Broadcast Channel with Confidential Messages
Secrecy with Multiple Antennas
The scalar wiretap channel requires the eavesdropper to have a worse channel than the legitimate receiver. In practice, we cannot always guarantee this. But with multiple antennas, the transmitter gains a powerful tool: it can steer the signal toward the intended receiver and away from the eavesdropper, even when the eavesdropper's scalar channel quality is comparable.
This section develops the secrecy capacity of the MIMO wiretap channel and introduces the technique of artificial noise injection β one of the most practical ideas in physical-layer security.
Definition: The MIMO Wiretap Channel
The MIMO Wiretap Channel
The MIMO wiretap channel consists of:
- Transmitter with antennas
- Legitimate receiver (Bob) with antennas:
- Eavesdropper (Eve) with antennas:
where is Bob's channel, is Eve's channel, and are noise vectors, and satisfies a power constraint where .
Theorem: Secrecy Capacity of the MIMO Wiretap Channel
The secrecy capacity of the MIMO Gaussian wiretap channel is
This is a difference of two concave functions in , making the optimization non-convex in general. However, the problem can be solved via a convex reformulation using the MIMO broadcast channel duality.
The secrecy capacity has the same form as the scalar case β mutual information to Bob minus mutual information to Eve β but now the optimization is over the input covariance matrix rather than a scalar input distribution. The transmitter can choose the spatial direction and power allocation to maximize the gap between what Bob and Eve receive.
When the transmitter has many more antennas than Eve (), the secrecy capacity approaches the non-secrecy capacity β the eavesdropper can be effectively shut out by beamforming in the null space of .
Achievability
The achievability follows from the general wiretap coding theorem applied to the MIMO channel. The Gaussian input distribution achieves for any with .
Converse
The converse uses the entropy-power inequality and the maximum-entropy property of the Gaussian distribution to show that Gaussian input is optimal. The proof parallels the MIMO capacity converse (Chapter 10) with the additional secrecy constraint handled by the equivocation chain.
Optimization
The optimization over is a difference-of-concave-functions problem. It can be solved using:
- Generalized eigenvalue decomposition of
- Convex-concave procedure (iterative linearization)
- MIMO BC duality (Khisti and Wornell, 2010)
Definition: Artificial Noise Injection
Artificial Noise Injection
Artificial noise (AN) injection is a practical technique for enhancing secrecy in MIMO systems. The transmitter splits its signal into two components:
where:
- is the beamforming vector for the secret message
- spans the null space of Bob's channel:
- is the artificial noise
Bob sees only (the AN is nulled out by design). Eve sees (the AN degrades her channel).
The power is split: fraction for the message, fraction for artificial noise, with optimized for maximum secrecy rate.
Artificial noise requires (more transmit antennas than Bob's receive antennas) so that the null space of is non-trivial. In massive MIMO (), the null space is large, and most of the transmit power can be allocated to AN while still serving Bob effectively.
Artificial noise
Randomly generated noise transmitted by Alice in the null space of the legitimate channel, designed to degrade the eavesdropper's reception without affecting the legitimate receiver. A key technique in MIMO physical-layer security.
Example: MISO Wiretap Channel with Artificial Noise
Alice has antennas, Bob has antenna, Eve has antenna. The channels are (Bob) and (Eve), with power .
(a) Design the artificial noise scheme.
(b) Compute the secrecy rate as a function of the power split .
Part (a): AN design
Beamforming vector: (matched filter to Bob).
AN subspace: Let be an orthonormal basis for the null space of , i.e., .
Transmitted signal: where has unit power and .
Part (b): Secrecy rate
Bob's SNR: (AN is nulled out).
Eve's SINR:
Secrecy rate:
The optimal maximizes . Typically, β a significant fraction of power goes to artificial noise.
Artificial Noise: Power Split vs. Secrecy Rate
Explore how the secrecy rate depends on the fraction of power allocated to the message () vs. artificial noise (). The optimal power split balances Bob's SNR against Eve's interference level.
Parameters
Total transmit power in dB
Angular separation between Bob and Eve
MIMO Secrecy Capacity vs. Number of Antennas
See how the secrecy capacity grows with the number of transmit antennas. With many antennas, the transmitter can effectively null the eavesdropper, and the secrecy capacity approaches the non-secrecy capacity.
