Beruflich Dokumente
Kultur Dokumente
3, SEPTEMBER 2011
Abstract—We study the achievable rate regions of the mul- same time and frequency slot, and hence potentially interfere
tiple-input multiple-output (MIMO) interference channel with with each other. A special application of the IFC with secrecy
confidential messages sent to two receivers, assuming the trans- constraints is addressed in [6], where the message from only one
mitters use linear precoding. Each receiver is assumed to be an
eavesdropper for the other link, and the transmitters employ
of the transmitters is considered confidential. The more general
various techniques to increase the secrecy rate of their own link or case was studied in [5] where, in the absence of a common
that of the network. We describe both cooperative and noncoop- message, the authors imposed a perfect secrecy constraint
erative transmission schemes for Gaussian interference channels, and obtained inner and outer bounds for the perfect secrecy
and derive their achievable secrecy rate regions. Cooperation is capacity region. The number of secure degrees of freedom
made possible if the transmitters share a portion of their channel (DoF) for -user Gaussian IFCs has been addressed
state information, allowing them to appropriately adjust their
precoders and improve the overall secrecy performance of the
in [7] and [8], where it was shown that under very strong
network. A game-theoretic formulation of the problem is adopted interference, positive secure DoFs are achievable for each
to allow the transmitters to find an operating point that balances user in the network. While secrecy capacity for the single-user
network performance and fairness. The benefit of cooperation is wiretap channel with multiantenna nodes has been extensively
demonstrated via several numerical examples. investigated, e.g., [9]–[14], the effect of multiantenna nodes on
Index Terms—Game theory, interference channel, mul- secrecy in multiuser scenarios has received little attention. In
tiple-input multiple-output (MIMO), secrecy capacity, wiretap fact, all of the [2]–[8] above assume single antenna nodes.
channel. In this work, we focus on the two-user multiple-input mul-
tiple-output (MIMO) IFC with confidential messages, where
each multiantenna transmitter desires to send independent and
I. INTRODUCTION
private information to its intended recipient while the other
sharing of CSIT between the transmitters in an attempt to im- recipient and the eavesdropper, respectively,
prove the overall secrecy rate of the two-user network. To do
this, we use a game theoretic framework in which the players are (1)
the transmitters and the secrecy rate achieved by their respective (2)
receivers is the utility function. We emphasize here that, for the
cooperative case, the transmitters are trusted, and hence none where and are the channel
of them collude with its intended receiver to thwart the secrecy matrices associated with the receiver and the eavesdropper,
of the other link, while the receivers are always considered as respectively. The channel matrices are fixed for the en-
eavesdroppers for the other link. tire transmission period, and in general they are assumed
For the cooperative case, we propose a low-complexity pre- to be known to all three terminals. In some situations, the
coder design strategy for the two transmitters, and we use a bar- assumption that the eavesdropper’s channel is known to
gaining approach to find an operating point that strikes a bal- the transmitter is relaxed, as discussed below. The addi-
ance between the individual and sum secrecy rates of the IFC. tive noise terms and are circularly-symmetric and
Our numerical results demonstrate a considerable improvement complex-valued Gaussian random variables. The channel
in secrecy rate for both links when a cooperative strategy is em- input satisfies a power constraint .
ployed. We note here that bargaining solutions for IFCs have The secrecy capacity of the wiretap channel has been ad-
been proposed previously for the MISO case in [22] and [23] dressed and solved for in [9]–[12]. It has been shown that for
without taking secrecy into account. The contribution of this a Gaussian input , the MIMO secrecy capacity is given by
work is the application of IFCs to general situations with confi-
(3)
dential messages, the development of algorithms for the general
MIMO scenario, and the demonstration of the advantages of co-
In [10], a closed-form expression for the secrecy capacity is de-
operation in such situations.
