_1109_TII_2020_3017767 |
Cites_doi | 10.1109/TIT.2009.2025549 10.1002/0471200611 10.1109/TWC.2010.080210.090948 10.1109/JSAC.2013.130907 10.1109/TIT.1978.1055892 10.1109/TIT.2008.928990 10.1109/TCOMM.2012.12.110670 10.1109/TIT.2006.880064 10.1002/j.1538-7305.1975.tb02040.x 10.1109/TWC.2011.010411.090943 10.1109/TIT.2009.2023749 10.1561/0100000036 10.1109/ICC.2012.6364653 10.1109/TIFS.2012.2233735 10.1017/CBO9780511807213 10.1109/TCOMM.2012.091212.110199 10.1017/CBO9780511921490 10.1109/TSP.2010.2048564 10.1109/TIT.2006.872984 10.1109/MMW.2004.1284943 10.1561/9781933019505 10.1109/TIT.2010.2068852 10.1017/CBO9780511810817 10.1109/TWC.2010.112310.101008 10.1109/ISPACS.2010.5704665 |
ContentType | Journal Article |
Copyright | 2015 INIST-CNRS Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jun 2014 |
Copyright_xml | – notice: 2015 INIST-CNRS – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jun 2014 |
DBID | 97E RIA RIE AAYXX CITATION IQODW 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 |
DOI | 10.1109/TWC.2014.041714.11654 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Pascal-Francis Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering Engineering Research Database |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional Engineering Research Database ANTE: Abstracts in New Technology & Engineering |
DatabaseTitleList | Technology Research Database Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Applied Sciences |
EISSN | 1558-2248 |
EndPage | 3306 |
ExternalDocumentID | 3378115721 28602970 10_1109_TWC_2014_041714_11654 6805334 |
Genre | orig-research |
GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IES IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS AAYXX CITATION RIG IQODW 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 |
ID | FETCH-LOGICAL-c434t-d6e80e116e22af62c195ae19c821733c1b41b013da598660c26dfd9f249f3223 |
IEDL.DBID | RIE |
ISSN | 1536-1276 |
IngestDate | Thu Jul 10 22:08:45 EDT 2025 Mon Jun 30 10:09:16 EDT 2025 Wed Apr 02 07:25:10 EDT 2025 Tue Jul 01 01:38:23 EDT 2025 Thu Apr 24 23:10:44 EDT 2025 Wed Aug 27 02:52:40 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 6 |
Keywords | Fading channels MIMO system Parameter estimation partial CSIT Transmitter Ergodicity Covariance matrix Stochastic method Optimization Eavesdropping Upper bound Transmitting antenna Channel estimation S matrix MIMO Secrecy capacity Receiving antenna Secrecy Antenna array Telecommunication security Signal to noise ratio |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html CC BY 4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c434t-d6e80e116e22af62c195ae19c821733c1b41b013da598660c26dfd9f249f3223 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
PQID | 1546032551 |
PQPubID | 105736 |
PageCount | 14 |
ParticipantIDs | proquest_journals_1546032551 pascalfrancis_primary_28602970 crossref_citationtrail_10_1109_TWC_2014_041714_11654 proquest_miscellaneous_1671550697 crossref_primary_10_1109_TWC_2014_041714_11654 ieee_primary_6805334 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2014-06-01 |
PublicationDateYYYYMMDD | 2014-06-01 |
PublicationDate_xml | – month: 06 year: 2014 text: 2014-06-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York, NY |
PublicationPlace_xml | – name: New York, NY – name: New York |
PublicationTitle | IEEE transactions on wireless communications |
PublicationTitleAbbrev | TWC |
PublicationYear | 2014 |
Publisher | IEEE Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: Institute of Electrical and Electronics Engineers – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | payaro? (20) 2009; 55 24 25 marshall (23) 1979 tulino (26) 2004 10 11 12 13 14 15 16 17 18 19 cover (22) 1991 2 3 4 5 6 7 8 liang (1) 2009; 5 9 21 |
