Abstract
In this paper, a novel closed-form transmit beamforming scheme is proposed for multiple-input multiple-output (MIMO) wiretap channel. The proposed method follows the idea of maximizing signal-to-leakage-plus-noise ratio and does not need additional power allocation. An efficient approach is further developed to implement the generalized eigenvalue decomposition required by our method when n r < n t (n t , n r and n e denote the antenna numbers at the transmitter, the intended receiver and the eavesdropper, respectively), which has lower complexity than the existing approaches. Moreover, we identify some shortcomings of the generalized singular value decomposition (GSVD) based beamforming method, a common beamforming scheme for MIMO wiretap channel. Finally, simulation results show that the proposed method significantly outperforms GSVD-based method when n e < n t and has almost the same performance as GSVD-based method when n e ≥ n t .
Similar content being viewed by others
References
Wyner A. (1975) The wire-tap channel. Bell System Technique Journal 54(8): 1355–1387
Leung-Yan-Cheong S., Hellman M. (1978) The Gaussian wire-tap channel. IEEE Transactions on Information Theory 24(4): 451–456
Khisti A., Wornell G. (2009) Secure transmission with multiple antennas–part I: The MISOME wiretap channel. IEEE Transactions on Information Theory 56(7): 3088–3104
Khisti A., Wornell G. (2010) Secure transmission with multiple antennas–part II: The MIMOME wiretap channel. IEEE Transactions on Information Theory 56(11): 5515–5532
Fakoorian, S. A., & Swindlehurst, A. L. (2010). Optimal power allocation for GSVD-based beamforming in the MIMO wiretap channel. http://arxiv.org/abs/1006.1890.
Bashar, S., Ding, Z., & Xiao, C. (2011). On secrecy rrate analysis of MIMO wiretap channels driven by finite-alphabet input. IEEE Transactions on Communications, (accepted) http://arxiv.org/abs/1104.1014.
Fakoorian S. A., Swindlehurst A. L. (2011) MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design. IEEE Transactions on Information Forensics and Security 6(3): 640–649
Mukherjee, A., & Swindlehurst, A. L. (2010). Securing multi-antenna two-way relay channels with analog network coding against eavesdroppers. In Proceeding of IEEE signal processing avanced wireless communications (pp. 1–5).
Renna, F., Laurenti, N., & Poor, H. V. (2010). Physical layer secrecy for OFDM systems. In Proceeding of IEEE European wireless conference (pp. 782–789).
Mucchi L., Ronga L. S., Del Re E. (2011) Physical layer cryptography and cognitive networks. Wireless Personal Communications 58(3): 95–109
Park J., Chun J., Park H. (2010) Generalised singular value decomposition-based algorithm for multi-user MIMO linear precoding and antenna selection. IET Communications 4(16): 1899–1907
Paige C., Saunders M. A. (1981) Towards a generalized singular value decomposition. SIAM Journal of Numerical Analysis 18(3): 398–405
Wang, J. (2004). Computing the csd and gsvd. http://wwwcsif.cs.ucdavis.edu/~wangjj/gsvd/gsvdj_jw3.pdf.
Spencer Q. H., Swindlehurst A. L., Haardt M. (2004) Zero-forcing methods for downlink spatial multiplexing in multiuser MIMO channels. IEEE Transactions on Signal Processing 52(2): 461–471
Zhang R. (2010) Cooperative multi-cell block diagonalization with per-base-station power constraints. IEEE Journal on Selected Areas in Communications 28(9): 1435–1445
Sadek M., Tarighat A., Sayed A. H. (2007) A leakage-based precoding scheme for downlink multi-user MIMO channels. IEEE Transactions on Wireless Communications 6(5): 1711–1721
Golub G. H., Loan C. F. V. (1996) Matrix computations (3rd ed.). Johns Hopkins University Press, Baltimore
Cover T., Thomas J. (2006) Elements of information theory (2nd ed.). Wiley, New York
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, K., Wang, X. & Zhang, X. SLNR-Based Transmit Beamforming for MIMO Wiretap Channel. Wireless Pers Commun 71, 109–121 (2013). https://doi.org/10.1007/s11277-012-0798-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-012-0798-9