rived under a certain power-covariance constraint, and the av-
The remainder of the paper is organized as follows. In
erage power constraint case is treated in [11] and [12]. In [11],
Section II, we describe the model for both the wiretap and
a linear precoding approach is proposed based on the general-
interference channels, and we briefly discuss previous ap-
ized singular value decomposition (GSVD) of and that
proaches based on linear precoding for the wiretap channel
achieves the secrecy capacity in the high SNR regime. How-
that are relevant to our algorithms. Based on this prior work,
ever, the optimal input covariance matrix that achieves the se-
in Section III, we discuss two noncooperative transmission
crecy capacity at high SNR is not fully characterized, especially
schemes for Gaussian interference channels and derive their
for the case where there is a nontrivial nullspace for the channel
achievable confidential rate regions. These schemes differ
between the transmitter and eavesdropper. In [12], we propose
based on their assumption of the level of available CSIT. In
an optimal power allocation that achieves the secrecy capacity
Section IV, we study the problem from a cooperative game-the-
of the GSVD-based MIMO Gaussian wiretap channel for any
oretic perspective, and propose a precoder design scheme based
SNR, and demonstrate via simulation that it is numerically in-
on the availability of shared CSIT. We show how to find a
distinguishable from the secrecy capacity. The excellent perfor-
reasonable operating point for the IFC using game-theoretic
mance of the GSVD for wiretap channels motivates its use for
bargaining. Finally, Section V presents numerical results and
the IFC, consisting of two wiretap channels in parallel. In the
Section VI concludes the paper.
section below, we briefly define the GSVD for use later in the
Notation: Throughout the paper, we use boldface uppercase
paper.
letters to denote matrices. We use to represent matrix
1) GSVD-Based Precoding: Given two matrices
transposition, the Hermitian (i.e., conjugate) transpose,
and returns unitary
the matrix trace, the expectation operator, the identity
matrices and , nonnegative
matrix, and a matrix or vector with all zeros. Vector-valued
diagonal matrices and , and a matrix with
random variables are written with nonboldface uppercase
, such that
letters (e.g., ), while the corresponding lowercase boldface
letter denotes a specific realization of the random variable. (4)
Mutual information between and is denoted by , (5)
and represents the complex circularly symmetric
Gaussian distribution with zero mean and unit variance. The nonzero elements of are in ascending order while the
nonzero elements of are in decreasing order, and
II. SYSTEM MODEL . Additional details on the GSVD can be found in
Under certain assumptions, the two-user MIMO IFC with [11, Appendix III] and [12].
confidential messages can be considered as two parallel MIMO The transmit vector for the wiretap channel is constructed
wiretap channels. Consequently, we first review the standard as
MIMO Gaussian wiretap channel and describe solutions for this
problem based on linear precoding. (6)
The vector represents the information signal broad- In the above equations, is a zero-mean random
cast by transmitter 1, where is the vector with the average power constraint ,
number of confidential data streams to be sent to receiver 1 and is a vector of additive white Gaussian
through the channel . The elements of the noise (AWGN) at receiver with i.i.d. entries distributed as
vector represent artificial noise with covariance . The channels are assumed to be quasi-static flat
, where denotes the frac- Rayleigh fading and independent of each other. The direct
tion of the total available power devoted to . The matrix channels have i.i.d. entries distributed as
is a positive semidefinite diagonal matrix and is determined by and the cross channels have i.i.d. entries dis-
waterfilling over the largest singular values of . The tributed as , for .
precoder represents the transmit beamformer matrix In the following sections, we will propose different transmis-
corresponding to and is formed from the first dominant sion schemes and obtain their corresponding achievable secrecy
(7)
FAKOORIAN AND SWINDLEHURST: MIMO INTERFERENCE CHANNEL WITH CONFIDENTIAL MESSAGES 643
rate regions, but before doing so we need to mention Theorem pays due to the need for secrecy. If the transmitters have no in-
2 of [5] which represents the inner bound for the IFC with con- formation about the cross-channel (the eavesdropper’s channel),
fidential messages. For simplicity we write the theorem here as they cannot maximize their own individual secrecy rate since it
Lemma 1: cannot be computed in the absence of . Instead, a reasonable
Lemma 1: Any rate pair approach for each transmitter is to use the artificial noise tech-
nique described in Section II-A2, which attempts to decrease
(12) the second term of (12) more than the amount the first term is
(13) decreased.