References_xml | – ident: 5 doi: 10.1109/TIT.2009.2025549 – year: 1991 ident: 22 publication-title: Elements of Information Theory doi: 10.1002/0471200611 – ident: 8 doi: 10.1109/TWC.2010.080210.090948 – ident: 10 doi: 10.1109/JSAC.2013.130907 – ident: 2 doi: 10.1109/TIT.1978.1055892 – ident: 7 doi: 10.1109/TIT.2008.928990 – ident: 9 doi: 10.1109/TCOMM.2012.12.110670 – ident: 25 doi: 10.1109/TIT.2006.880064 – year: 1979 ident: 23 publication-title: Inequalities Theory of Majorization and Its Application – ident: 3 doi: 10.1002/j.1538-7305.1975.tb02040.x – ident: 12 doi: 10.1109/TWC.2011.010411.090943 – volume: 55 start-page: 3613 year: 2009 ident: 20 article-title: Hessian and concavity of mutual information, differential entropy, and entropy power in linear vector Gaussian channels publication-title: IEEE Trans Inf Theory doi: 10.1109/TIT.2009.2023749 – volume: 5 start-page: 355 year: 2009 ident: 1 article-title: Information theoretic security publication-title: Foundations Trends Commun Inf Theory doi: 10.1561/0100000036 – ident: 15 doi: 10.1109/ICC.2012.6364653 – ident: 11 doi: 10.1109/TIFS.2012.2233735 – ident: 13 doi: 10.1017/CBO9780511807213 – ident: 14 doi: 10.1109/TCOMM.2012.091212.110199 – ident: 19 doi: 10.1017/CBO9780511921490 – ident: 18 doi: 10.1109/TSP.2010.2048564 – ident: 16 doi: 10.1109/TIT.2006.872984 – ident: 17 doi: 10.1109/MMW.2004.1284943 – year: 2004 ident: 26 publication-title: Random Matrix Theory and Wireless Communications doi: 10.1561/9781933019505 – ident: 6 doi: 10.1109/TIT.2010.2068852 – ident: 24 doi: 10.1017/CBO9780511810817 – ident: 4 doi: 10.1109/TWC.2010.112310.101008 – ident: 21 doi: 10.1109/ISPACS.2010.5704665 |
SSID | ssj0017655 |
Score | 2.3155484 |
Snippet | In this paper, we consider secure transmissions in ergodic Rayleigh fast-faded multiple-input multiple-output multiple-antenna-eavesdropper (MIMOME) wiretap... |
SourceID | proquest pascalfrancis crossref ieee |
SourceType | Aggregation Database Index Database Enrichment Source Publisher |
StartPage | 3293 |
SubjectTerms | Algorithms Antennas Applied sciences Channels Codes Degradation Detection, estimation, filtering, equalization, prediction Exact sciences and technology Fading Information, signal and communications theory Mathematical analysis MIMO Optimization partial CSIT Radiocommunications Receivers Receivers & amplifiers Receiving antennas Secrecy capacity Secret Signal and communications theory Signal to noise ratio Signal, noise Systems, networks and services of telecommunications Telecommunications Telecommunications and information theory Transmission and modulation (techniques and equipments) Transmitters Transmitting antennas Wireless communication |
Title | On Secrecy Capacity of Fast Fading MIMOME Wiretap Channels with Statistical CSIT |
URI | https://ieeexplore.ieee.org/document/6805334 https://www.proquest.com/docview/1546032551 https://www.proquest.com/docview/1671550697 |
Volume | 13 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB21PcGBr4IIlMpIHEmaOI6zPqJVVy1SKFIX0VtkO-MLKFux2QP8emacbEQBCS5RpNiy47E9b-yZNwBvjHbW58Gl3kpMFRqbOqVkilgRunWV7CJdU_NBX3xS72-qmwN4O8fCIGJ0PsOMX-NdfrfxOz4qO9OLGDl6CIdkuI2xWvONQa1jhlNawJxXptZTtE6Rm7P15yX7cKksV5zuO2PGGXVHD8XEKuwWabc0MmFMafHH7hxVzuohNPvOjp4mX7Ld4DL_4zcex__9m0fwYMKe4t04WR7DAfZP4P4vjITH8PGqF9eMJP13sSQ96gmki00QK7sd6MGKTjSXzVVzLthvdrC3guMTetKwgo90BYPXyP1MDS2vL9dPYb06Xy8v0inpQupVqYa007jIkYYIpbRBS1-YymJh_IKMl7L0hVMFn512lpndde6l7kJnAplxgTaH8hkc9Zsen4PoJFbaOFsHSzAleBNM7SpXBQIxXgadgNpLoPUTITnnxfjaRsMkNy0JrmXBtaPg2ii4BLK52u3IyPGvCsc8-HPhadwTOL0j7vm75LRcps4TONnLv50W9rYlxKnzkuywIoHX82daknzPYnvc7KiMrtnw06Z-8femX8I97uXocXYCR8O3Hb4ibDO40zipfwI42vHO |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB2VcoAe-CqIQClG4kjSxHGc9RGtutqFpkVqEL1FtmNfQNmqmz3Ar2fGyUYUkOASRYotOx7b88aeeQPwVkmjbepNbDV3sXBKx0YIHjtXILo1BW8DXVN1LpefxYer4moP3k2xMM654HzmEnoNd_nt2m7pqOxEzkLk6B24i3q_yIZorenOoJQhxykuYcosU8oxXidL1Un9ZU5eXCJJBSX8TohzRtzSRCG1CjlG6g2OjR-SWvyxPwels3gI1a67g6_J12Tbm8T--I3J8X__5xE8GNEnez9Ml8ew57oncPALJ-EhfLro2CVhSfudzVGTWoTpbO3ZQm96fJCqY9WquqhOGXnO9vqaUYRChzqW0aEuI_ga2J-xofnlqn4K9eK0ni_jMe1CbEUu-riVbpY6HCLHufaS20wV2mXKztB8yXObGZHR6WmridtdppbL1rfKoyHncXvIn8F-t-7cc2Atd4VURpdeI1DxVnlVmsIUHmGM5V5GIHYSaOxISU6ZMb41wTRJVYOCa0hwzSC4JggugmSqdj1wcvyrwiEN_lR4HPcIjm-Je_rOKTGXKtMIjnbyb8alvWkQc8o0R0ssi-DN9BkXJd206M6tt1hGlmT6SVW--HvTr-Hesq7OmrPV-ceXcJ96PPifHcF-f7N1rxDp9OY4TPCf_qP1Fw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=On+Secrecy+Capacity+of+Fast+Fading+MIMOME+Wiretap+Channels+with+Statistical+CSIT&rft.jtitle=IEEE+transactions+on+wireless+communications&rft.au=Lin%2C+Shih-Chun&rft.au=Lin%2C+Cheng-Liang&rft.date=2014-06-01&rft.issn=1536-1276&rft.volume=13&rft.issue=6&rft.spage=3293&rft.epage=3306&rft_id=info:doi/10.1109%2FTWC.2014.041714.11654&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TWC_2014_041714_11654 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1276&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1276&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1276&client=summon |