The Gaussian Wiretap Channel with Noisy Public Feedback: Breaking the High-SNR Ceiling T` ung T. Kim and H. Vincent Poor Department of Electrical Engineering Princeton University Princeton, NJ 08544, USA Email: {thanhkim, poor}@princeton.edu Abstract—A multiple-antenna Gaussian wiretap channel in which the number of antennas at the source is not larger than that at the eavesdropper is considered. Without feedback, the secrecy capacity over such a channel generally converges to a constant at high signal-to-noise ratio (SNR). A half-duplex secure protocol allowing the destination to actively broadcast random keys over insecure channels is proposed. It is shown that using multiple antennas at the destination is instrumental in achieving a secrecy rate that grows linearly with log SNR. The pre-log factor of the secrecy rate, i.e. the secure degree of freedom, is characterized, revealing an interesting interplay between the numbers of antennas at the three communication nodes. I. I NTRODUCTION Consider a Gaussian wiretap channel in which the number of antennas at the eavesdropper is greater than or equal to the number of antennas at the source. It is known that in such a restrictive scenario, if the destination passively listens to the transmitted signals from the source, then the secrecy capacity converges to a nite constant at high signal-to-noise ratio (SNR); see for example [1]–[3]. If the destination can actively transmit jamming signals, a more encouraging picture emerges: In modulo-additive chan- nels, the source can send at a secrecy rate that equals to the capacity of a channel without any eavesdropper [4]. However a complete characterization of the secrecy capacity in the important case of additive white Gaussian noise (AWGN) channels has not been obtained. In a related line of thought, achievable secrecy rates for Gaussian two-way channels are studied in [5] for full-duplex systems. In the more challenging and arguably more practical case of half-duplex systems, nding secure schemes that can provide secrecy rate that grows linearly in log SNR is still an open problem to date. In the current work we make progress towards settling this important issue. Inspired by the classical concept of self- interference cancelation in two-way channels [6], we propose and analyze a novel half-duplex scheme that can achieve a positive secure degree of freedom (i.e., the pre-log factor of the secrecy rates) even when the eavesdropper has more antennas than the source. An additional advantage of the proposed scheme is its robustness: both the source and the destination can operate without using any explicit knowledge about the eavesdropper’s channel matrices. While they still need to agree on the number of extra codewords to confuse the eavesdropper, this can in principle be accomplished by assuming a secure S D E H SE H SD H DS H DE Fig. 1. System model. zone around the legitimate nodes that the eavesdropper cannot inltrate [1]. Loosely speaking, the approach in the current work is to use randomly generated keys known only to the destination to hide the secret message in the form of interference. Due to the half- duplex constraint these random keys need to be rst broad- cast over the wireless channel, and thus the source and the eavesdropper also have access to noisy versions of these keys. Unfortunately, in the high-SNR regime, the eavesdropper may as well estimate these keys with (increasingly) high accuracy. Our problem therefore has a avor of secret communications with feedback over an insecure public channel [7]. Our main idea is to make use of multiple antennas at the destination to send key vectors of sufciently high dimension, so that even at high SNRs the eavesdropper is unable to completely cancel the interference. As long as the number of antennas at the destination is larger than that at the eavesdropper, we show that strictly positive secure degrees of freedom are typically achievable, regardless of the number of antennas at the source. We characterize the exact secure degree of freedom, which depends on a relationship between the channel matrix from the destination to the source and that from the destination to the eavesdropper, The results highlight an interesting interplay between the number of antennas at three communication nodes. II. SYSTEM MODEL Consider the complex baseband of a multiple-antenna Gaus- sian wiretap channel depicted in Fig. 1. The source S, which has N t antennas, wishes to transmit a secure message to the destination D, which has N r antennas, in the presence of 819 978-1-4244-5827-1/09/$26.00 ©2009 IEEE Asilomar 2009