For the scenario described in (8), if we assume in Lemma 1
over all that is deterministic, , and , (12)–(13)
can be evaluated to calculate the resulting secrecy rates as fol-
is achievable, where is an auxiliary random variable in the lows:
sense of Han–Kobayashi [5], and the precoding auxiliary
random variables and (which are independent for a
given ) represent two independent stochastic encoders. To (14)
ensure information-theoretic secrecy, the bound for the
achievable rate includes a penalty term ,
which is the conditional mutual information of receiver 2’s (15)
eavesdropper channel assuming that receiver 2 can first decode
its own information. Thus, the achievable rates in Lemma 1 where
correspond to the worst-case scenario, i.e., where the intended
messages are decoded treating the interference as noise, but the
eavesdropped message is decoded without any interference
(which is assumed to be subtracted before) [5], [20].
In the following sections, we study the MIMO IFC with con-
fidential messages as a game with the transmitters as players.
Secrecy rates are defined as utility functions and each trans-
mitter seeks to improve the secrecy rate experienced by its own
receiver through the choice of the transmission parameters (pre-
and the matrices are defined in the discussion
coder and allocated power), which serve as the game strate-
on artificial noise in Section II-A. For a given pair of transmit
gies. We will distinguish between two different types of games,
powers and for a given number of antennas at different
which we refer to as cooperative and noncooperative. In the
nodes, the rate region for the noncooperative jamming (NCJ)
noncooperative case, no CSIT is shared among the two trans-
approach is defined by the convex hull of all the secrecy rates
mitters, while in the cooperative case the transmitters exchange
achieved for all possible choices of the number of confidential
a subset of their CSIT and choose their strategies accordingly.
data streams ,
Game-theoretic bargaining techniques are used to find an oper-
and the fraction of power allocated to the information signals:
ating point that achieves a balance between the secrecy rate of
. Note that, while the addition of the jamming
each individual link and the sum secrecy rate of the two links
masks each transmitter’s information message at the unintended
together.
receiver, it also interferes with each receiver’s desired message
as well. Whether or not the artificial noise provides a benefit will
III. NONCOOPERATIVE SOLUTIONS
depend primarily on the strength of the cross-channels with re-
In this section, we will treat the problem of obtaining trans- spect to the direct channels. It is not possible for the transmitters
mission parameters in a noncooperative game-theoretic frame- to choose optimal precoders and an optimal power allocation in
work. Each transmitter acts selfishly and attempts to improve order to maximize and , since they do not possess the
his own utility function (secrecy rate) without regard to that of CSI necessary to compute these rates. Thus, the secrecy rate re-
the other transmitter. Two different cases will be discussed. In gion defined above will only be used in the simulations to com-
the first case, each transmitter only knows the direct channel to pare the achievable performance of NCJ with the other proposed
the desired receiver and nothing about the eavesdropper, while methods.
in the second case, each transmitter knows the direct channel as
well as the channel to the eavesdropper on the other link. B. Noncooperative GSVD
In this case, we assume that each transmitter knows not
A. Noncooperative Jamming only its own direct channel , but also the cross-channel
In this case, we assume that each transmitter only knows to the potential eavesdropper. Obtaining information about the
, and not the cross-channel . Before proceeding with this channel for the unintended receiver is an issue that requires
problem, let us review Lemma 1. The first term in (12) repre- careful attention. In some cases, one could assume that such in-
sents the achievable rate for user 1, without secrecy constraints formation is available due to previous communication between
and by treating interference from transmitter 2 as noise. The each transmitter and the other receiver. For example, the two re-
second term in (12) is the information that receiver 2 obtains ceivers could be located at the edges of the cells corresponding
regarding user 1’s data and represents the penalty that user 1 to the two transmitters (a likely setting for the IFC scenario
644 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 3, SEPTEMBER 2011
[21]), in which case the serving transmitter for a given receiver the interference of transmitter 1’s signal with transmitter 2’s
may frequently change, and both transmitters must maintain signal at receiver 2, and vice versa. As with the NCJ approach,
current channel state information (CSI) for each receiver. Oth- the transmitters cannot optimize their strategies to maximize
erwise, methods must be established to prevent a receiver from and since they do not possess the necessary CSI.