Parameters
Common Mistake: Assuming Perfect Knowledge of Eve's Channel
Mistake:
Designing a physical-layer security scheme assuming the transmitter knows (Eve's channel matrix) perfectly.
Correction:
In practice, the transmitter rarely knows Eve's channel. The artificial noise technique is attractive precisely because it works without ECSI (Eavesdropper's CSI): the AN is transmitted isotropically in Bob's null space, degrading Eve regardless of her location. Schemes that require ECSI are theoretically interesting but practically unrealistic except in controlled environments.
Comparison of Secrecy Techniques
| Technique | Requires ECSI? | Requires key? | Security level | Practical maturity |
|---|---|---|---|---|
| Wiretap coding | No (statistical model) | No | Information-theoretic | Low (research) |
| Artificial noise | No | No | Information-theoretic | Medium (prototypes) |
| Secret key from channel | No | Generated | Information-theoretic | Medium (Wi-Fi demos) |
| AES encryption | No | Yes (pre-shared) | Computational | High (deployed) |
| Quantum key distribution | No | Generated | Information-theoretic | Low-Medium (point-to-point) |
Theorem: Secrecy Degrees of Freedom
For the MIMO wiretap channel with transmit, receive, and eavesdropper antennas, the secrecy degrees of freedom (secure spatial multiplexing gain) is when the channel matrices are generic (full rank with probability 1).
In particular, when , β the eavesdropper has no effect on the degrees of freedom.
The secrecy DoF tells us how many independent secret streams can be transmitted simultaneously. When the transmitter has enough antennas to null both Bob's interference and Eve's reception, the secrecy DoF equals the non-secrecy DoF. This is the regime where massive MIMO makes physical-layer security essentially "free" β the extra antennas can simultaneously serve Bob and confuse Eve.
Upper bound
The secrecy capacity is bounded by at the best covariance. At high SNR, the first term scales as and the second as .
Achievability
Use GSVD-based precoding: the generalized SVD of decomposes the channel into parallel sub-channels where some are visible only to Bob, some only to Eve, and some to both. The secret streams are sent on the sub-channels where Bob has an advantage.
Massive MIMO regime
When , the null space of has dimension at least . We can find directions that reach Bob but are invisible to Eve, achieving .
Massive MIMO Makes Secrecy Free
The secrecy DoF result has a striking practical implication: in massive MIMO systems with , the secrecy penalty vanishes. The transmitter has so many degrees of freedom that it can simultaneously serve the legitimate receiver at full rate and completely null the eavesdropper.
This is not just a theoretical observation β it underlies the security advantage of 5G massive MIMO. With 64 or 128 transmit antennas serving single-antenna users, the excess spatial dimensions can be used to inject artificial noise at no cost to the legitimate user's rate. Physical-layer security becomes a "bonus feature" of the antenna array, not an additional system component.
Historical Note: Artificial Noise: Goel and Negi (2008)
2008The artificial noise technique was introduced by Goel and Negi in 2008, building on the MIMO wiretap channel work of Khisti and Wornell. The idea is elegant in its simplicity: instead of trying to optimize the signal for secrecy (which requires knowledge of Eve's channel), simply transmit noise in Bob's null space. This degrades Eve's channel without affecting Bob, achieving a positive secrecy rate even without knowing .
The technique has become the most widely cited result in physical-layer security, with thousands of follow-up works extending it to relay networks, cooperative jamming, and intelligent reflecting surfaces.
Quick Check
In a massive MIMO system with , , , what are the secrecy degrees of freedom?
β since , we get
β the transmitter has enough antennas to null Eve while serving Bob at full rate
β the null space of Eve has dimension 60
With , the transmitter can beamform to Bob (achieving 1 DoF) while transmitting artificial noise in Eve's direction. The secrecy DoF equals the non-secrecy DoF: .
Key Takeaway
The MIMO wiretap channel secrecy capacity is the maximum difference between the log-determinants of the legitimate and eavesdropper channels, optimized over the input covariance. Artificial noise injection provides a practical, ECSI-free approach: transmit noise in Bob's null space to degrade Eve without affecting Bob. In the massive MIMO regime (), secrecy comes at zero rate cost β the secrecy DoF equals the non-secrecy DoF.