FIXED-RATE POWER ALLOCATION STRATEGIES FOR ENHANCED SECRECY IN MIMO WIRETAP CHANNELS Amitav Mukherjee and A. Lee Swindlehurst Dept. of Electrical Engineering & Computer Science University of California, Irvine Irvine, CA 92697 email: {a.mukherjee;swindle}@uci.edu ABSTRACT This paper studies the use of artificial interference in reduc- ing the likelihood that a confidential message transmitted be- tween two multi-antenna nodes is intercepted by a passive eavesdropper. A portion of the transmit power is used to broadcast the information signal with just enough power to guarantee a certain data rate for the intended receiver, and the remainder of the power is used to broadcast artificial noise in order to mask the desired signal from a potential eaves- dropper. The interference is designed to be orthogonal to the multiple-stream information signal when it reaches the de- sired receiver. A modified water-filling algorithm is proposed that balances the required transmit power with the number of spatial dimensions available for jamming the eavesdropper. Numerical results verify the increase in secrecy capacity un- der the proposed transmission scheme. 1. INTRODUCTION Wireless communications are inherently insecure due to the broadcast nature of the wireless medium. A passive eaves- dropper in the vicinity of a wireless transmission has the abil- ity to obtain information about the transmitted signal without risk of detection, since it never transmits itself. The information- theoretic aspects of this scenario, referred to as the wiretap channel, have been explored in some detail [1–3]. In partic- ular, this work led to the development of the notion of se- crecy capacity, which quantifies the rate at which a transmit- ter can reliably send a secret message to the receiver, without the eavesdropper being able to decode it. Ultimately, it was shown that a non-zero secrecy capacity can only be obtained if the eavesdropper’s channel is of lower quality than that of the intended recipient. The work cited above assumes single an- tenna nodes; secrecy capacity for the multiple-input multiple- output (MIMO) wiretap channel, where all nodes may pos- sess multiple antennas, has been studied in [4,5], for example. Note that much of this information theoretic work is based on This work was supported by the U.S. Army Research Office under the Multi-University Research Initiative (MURI) grant W911NF-07-1-0318. the assumption that the eavesdropper’s channel is known to the transmitter, which is hard to justify if the eavesdropper is truly passive. While encryption at the network layer can be used to en- sure confidential wireless communications, its computational cost may be prohibitive and there are difficulties and vulner- abilities associated with key distribution and management. Even when encryption is available, it is often still desirable to augment the security of the link and prevent its detection or interception. Consequently, there has recently been con- siderable interest in the use of physical layer mechanisms to increase the security of wireless communications links via ar- tificial interference. The idea is to increase the interference seen by the eavesdropper in such a way that her channel is degraded while the channel of the receiver is not. For ex- ample, assuming that the transmitter has more antennas than the intended recipient so that the corresponding channel has a non-trivial nullspace, one of the approaches taken in [6] is to broadcast artificial interference using transmit beamform- ers in this nullspace. Such interference will have no impact on the receiver, but will in general degrade the eavesdropper’s channel since its nullspace (if any) will be different. The high-SNR performance of this type of technique was studied in [7]. While [6] studied the case where only the distribution of the eavesdropper’s channel was known, [7,8] focused on the situation where the eavesdropper’s instanta- neous channel is known to the transmitter, and developed an algorithm to optimally exploit such information for the case where the intended recipient has a single antenna. A different but related approach can be found in [9], where the channel nullspace is exploited to design time-varying transmit beam- formers that result in a constant channel to the receiver, but a random time-varying channel for the eavesdropper. The use of relays or neighboring nodes in implementing artificial in- terference was examined in [10, 11]. In [12], a scalar secret message-transmission scheme with the aid of artificial inter- ference was examined with the relative SINR of the eaves- dropper and intended receiver as the performance criterion. In this paper, we study the MIMO wiretap problem in 978-1-4244-3696-5/09/$25.00 © 2009 IEEE 344 Authorized licensed use limited to: IEEE Editors in Chief. Downloaded on August 17, 2009 at 19:48 from IEEE Xplore. Restrictions apply.