gaining an advantage by falsely reporting its CSI or sending The secrecy rate pair achieved by the noncooperative GSVD
bogus training data to the interfering transmitter. One approach approach will depend on how much power each transmitter uses,
to address this issue would require the serving transmitter to which varies from 0 to . Increasing the transmit
monitor the feedback or training signals sent by its receiver, to power not only improves the quality of the direct link, but also
ensure that the correct training symbols are used or that the re- that of the eavesdropper, so it is not immediately clear how the
ceiver is not artificially reducing its transmit power. transmitters would find a suitable operating point. If we view the
When both and are available to transmitter , a reason- choice of transmit power as a noncooperative game between the
able precoding scheme is obtained by simply treating the IFC as two transmitters with secrecy rate as the utility, a standard ap-
two parallel wiretap channels, and using the GSVD method of proach would be to find the so-called Nash equilibrium (NE),
Section II-A1 to design the precoders for each transmitter. Thus, which is an operating point for which no player can improve its
transmitter 1 constructs as utility without cooperation with the other [22]. We argue here
that for GSVD-based precoding, an NE occurs when both trans-
(16) mitters use their full available power. That this is true is clear
from the fact that the GSVD approach only allocates power
where is obtained from , each nonzero to those subchannels for which a positive secrecy rate is pos-
element of the vector represents an independently encoded sible (i.e., subchannels for which the corresponding diagonal el-
Gaussian codebook symbol that is beamformed with the cor- ements of are greater than those for ); increasing
responding column of the matrix , and is a positive the transmit power over only these subchannels can only in-
semidefinite diagonal matrix representing the power allocated crease the secrecy rate for the desired receiver. Thus, it is in each
to each data stream according to (7). Similarly, for transmitter 2 transmitter’s own selfish best interest to use full transmit power;
we have doing otherwise would only reduce its utility. The only excep-
tion to this rule would occur in pathological settings where the
(17) GSVD approach yields no subchannels with positive secrecy
rate. If one of the transmitters finds itself in this situation, it
Based on the definition of the GSVD in (4) and (5), we have would simply shut down and not transmit any information at
all.
(18)
(19)
(20) IV. COOPERATIVE SOLUTION
(21)
In this section, we model the problem of agreeing on beam-
forming vectors and transmit power allocation as a cooperative
where are unitary matrices and are diagonal
game, with the transmitters as players and the achieved secrecy
matrices . Substituting (16) and (17) into the channel
rate as the utility function. We emphasize that, other than pro-
model (10) and (11) and using (18)–(21), we have
viding the transmitters with their CSI, the receivers have no ac-
tive role in the game theory formulation. They simply act as pas-
(22) sive listeners, attempting to decode both their own and the other
(23) transmitter’s message; their actions cannot change the utility
function.
Applying Lemma 1 with deterministic, , and In the cooperative solution we present below, we assume that
yields the following rate region expressions for this tech- each transmitter knows not only its own channel and the
nique: cross-channel , but also the subspaces and
, which represent the subspaces in which trans-
mitter ’s information signal lies when it reaches receiver and
, respectively. We assume that the transmitters exchange infor-
mation about these subspaces with each other, and we present an
(24) approach that exploits this information in a cooperative manner
in order to increase the secrecy rate performance of each link.
The approach is suboptimal since the design of the precoders
for the information and artificial noise signals is decoupled,
(25) but it provides a closed-form solution with manageable com-
plexity. Once the precoders have been computed, cooperative
While this approach will have improved secrecy over the bargaining is used to find an agreeable operating point, which in
method of Section III-A due to its more informed choice of this case amounts to determining the amount of power devoted
beamformers and power levels, it cannot properly account for to the information and artificial noise signals at each transmitter.
FAKOORIAN AND SWINDLEHURST: MIMO INTERFERENCE CHANNEL WITH CONFIDENTIAL MESSAGES 645
(29)
(36)
(30)
where
(31)
B. Bargaining Solution power for the information signal and none for arti-
In order to achieve a useful balance between their individual ficial noise. While Tx2 uses no power for information, in gen-
secrecy rates and overall network performance, the above al- eral there will be a benefit to if it transmits artificial noise.
