Broadcast Channel with Confidential Messages

Secrecy with Multiple Antennas

The scalar wiretap channel requires the eavesdropper to have a worse channel than the legitimate receiver. In practice, we cannot always guarantee this. But with multiple antennas, the transmitter gains a powerful tool: it can steer the signal toward the intended receiver and away from the eavesdropper, even when the eavesdropper's scalar channel quality is comparable.

This section develops the secrecy capacity of the MIMO wiretap channel and introduces the technique of artificial noise injection β€” one of the most practical ideas in physical-layer security.

Definition:

The MIMO Wiretap Channel

The MIMO wiretap channel consists of:

  • Transmitter with ntn_t antennas
  • Legitimate receiver (Bob) with nrn_r antennas: y=Hx+wB\mathbf{y} = \mathbf{H}\mathbf{x} + \mathbf{w}_B
  • Eavesdropper (Eve) with nen_e antennas: z=HEx+wE\mathbf{z} = \mathbf{H}_{E}\mathbf{x} + \mathbf{w}_E

where H∈CnrΓ—nt\mathbf{H} \in \mathbb{C}^{n_r \times n_t} is Bob's channel, HE∈CneΓ—nt\mathbf{H}_{E} \in \mathbb{C}^{n_e \times n_t} is Eve's channel, wB∼CN(0,Inr)\mathbf{w}_B \sim \mathcal{CN}(\mathbf{0}, \mathbf{I}_{n_r}) and wE∼CN(0,Ine)\mathbf{w}_E \sim \mathcal{CN}(\mathbf{0}, \mathbf{I}_{n_e}) are noise vectors, and x\mathbf{x} satisfies a power constraint tr(Ξ£X)≀P\text{tr}(\boldsymbol{\Sigma}_{X}) \leq P where Ξ£X=E[xxH]\boldsymbol{\Sigma}_{X} = \mathbb{E}[\mathbf{x}\mathbf{x}^H].

Theorem: Secrecy Capacity of the MIMO Wiretap Channel

The secrecy capacity of the MIMO Gaussian wiretap channel is Cs=max⁑ΣXβͺ°0, tr(Ξ£X)≀P[log⁑det⁑(I+HΞ£XHH)βˆ’log⁑det⁑(I+HEΞ£XHEH)].C_s = \max_{\boldsymbol{\Sigma}_{X} \succeq 0,\, \text{tr}(\boldsymbol{\Sigma}_{X}) \leq P} \bigl[\log\det(\mathbf{I} + \mathbf{H}\boldsymbol{\Sigma}_{X}\mathbf{H}^{H}) - \log\det(\mathbf{I} + \mathbf{H}_{E}\boldsymbol{\Sigma}_{X}\mathbf{H}_{E}^{H})\bigr].

This is a difference of two concave functions in Ξ£X\boldsymbol{\Sigma}_{X}, making the optimization non-convex in general. However, the problem can be solved via a convex reformulation using the MIMO broadcast channel duality.

The secrecy capacity has the same form as the scalar case β€” mutual information to Bob minus mutual information to Eve β€” but now the optimization is over the input covariance matrix Ξ£X\boldsymbol{\Sigma}_{X} rather than a scalar input distribution. The transmitter can choose the spatial direction and power allocation to maximize the gap between what Bob and Eve receive.

When the transmitter has many more antennas than Eve (nt≫nen_t \gg n_e), the secrecy capacity approaches the non-secrecy capacity β€” the eavesdropper can be effectively shut out by beamforming in the null space of HE\mathbf{H}_{E}.

,

Definition:

Artificial Noise Injection

Artificial noise (AN) injection is a practical technique for enhancing secrecy in MIMO systems. The transmitter splits its signal into two components:

x=vss+VANnAN\mathbf{x} = \mathbf{v}_s s + \mathbf{V}_{\text{AN}} \mathbf{n}_{\text{AN}}

where:

  • vs\mathbf{v}_s is the beamforming vector for the secret message ss
  • VAN\mathbf{V}_{\text{AN}} spans the null space of Bob's channel: HVAN=0\mathbf{H}\mathbf{V}_{\text{AN}} = \mathbf{0}
  • nAN∼CN(0,ΟƒAN2I)\mathbf{n}_{\text{AN}} \sim \mathcal{CN}(\mathbf{0}, \sigma_{\text{AN}}^2 \mathbf{I}) is the artificial noise

Bob sees only Hvss+wB\mathbf{H}\mathbf{v}_s s + \mathbf{w}_B (the AN is nulled out by design). Eve sees HEvss+HEVANnAN+wE\mathbf{H}_{E}\mathbf{v}_s s + \mathbf{H}_{E}\mathbf{V}_{\text{AN}}\mathbf{n}_{\text{AN}} + \mathbf{w}_E (the AN degrades her channel).

The power is split: fraction Ξ±\alpha for the message, fraction (1βˆ’Ξ±)(1-\alpha) for artificial noise, with Ξ±\alpha optimized for maximum secrecy rate.

Artificial noise requires nt>nrn_t > n_r (more transmit antennas than Bob's receive antennas) so that the null space of H\mathbf{H} is non-trivial. In massive MIMO (nt≫nrn_t \gg n_r), the null space is large, and most of the transmit power can be allocated to AN while still serving Bob effectively.

Artificial noise

Randomly generated noise transmitted by Alice in the null space of the legitimate channel, designed to degrade the eavesdropper's reception without affecting the legitimate receiver. A key technique in MIMO physical-layer security.

