Results 1 - 10
of
158
Discrete memoryless interference and broadcast channels with confidential messages: secrecy rate regions
- IEEE Transactions on Information Theory
, 2008
"... Abstract — Discrete memoryless interference and broadcast channels in which independent confidential messages are sent to two receivers are considered. Confidential messages are transmitted to each receiver with perfect secrecy, as measured by the equivocation at the other receiver. In this paper, w ..."
Abstract
-
Cited by 162 (13 self)
- Add to MetaCart
(Show Context)
Abstract — Discrete memoryless interference and broadcast channels in which independent confidential messages are sent to two receivers are considered. Confidential messages are transmitted to each receiver with perfect secrecy, as measured by the equivocation at the other receiver. In this paper, we derive inner and outer bounds for the achievable rate regions for these two communication systems. I.
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
- IEEE TRANSACTIONS ON INFORMATION THEORY
, 2009
"... We find the secrecy capacity of the 2-2-1 Gaussian MIMO wiretap channel, which consists of a transmitter and a receiver with two antennas each, and an eavesdropper with a single antenna. We determine the secrecy capacity of this channel by proposing an achievable scheme and then developing a tight ..."
Abstract
-
Cited by 78 (20 self)
- Add to MetaCart
(Show Context)
We find the secrecy capacity of the 2-2-1 Gaussian MIMO wiretap channel, which consists of a transmitter and a receiver with two antennas each, and an eavesdropper with a single antenna. We determine the secrecy capacity of this channel by proposing an achievable scheme and then developing a tight upper bound that meets the proposed achievable secrecy rate. We show that, for this channel, Gaussian signalling in the form of beam-forming is optimal, and no pre-processing of information is necessary.
The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel
, 2009
"... In this paper, we consider the Gaussian multiple-input multiple-output (MIMO) multi-receiver wiretap channel in which a transmitter wants to have confidential communication with an arbitrary number of users in the presence of an external eavesdropper. We derive the secrecy capacity region of this ch ..."
Abstract
-
Cited by 70 (23 self)
- Add to MetaCart
In this paper, we consider the Gaussian multiple-input multiple-output (MIMO) multi-receiver wiretap channel in which a transmitter wants to have confidential communication with an arbitrary number of users in the presence of an external eavesdropper. We derive the secrecy capacity region of this channel for the most general case. We first show that even for the single-input single-output (SISO) case, existing converse techniques for the Gaussian scalar broadcast channel cannot be extended to this secrecy context, to emphasize the need for a new proof technique. Our new proof technique makes use of the relationships between the minimum-mean-square-error and the mutual information, and equivalently, the relationships between the Fisher information and the differential entropy. Using the intuition gained from the converse proof of the SISO channel, we first prove the secrecy capacity region of the degraded MIMO channel, in which all receivers have the same number of antennas, and the noise covariance matrices can be arranged according to a positive semi-definite order. We then generalize this result to the aligned case, in which all receivers have the same number of antennas, however there is no order among the noise covariance matrices. We accomplish this task by using the channel enhancement technique. Finally, we find the secrecy capacity region of the general MIMO channel by using some limiting arguments on the secrecy capacity region of the aligned MIMO channel. We show that the capacity achieving coding scheme is a variant of dirty-paper coding with Gaussian signals.
The wiretap channel with feedback: Encryption over the channel
- IEEE TRANS. INF. THEORY
, 2008
"... In this work, the critical role of noisy feedback in enhancing the secrecy capacity of the wiretap channel is established. Unlike previous works, where a noiseless public discussion channel is used for feedback, the feed-forward and feedback signals share the same noisy channel in the present model ..."
Abstract
-
Cited by 57 (8 self)
- Add to MetaCart
(Show Context)
In this work, the critical role of noisy feedback in enhancing the secrecy capacity of the wiretap channel is established. Unlike previous works, where a noiseless public discussion channel is used for feedback, the feed-forward and feedback signals share the same noisy channel in the present model. Quite interestingly, this noisy feedback model is shown to be more advantageous in the current setting. More specifically, the discrete memoryless modulo-additive channel with a full-duplex destination node is considered first, and it is shown that the judicious use of feedback increases the secrecy capacity to the capacity of the source–destination channel in the absence of the wiretapper. In the achievability scheme, the feedback signal corresponds to a private key, known only to the destination. In the half-duplex scheme, a novel feedback technique that always achieves a positive perfect secrecy rate (even when the source–wiretapper channel is less noisy than the source–destination channel) is proposed. These results hinge on the modulo-additive property of the channel, which is exploited by the destination to perform encryption over the channel without revealing its key to the source. Finally, this scheme is extended to the continuous real valued modulo- channel where it is shown that the secrecy capacity with feedback is also equal to the capacity in the absence of the wiretapper.