gorithm requires that the two transmitters cooperatively arrive However, it is not necessarily optimal for Tx2 to devote all of its
at a reasonable choice for parameters that determine available power to noise, since in general this noise will degrade
the power allocated to artificial noise. Prior work on the IFC the information signal at both Rx1 and Rx2. Thus, an optimal
problem without secrecy constraints has demonstrated the ef- value of must be found to calculate the maximum possible
fectiveness of various methods for choosing a suitable operating value for . A similar argument holds for , and the problem
point to trade-off interference and throughput. These include in (37) can be reduced to two simple line searches
methods that achieve the maximum sum rate [25], the max-
imum–minimum rate [26], the Nash bargaining solution [26] (38)
and the Kalai–Smorodinsky (K-S) bargaining solution [23]. In
this paper, we choose the K-S approach and modify the algo- (39)
rithm of [23] to use secrecy rate as the utility function and the
fraction of power allocated to jamming as the strategies avail- In the following we present an iterative algorithm that finds
able to the two transmitters. The K-S bargaining solution has an the K-S solution for the aforementioned MIMO IFC with confi-
intuitively appealing interpretation; for this application, it will dential messages. The proposed algorithm restricts its search to
allow the transmitters to maximize their individual secrecy rates rates that lie on the line segment connecting and , which
subject to the constraint that each link experiences the same can be parameterized as for some scalar
fraction of its maximum possible secrecy rate. As such, it rep- . The K-S rates and the corresponding can
resents an attractive compromise between efficiency (defined then be found by searching for the largest value of that yields
herein in terms of maximizing the sum secrecy rate) and equity an achievable secrecy rate pair:
(maximizing the minimum secrecy rate).
To define the K-S solution, two secrecy rate points are
required for each user. The first is the so-called “disagreement”
point, which represents the secrecy rate guaranteed to each (40)
player if bargaining fails. The disagreement point is repre-
sented by the 2 1 vector , and can be chosen in a number
of different ways, depending on the expected behavior of the
transmitters when they do not cooperate. The simplest case is where is given by (35) and (36).
to assume , which would imply that if bargaining fails, Similar to [23], we find using a bisection method, checking
the two transmitters refuse to transmit at all. A less severe at each step to see whether or not there exist feasible
assumption would be that, in the absence of cooperation, the that achieve the associated secrecy rates .
transmitters fall back to one of the noncooperative approaches We start by setting and . At iteration , we
discussed earlier. In particular, the most proper choice for the choose the test point defined by .
disagreement point is the NE [20]–[23], which corresponds We then test the secrecy rate vector for
to the operating point where neither of the transmitters can feasibility by searching over the set .
improve its secrecy rate without cooperation with the other one. If is feasible (there exists an
While the existence and uniqueness of an NE solution for a such that is met or exceeded), we set , other-
general MIMO interference channel with confidential messages wise we set . An exhaustive search over
is still unknown, if we restrict the transmitters to use the GSVD is rarely needed. If the value of is far from the rate region
approach of Section III-B, we can use the NE point discussed boundary, it is only necessary to find a single pair for
there as . Other choices for are possible as well, and any of which the achieved rates dominate the elements of ; once
them can be used in the bargaining approach we describe here. such a point is found, the achievability of is guaranteed and
Besides the disagreement point, the other required secrecy the search over can be terminated. On the other hand,
rate is the so-called “utopia” point, denoted by the 2 1 vector if is close to the boundary, then we already have narrowed
, which represents the maximum possible secrecy rate avail- down the possible optimal values of to a small set, and
able to each user individually it is only necessary to do a grid search around these points. It-
erations continue until for small . At
(37) this point, we choose the secrecy rates ,
which are arbitrarily close to the K-S solution. Since the bisec-
where is given by (35) or (36), and we have explic- tion search points will bracket the K-S point with intervals of
itly written it as a function of the fractional power allocation ever-decreasing length, the algorithm is guaranteed to converge
parameters to emphasize that these are the parameters the trans- to rates within of the K-S solution. The accuracy de-
mitters bargain over (the precoders having been computed in sired for the K-S rates determines the required value of .
the previous step). Let us consider for the moment. In this
case, Tx2 will transmit no information signal, as this cannot im- V. NUMERICAL RESULTS
prove . Since Tx1 uses GSVD precoders to transmit the de- In this section, we first compare via simulation the achiev-
sired signal, it is clear that Tx1 should use all of its transmit able secrecy rate regions of the noncooperative and coopera-
FAKOORIAN AND SWINDLEHURST: MIMO INTERFERENCE CHANNEL WITH CONFIDENTIAL MESSAGES 647
Fig. 4. Achievable secrecy rate regions of GSVD ANA, GSVD and NCJ for Fig. 6. Achievable secrecy rate regions of GSVD ANA, GSVD and NCJ for
and . , including the K-S operating point.
