MIMOME Gaussian Channels with GMM Signals in High-SNR Regime: Fundamental Limits and Tradeoffs

  • Francesco RennaEmail author
  • Nicola Laurenti
  • Stefano Tomasin
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 358)


Achievable secrecy rates over a multiple-input multiple-output multiple-eavesdropper (MIMOME) wiretap channel are considered, when the legitimate users have perfect knowledge only of the legitimate channel state and the eavesdropper channel is drawn from a (possibly unknown) continuous probability density. Legitimate users are assumed to deploy more antennas than the eavesdropper. A signaling transmission based on K-class Gaussian mixture model (GMM) distributions is proposed, which can be considered as an artificial-noise augmented signal, where the noise statistics are data-dependent. The proposed scheme is shown to achieve the secrecy capacity, \(\log K\), in the high signal-to-noise ratio (SNR) regime. Moreover, the tradeoff between secrecy and reliability at finite SNR is explored via the characterization of an upper bound to the error probability at the legitimate receiver, an upper bound to the mutual information leakage to the eavesdropper and via numerical simulations.


Gaussian Mixture Model Secret Message Information Leakage Secrecy Rate Symbol Error Probability 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Baldi M, Chiaraluce F, Laurenti N, Tomasin S, Renna F (2014) Secrecy transmission on parallel channels: theoretical limits and performance of practical codes. IEEE Trans Inf Forensics Secur 9(11):1765–1779Google Scholar
  2. 2.
    Cover TM, Thomas JA (1991) Elements of information theory. Wiley, New YorkGoogle Scholar
  3. 3.
    Csiszár I, K\(\ddot{\rm o}\)rner J (1978) Broadcast channels with confidential messages. IEEE Trans Inf Theory 24(3):339–348Google Scholar
  4. 4.
    Cumanan K, Ding Z, Sharif B, Tian GY, Leung KK (2014) Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper. IEEE Trans Veh Technol 63(4):1678–1690Google Scholar
  5. 5.
    Duda RO, Hart PE, Stork DG (2000) Pattern classification, 2nd edn. Wiley-Interscience, New YorkGoogle Scholar
  6. 6.
    Golub GH, Loan CFV (1996) Matrix computations. Johns Hopkins University Press, BaltimoreGoogle Scholar
  7. 7.
    He X, Yener A (2014) MIMO wiretap channels with unknown and varying eavesdropper channel states. IEEE Trans Inf Theory 60(11):6844–6869Google Scholar
  8. 8.
    He X, Khisti A, Yener A (2014) MIMO broadcast channel with an unknown eavesdropper: secrecy degrees of freedom. IEEE Trans Commun 62(1):246–255Google Scholar
  9. 9.
    Horn R, Johnson C (1985) Matrix analysis. Cambridge University Press, CambridgeGoogle Scholar
  10. 10.
    Khisti A, Wornell GW (2010) Secure transmission with multiple antennas-part II: the MIMOME wiretap channel. IEEE Trans Inf Theory 56(11):5515–5532Google Scholar
  11. 11.
    Kiessling M, Speidel J (2004) Exact ergodic capacity of MIMO channels in correlated Rayleigh fading environments. In: Proceedings of IEEE International Zurich Seminar on Communication, Zurich, SwitzerlandGoogle Scholar
  12. 12.
    Leung-Yan-Cheong S, Hellman ME (1978) The Gaussian wire-tap channel. IEEE Trans Inf Theory 24(4):451–456Google Scholar
  13. 13.
    Li Z, Yates R, Trappe W (2006) Secrecy capacity of independent parallel channels. In: Allerton conference in communication, control, and computing, Monticello, ILGoogle Scholar
  14. 14.
    Lin CH, Tsai SH, Lin YP (2014) Secure transmission using MIMO precoding. IEEE Trans Inf Forensics Secur 9(5):801–813Google Scholar
  15. 15.
    Liu T, Shamai S (2009) A note on the secrecy capacity of the multiple-antenna wiretap channel. IEEE Trans Inf Theory 55(6):2547–2553Google Scholar
  16. 16.
    Reboredo H, Renna F, Calderbank R, Rodrigues MRD (2013) Compressive classification. In: Proceedings of IEEE international symposium on information theory (ISIT), Istanbul, TurkeyGoogle Scholar
  17. 17.
    Reeves G, Goela N, Milosavljevic N, Gastpar M (2011) A compressed sensing wire-tap channel. CoRR abs/1105.2621Google Scholar
  18. 18.
    Renna F, Laurenti N, Poor H (2012) Physical-layer secrecy for OFDM transmissions over fading channels. IEEE Trans Inf Forensics Secur 7(4):1354–1367Google Scholar
  19. 19.
    Tomasin S (2013) Resource allocation for secret transmissions over MIMOME fading channels. In: IEEE global conference on communication (GLOBECOM), Workshop on Trusted Communications with Physical Layer Security, AtlantaGoogle Scholar
  20. 20.
    Tomasin S, Laurenti N (2014) Secret message transmission by HARQ with multiple encoding. In: Proceedings of IEEE international conference on communication (ICC), Sydney, AustraliaGoogle Scholar
  21. 21.
    Wong CW, Wong T, Shea J (2011) Secret-sharing LDPC codes for the BPSK-constrained Gaussian wiretap channel. IEEE Trans Inf Forensics Secur 6(3):551–564Google Scholar
  22. 22.
    Wyner A (1975) The wiretap channel. Bell Syst Tech J 54(8):1355–1387Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Francesco Renna
    • 1
    Email author
  • Nicola Laurenti
    • 2
  • Stefano Tomasin
    • 2
  1. 1.University College LondonLondonUK
  2. 2.University of PaduaPaduaItaly

Personalised recommendations