Example: MISO Wiretap Channel with Artificial Noise

Alice has nt=4n_t = 4 antennas, Bob has nr=1n_r = 1 antenna, Eve has ne=1n_e = 1 antenna. The channels are hBH∈C1Γ—4\mathbf{h}_B^H \in \mathbb{C}^{1 \times 4} (Bob) and hEH∈C1Γ—4\mathbf{h}_E^H \in \mathbb{C}^{1 \times 4} (Eve), with power P=10P = 10.

(a) Design the artificial noise scheme.

(b) Compute the secrecy rate as a function of the power split Ξ±\alpha.

Artificial Noise: Power Split vs. Secrecy Rate

Explore how the secrecy rate depends on the fraction of power allocated to the message (Ξ±\alpha) vs. artificial noise (1βˆ’Ξ±1-\alpha). The optimal power split balances Bob's SNR against Eve's interference level.

Parameters
4
15

Total transmit power in dB

45

Angular separation between Bob and Eve

MIMO Secrecy Capacity vs. Number of Antennas

See how the secrecy capacity grows with the number of transmit antennas. With many antennas, the transmitter can effectively null the eavesdropper, and the secrecy capacity approaches the non-secrecy capacity.

Parameters
15
1

Common Mistake: Assuming Perfect Knowledge of Eve's Channel

Mistake:

Designing a physical-layer security scheme assuming the transmitter knows HE\mathbf{H}_{E} (Eve's channel matrix) perfectly.

Correction:

In practice, the transmitter rarely knows Eve's channel. The artificial noise technique is attractive precisely because it works without ECSI (Eavesdropper's CSI): the AN is transmitted isotropically in Bob's null space, degrading Eve regardless of her location. Schemes that require ECSI are theoretically interesting but practically unrealistic except in controlled environments.

Comparison of Secrecy Techniques

TechniqueRequires ECSI?Requires key?Security levelPractical maturity
Wiretap codingNo (statistical model)NoInformation-theoreticLow (research)
Artificial noiseNoNoInformation-theoreticMedium (prototypes)
Secret key from channelNoGeneratedInformation-theoreticMedium (Wi-Fi demos)
AES encryptionNoYes (pre-shared)ComputationalHigh (deployed)
Quantum key distributionNoGeneratedInformation-theoreticLow-Medium (point-to-point)

Theorem: Secrecy Degrees of Freedom

For the MIMO wiretap channel with ntn_t transmit, nrn_r receive, and nen_e eavesdropper antennas, the secrecy degrees of freedom (secure spatial multiplexing gain) is ds=[dmainβˆ’deve]+=[min⁑(nt,nr)βˆ’min⁑(nt,ne)]+d_s = [d_{\text{main}} - d_{\text{eve}}]^+ = [\min(n_t, n_r) - \min(n_t, n_e)]^+ when the channel matrices are generic (full rank with probability 1).

In particular, when nt>nr+nen_t > n_r + n_e, ds=nrd_s = n_r β€” the eavesdropper has no effect on the degrees of freedom.

The secrecy DoF tells us how many independent secret streams can be transmitted simultaneously. When the transmitter has enough antennas to null both Bob's interference and Eve's reception, the secrecy DoF equals the non-secrecy DoF. This is the regime where massive MIMO makes physical-layer security essentially "free" β€” the extra antennas can simultaneously serve Bob and confuse Eve.

Massive MIMO Makes Secrecy Free

The secrecy DoF result has a striking practical implication: in massive MIMO systems with nt≫nr+nen_t \gg n_r + n_e, the secrecy penalty vanishes. The transmitter has so many degrees of freedom that it can simultaneously serve the legitimate receiver at full rate and completely null the eavesdropper.

This is not just a theoretical observation β€” it underlies the security advantage of 5G massive MIMO. With 64 or 128 transmit antennas serving single-antenna users, the excess spatial dimensions can be used to inject artificial noise at no cost to the legitimate user's rate. Physical-layer security becomes a "bonus feature" of the antenna array, not an additional system component.

Historical Note: Artificial Noise: Goel and Negi (2008)

2008

The artificial noise technique was introduced by Goel and Negi in 2008, building on the MIMO wiretap channel work of Khisti and Wornell. The idea is elegant in its simplicity: instead of trying to optimize the signal for secrecy (which requires knowledge of Eve's channel), simply transmit noise in Bob's null space. This degrades Eve's channel without affecting Bob, achieving a positive secrecy rate even without knowing HE\mathbf{H}_{E}.

The technique has become the most widely cited result in physical-layer security, with thousands of follow-up works extending it to relay networks, cooperative jamming, and intelligent reflecting surfaces.

Quick Check

In a massive MIMO system with nt=64n_t = 64, nr=1n_r = 1, ne=4n_e = 4, what are the secrecy degrees of freedom?

ds=1d_s = 1 β€” since min⁑(64,1)βˆ’min⁑(64,4)=1βˆ’4<0\min(64, 1) - \min(64, 4) = 1 - 4 < 0, we get ds=[1βˆ’4]+=0d_s = [1 - 4]^+ = 0

ds=1d_s = 1 β€” the transmitter has enough antennas to null Eve while serving Bob at full rate

ds=60d_s = 60 β€” the null space of Eve has dimension 60

Key Takeaway

The MIMO wiretap channel secrecy capacity is the maximum difference between the log-determinants of the legitimate and eavesdropper channels, optimized over the input covariance. Artificial noise injection provides a practical, ECSI-free approach: transmit noise in Bob's null space to degrade Eve without affecting Bob. In the massive MIMO regime (nt≫nr+nen_t \gg n_r + n_e), secrecy comes at zero rate cost β€” the secrecy DoF equals the non-secrecy DoF.

Artificial Noise Injection in MIMO Wiretap

Visualizes how a multi-antenna transmitter beamforms the signal to the legitimate receiver while injecting artificial noise in the null space to degrade the eavesdropper's channel.