{"title":"A Degraded Practical MIMOME Channel: Issues Insecret Data Communications","authors":"Mohammad Rakibul Islam","volume":37,"journal":"International Journal of Information and Communication Engineering","pagesStart":32,"pagesEnd":39,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/11021","abstract":"
In this paper, a Gaussian multiple input multiple output multiple eavesdropper (MIMOME) channel is considered where a transmitter communicates to a receiver in the presence of an eavesdropper. We present a technique for determining the secrecy capacity of the multiple input multiple output (MIMO) channel under Gaussian noise. We transform the degraded MIMOME channel into multiple single input multiple output (SIMO) Gaussian wire-tap channels and then use scalar approach to convert it into two equivalent multiple input single output (MISO) channels. The secrecy capacity model is then developed for the condition where the channel state information (CSI) for main channel only is known to the transmitter. The results show that the secret communication is possible when the eavesdropper channel noise is greater than a cutoff noise level. The outage probability is also analyzed of secrecy capacity is also analyzed. The effect of fading and outage probability is also analyzed.<\/p>\r\n","references":"[1] A. D. Wyner,\"The wire-tap channel,\" Bell Syst. Tech. J., 54(8):210,\r\nOctober 1975.\r\n[2] S. K. Leung Yan Cheong and M. E. Hellman,\"The Gaussian wire-tap\r\nchannel,\" IEEE Trans. on Information Theory, 24(4):451-456, July 1978.\r\n[3] U. M. Maurer,\"Secret key agreement by public discussion from common\r\ninformation,\" IEEE Trans. on Information Theory, vol. 39, pp. 733742,\r\nMay 1993.\r\n[4] R. Ahlswede and I. Csiszar,\"Common randomness in information theory\r\nand cryptography, part I: Secret sharing,\" IEEE Trans. on Information\r\nTheory, vol. 39, pp. 11211132, July 1993.\r\n[5] I. Csiszar and J. Korner,\"Broadcast channels with confidential messages,\"\r\nIEEE Trans. on Information Theory, 24(3):339-348, May 1978.\r\n[6] I. E. Telatar,\"Capacity of multi-antenna Gaussian channels,\" European\r\nTrans. Telecommunications, 10:585-595, November 1999.\r\n[7] R. Negi and S. Goel,\"Secret communication using artificial noise,\"IEEE\r\nVehicular Technology Conference, Toulouse, France, May 2006.\r\n[8] P. Parada and R. Blahut,\"Secrecy capacity of SIMO and slow fading channels,\"\r\nIEEE International Symposium on Information Theory, Adelaide,\r\nAustralia, September 2005.\r\n[9] J. Barros and M. Rodrigues,\"Secrecy capacity of wireless channels,\" IEEE\r\nInternational Symposium on Information Theory, USA, 2006\r\n[10] M. Bloch, J. Barros, M. Rodrigues and S. Mclaughlin,\"Wireless information\r\ntheoretic security,\" IEEE Transactions on Information Theory, vol.\r\n54, no. 6, pp. 2515-2534, June 2008.\r\n[11] S. Shafiee and S. Ulukus,\"Achievable rates in Gaussian MISO channels\r\nwith secrecy constraints,\" In IEEE International Symposium on Information\r\nTheory, Nice, France, June 2007.\r\n[12] Z. Li, W. Trappe, and R. D. Yates,\"Secret communication via multi\r\nantenna transmission,\" 41st Conference on Information Sciences and\r\nSystems, Baltimore, MD, March 2007.\r\n[13] A. Khisti, G. Wornell, A. Wiesel, and Y. Eldar,\"On the Gaussian MIMO\r\nwiretap channel,\" IEEE International Symposium on Information Theory,\r\nNice, France, June 2007.\r\n[14] A. Khisti and G. Wornell,\"Secure transmission with multiple antennas:\r\nThe MISOME wiretap channel,\" Submitted to IEEE Trans. on Information\r\nTheory\r\n[15] T. Cover and J. Thomas, Elements of Information Theory Wiley, 1991.\r\n[16] R. A. Horn and C. R. Johnson, Matrix Analysis, Cambridge University\r\nPress, 1987.\r\n[17] X. Li and E. P. Ratazzi,\"MIMO transmissions with information theoretic\r\nsecrecy for secret key agreement in wireless networks,\" IEEE Military\r\nCommunications Conference (MILCOM2005), 2005. Atlantic City, NJ.\r\n[18] X. Li, M. Chen, and E. P. Ratazzi,\"Space time transmissions for\r\nwireless secret key agreement with information-theoretic secrecy,\" IEEE\r\nInternational Workshop on Signal Processing Advances in Wireless\r\nCommunications (SPAWC05), 2005. The Italian Academy at Columbia\r\nUniversity, New York.\r\n[19] P. Viswanath and D. Tse,\"Fundamentals of wireless communications,\"\r\nclass notes for ECE 459, Department of Electrical and Computer Engineering,\r\nUniversity of Illinois at Urbana Champaign, Fall 2003.\r\n[20] S. Shafiee, N. Liu and S. Ulukus,\"Secrecy Capacity of the 2-2-1\r\nGaussian MIMO Wire-tap Channel,\" ISCCSP, 2008\r\n[21] A. Paulraj, R. Nabar, and D. Gore (2003) Introduction to Space-Time\r\nWireless Communications, Cambridge, U.K.: Cambridge Univ. Press","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 37, 2010"}