TY - GEN
T1 - Optimality of beamforming for secrecy capacity of MIMO wiretap channels
AU - Li, Jiangyuan
AU - Petropulu, Athina P.
PY - 2012
Y1 - 2012
N2 - A Gaussian multiple-input multiple-output (MIMO) wiretap channel model is considered, where there exists a transmitter, a legitimate receiver and an eavesdropper each equipped with multiple antennas. The optimality of beamforming for secrecy capacity subject to sum power constraint is studied, and two sufficient conditions for beamforming to be globally optimal are given. The first sufficient condition states that when the difference between the Gram matrices of legitimate and eavesdropper channel matrices has exactly one positive eigenvalue, then beamforming is globally optimal. An alternative sufficient condition, which involves convex optimization, is also provided. For the case in which beamforming is globally optimal, the secrecy capacity is obtained. Otherwise, an upper bound of the difference between the secrecy capacity and beamforming secrecy rate is provided.
AB - A Gaussian multiple-input multiple-output (MIMO) wiretap channel model is considered, where there exists a transmitter, a legitimate receiver and an eavesdropper each equipped with multiple antennas. The optimality of beamforming for secrecy capacity subject to sum power constraint is studied, and two sufficient conditions for beamforming to be globally optimal are given. The first sufficient condition states that when the difference between the Gram matrices of legitimate and eavesdropper channel matrices has exactly one positive eigenvalue, then beamforming is globally optimal. An alternative sufficient condition, which involves convex optimization, is also provided. For the case in which beamforming is globally optimal, the secrecy capacity is obtained. Otherwise, an upper bound of the difference between the secrecy capacity and beamforming secrecy rate is provided.
KW - MIMO wiretap channel
KW - Secrecy capacity
KW - beam-forming
KW - optimality of beamforming
KW - wireless physical layer security
UR - http://www.scopus.com/inward/record.url?scp=84874091183&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84874091183&partnerID=8YFLogxK
U2 - https://doi.org/10.1109/WIFS.2012.6412662
DO - https://doi.org/10.1109/WIFS.2012.6412662
M3 - Conference contribution
SN - 9781467322874
T3 - WIFS 2012 - Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security
SP - 276
EP - 281
BT - WIFS 2012 - Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security
T2 - 2012 IEEE International Workshop on Information Forensics and Security, WIFS 2012
Y2 - 2 December 2012 through 5 December 2012
ER -