the cooperative algorithm that strikes a reasonable balance be- [20] E. A. Jorswieck and R. Mochaourab, “Secrecy rate region of MISO
tween individual link and network performance. Numerical re- interference channel: Pareto boundary and non-cooperative games,” in
Proc. Int. Workshop on Smart Antennas (WSA), Berlin, Germany, Feb.
sults show a significant benefit to both links when the transmit- 2009.
ters choose to cooperate through the use of jamming to block [21] Y. Liu, Y. Dai, and Z. Luo, “Coordinated beamforming for MISO inter-
their own receivers from receiving the other transmitter’s mes- ference channel: Complexity analysis and efficient algorithms,” IEEE
Trans. Signal Process., vol. 59, no. 3, pp. 1142–1157, Mar. 2011.
sage. [22] E. Larsson and E. Jorswieck, “Competition versus collaboration on the
MISO interference channel,” IEEE J. Sel. Areas Commun., vol. 26, no.
REFERENCES 7, pp. 1059–1069, Sep. 2008.
[1] A. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, [23] M. Nokleby and A. L. Swindlehurst, “Bargaining and the MISO inter-
pp. 1355–1387, Jan. 1975. ference channel,” EURASIP J. Appl. Signal Process., vol. 2009, Article
[2] Y. Liang and V. H. Poor, “Multiple access channels with confidential 368547, 13 pages.
messages,” IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 339–348, Mar. [24] K. S. Gomadam, V. R. Cadambe, and S. A. Jafar, “A distributed nu-
2008. merical approach to interference alignment and applications to wire-
[3] R. Liu, I. Maric, R. D. Yates, and P. Spasojevic, “The discrete mem- less interference networks,” IEEE Trans. Inf. Theory vol. 57, no. 6, pp.
oryless multiple access channel with confidential messages,” in Proc. 3309–3322, Jun. 2011.
IEEE Int. Symp. Information Theory (ISIT), Seattle, WA, Jul. 2006, pp. [25] M. T. Ivrlac and J. A. Nossek, “Intercell-interference in the Gaussian
957–961. MISO broadcast channel,” in Proc. IEEE GLOBECOM, Washington,
[4] J. Xu, Y. Cao, and B. Chen, “Capacity bounds for broadcast channels DC, 2007, pp. 3195–3199.
with confidential messages,” IEEE Trans. Inf. Theory, vol. 55, no. 10, [26] E. Larsson, E. Jorswieck, J. Lindblom, and R. Mochaourab, “Game
pp. 4529–4542, Oct. 2009. theory and the flat fading interference channel,” IEEE Signal Proc.
[5] R. Liu, I. Maric, P. Spasojevic, and R. Yates, “Discrete memoryless in- Mag., vol. 26, no. 5, pp. 18–27, Sep. 2009.
terference and broadcast channels with confidential messages: Secrecy
rate regions,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493–2507,
Jun. 2008. S. Ali. A. Fakoorian received the B.S. degree in
[6] Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai, and S. Verdu, 2002, and the M.S. degree in 2005, from Amirkabir
“Capacity of cognitive interference channels with and without confi- University of Technology, Tehran, Iran, both in elec-
dential messages,” IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604–619, trical engineering. He is currently working toward
Feb. 2009. the Ph.D. degree at the Department of Electrical
[7] O. O. Koyluoglu, H. El Gamal, L. Lai, and H. V. Poor, “Interference Engineering and Computer Science, University of
alignment for secrecy,” IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. California, Irvine, CA.
3323–3332, Jun. 2011. His research interests lie in multiple-user wireless
[8] X. He and A. Yener, “K-user interference channels: Achievable secrecy networks, signal processing, and information theory.
rate and degrees of freedom,” in Proc. IEEE Inf. Theory Workshop Mr. Fakoorian is a student member of CPCC, and
on Networking and Information Theory (ITW’09), Volos, Greece, Jun. the IEEE Communications and Signal Processing So-
2009, pp. 336–340. cieties.
[9] T. Liu and S. Shamai (Shitz), “A note on secrecy capacity of the multi-
antenna wiretap channel,” IEEE Trans. Inf. Theory, vol. 55, no. 6, pp.
2547–2553, Jun. 2009.
