Conference Paper

Design of filters for reliable and secure communications conditional mean estimation at the eavesdropper.

DOI: 10.1109/EUROCON.2011.5929337 Conference: Proceedings of EUROCON 2011, International Conference on Computer as a Tool, 27-29 April 2011, Lisbon, Portugal
Source: DBLP

ABSTRACT This paper considers the problem of filter design with secrecy constraints, where two legitimate parties, Alice and Bob, communicate in the presence of an eavesdropper, Eve, over multiple-input multiple-output (MIMO) Gaussian channels. In particular, we consider the design of transmit and receive filters that minimize the mean-squared error (MSE) between the legitimate parties subject to a certain eavesdropper MSE level, in the situation where the eavesdropper MIMO channel is a degraded version of the main MIMO channel. We analyze the penalty in terms of MSE in the eavesdropper channel due to the assumption that optimal linear receive filters are used, while the eavesdropper employs nonlinear conditional mean estimation instead. This penalty is also shown to be negligible in regions of operational interest. We present a set of numerical results to illustrate the main conclusions.

0 Bookmarks
 · 
23 Views
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper considers the problem of Alter design with secrecy constraints, where two legitimate parties, Alice and Bob, communicate in the presence of an eavesdropper, Eve, over multiple-input multiple-output (MIMO) Gaussian channels. In particular, we consider the design of transmit and receive filters that minimize the mean-squared error (MSE) between the legitimate parties subject to a certain eavesdropper MSE level, in the situation where the eavesdropper MIMO channel is a degraded version of the main MIMO channel. We characterize the form of the optimal receive filters as well as the form of optimal transmit filter in different scenarios. We also put forth an iterative algorithm to obtain the optimal values of the transmit and receive filters. Finally, we present a set of numerical results that illustrate the conclusions.
    Vehicular Technology Conference (VTC Spring), 2011 IEEE 73rd; 06/2011
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: We consider the MIMO wiretap channel, that is a MIMO broadcast channel where the transmitter sends some confidential information to one user which is a legitimate receiver, while the other user is an eavesdropper. Perfect secrecy is achieved when the transmitter and the legitimate receiver can communicate at some positive rate, while insuring that the eavesdropper gets zero bits of information. In this paper, we compute the perfect secrecy capacity of the multiple antenna MIMO broadcast channel, where the number of antennas is arbitrary for both the transmitter and the two receivers. Our technique involves a careful study of a Sato-like upper bound via the solution of a certain algebraic Riccati equation.
    IEEE Transactions on Information Theory 09/2011; · 2.62 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Wyner's results for discrete memoryless wire-tap channels are extended to the Gaussian wire-tap channel. It is shown that the secrecy capacity Cs is the difference between the capacities of the main and wire.tap channels. It is further shown that Rd= Cs is the upper boundary of the achievable rate-equivocation region.
    IEEE Transactions on Information Theory 08/1978; · 2.62 Impact Factor