[10] R. Bustin, R. Liu, H. V. Poor, and S. Shamai (Shitz), “A MMSE A. Lee Swindlehurst (S’83–M’84–SM’99–F’04) re-
approach to the secrecy capacity of the MIMO Gaussian wiretap ceived the B.S. (summa cum laude) and M.S. degrees
channel,” EURASIP J. Wireless Commun. Netw., vol. 2009, 2009, in electrical engineering from Brigham Young Uni-
Article ID 370970, 8 pages. versity, Provo, UT, in 1985 and 1986, respectively,
[11] A. Khisti and G. Wornell, “Secure transmission with multiple antennas and the Ph.D. degree in electrical engineering from
II: The MIMOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, Stanford University, Stanford, CA, in 1991.
no. 11, pp. 5515–5532, Nov. 2010. From 1986 to 1990, he was with ESL, Inc.,
[12] S. A. A. Fakoorian and A. L. Swindlehurst, “Dirty paper coding versus Sunnyvale, CA, where he was involved in the design
linear GSVD-based precoding in MIMO broadcast channel with con- of algorithms and architectures for several radar and
fidential messages,” in IEEE Globecom, submitted for publication. sonar signal processing systems. He was on the fac-
[13] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” ulty of the Department of Electrical and Computer
IEEE Trans. Inf. Theory, vol. 7, no. 6, pp. 2180–2189, Jun. 2008. Engineering at Brigham Young University from 1990 to 2007, where he was
[14] A. Mukherjee and A. L. Swindlehurst, “Fixed-rate power allocation a Full Professor and served as Department Chair from 2003 to 2006. During
strategies for enhanced secrecy in MIMO wiretap channels,” in Proc. 1996–1997, he held a joint appointment as a visiting scholar at both Uppsala
10th IEEE SPAWC, Perugia, Italy, Jun. 2009, pp. 344–348. University, Uppsala, Sweden, and at the Royal Institute of Technology, Stock-
[15] C.-B. Chae, S.-H. Kim, and R. Heath, “Network coordinated beam- holm, Sweden. From 2006 to 2007, he was on leave working as Vice President
forming for cell-boundary users: Linear and nonlinear approaches,” of Research for ArrayComm LLC, San Jose, CA. He is currently a Professor of
IEEE J. Sel. Topics Signal Process., vol. 3, no. 6, pp. 1094–1105, Dec. electrical engineering and computer science with the University of California
2009. at Irvine. His research interests include sensor array signal processing for radar
[16] D. Gesbert, S. Hanly, H. Huang, S. Shitz, O. Simeone, and W. Yu, and wireless communications, detection and estimation theory, and system
“Multi-cell MIMO cooperative networks: A new look at interference,” identification, and he has over 200 publications in these areas.
IEEE J. Sel. Areas Commun., vol. 28, no. 9, pp. 1380–1408, Dec. 2010. Dr. Swindlehurst is a past Secretary of the IEEE Signal Processing Society,
[17] R. Zhang, “Cooperative multi-cell block diagonalization with per-base- past Editor-in-Chief of the IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL
station power constraints,” IEEE J. Sel. Areas Commun., vol. 28, no. PROCESSING, and past member of the Editorial Boards for the EURASIP Journal
9, pp. 1435–1445, Dec. 2010. on Wireless Communications and Networking, IEEE Signal Processing Maga-
[18] P. Popovski and O. Simeone, “Wireless secrecy in cellular systems with zine, and the IEEE TRANSACTIONS ON SIGNAL PROCESSING. He is a recipient
infrastructure-aided cooperation,” IEEE Trans. Inf. Forensics Security, of several paper awards: the 2000 IEEE W. R. G. Baker Prize Paper Award, the
vol. 4, no. 2, pp. 242–256, Jun. 2009. 2006 and 2010 IEEE Signal Processing Societys Best Paper Award, the 2006
[19] A. Khisti and G. Wornell, “Secure transmission with multiple antennas IEEE Communications Society Stephen O. Rice Prize in the Field of Commu-
Part I: The MISOME wiretap channel,” IEEE Trans. Inf. Theory, vol. nication Theory, and is coauthor of a paper that received the IEEE Signal Pro-
56, no. 7, pp. 3088–3104, Jul. 2010. cessing Society Young Author Best Paper Award in 2001.