Secrecy in Cooperative Relay Broadcast Channels
, 2008
"... We investigate the effects of user cooperation on the secrecy of broadcast channels by considering a cooperative relay broadcast channel. We show that user cooperation can increase the achievable secrecy region. We propose an achievable scheme that combines Marton’s coding scheme for broadcast chann ..."
Abstract
-
Cited by 56 (13 self)
- Add to MetaCart
(Show Context)
We investigate the effects of user cooperation on the secrecy of broadcast channels by considering a cooperative relay broadcast channel. We show that user cooperation can increase the achievable secrecy region. We propose an achievable scheme that combines Marton’s coding scheme for broadcast channels and Cover and El Gamal’s compress-and-forward scheme for relay channels. We derive outer bounds for the rateequivocation region using auxiliary random variables for single-letterization. Finally, we consider a Gaussian channel and show that both users can have positive secrecy rates, which is not possible for scalar Gaussian broadcast channels without cooperation.
Secure wireless communications via cooperation
- in Proc. Allerton Conf. Commun., Control, Comput
, 2008
"... Abstract — The feasibility of physical-layer-based security approaches for wireless communications in the presence of one or more eavesdroppers is hampered by channel conditions. In this paper, cooperation is investigated as an approach to overcome this problem and improve the performance of secure ..."
Abstract
-
Cited by 40 (10 self)
- Add to MetaCart
(Show Context)
Abstract — The feasibility of physical-layer-based security approaches for wireless communications in the presence of one or more eavesdroppers is hampered by channel conditions. In this paper, cooperation is investigated as an approach to overcome this problem and improve the performance of secure communications. In particular, a decode-and-forward (DF) based cooperative protocol is considered, and the objective is to design the system for secrecy capacity maximization or transmit power minimization. System design for the DF-based cooperative protocol is first studied by assuming the availability of global channel state information (CSI). For the case of one eavesdropper, an iterative scheme is proposed to obtain the optimal solution for the problem of transmit power minimization. For the case of multiple eavesdroppers, the problem of secrecy capacity maximization or transmit power minimization is in general intractable. Suboptimal system design is proposed by adding an additional constraint, i.e., the complete nulling of signals at all eavesdroppers, which yields simple closed-form solutions for the aforementioned two problems. Then, the impact of imperfect CSI of eavesdroppers on system design is studied, in which the ergodic secrecy capacity is of interest. I.
Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper
"... We study the security of communication between a single transmitter and multiple receivers in a broadcast channel in the presence of an eavesdropper. Characterizing the secrecy capacity region of this channel in its most general form is difficult, because the version of this problem without any secr ..."
Abstract
-
Cited by 33 (16 self)
- Add to MetaCart
We study the security of communication between a single transmitter and multiple receivers in a broadcast channel in the presence of an eavesdropper. Characterizing the secrecy capacity region of this channel in its most general form is difficult, because the version of this problem without any secrecy constraints, is the broadcast channel with an arbitrary number of receivers, whose capacity region is open. Consequently, to have progress in understanding secure broadcasting, we resort to studying several special classes of channels, with increasing generality. As the first model, we consider the degraded multi-receiver wiretap channel where the legitimate receivers exhibit a degradedness order while the eavesdropper is more noisy with respect to all legitimate receivers. We establish the secrecy capacity region of this channel model. Secondly, we consider the parallel multi-receiver wiretap channel with a less noisiness order in each sub-channel, where this order is not necessarily the same for all sub-channels. Consequently, this parallel multi-receiver wiretap channel is not as restrictive as the degraded multi-receiver wiretap channel, because the overall channel does not exhibit a
The Gaussian Wiretap Channel with a Helping Interferer
- Proceedings of the 2008 IEEE International Symposium on Information Theory
"... Abstract — Due to the broadcast nature of the wireless medium, wireless communication is susceptible to adversarial eavesdropping. This paper describes how eavesdropping can potentially be defeated by exploiting the superposition nature of the wireless medium. A Gaussian wire-tap channel with a help ..."
Abstract
-
Cited by 31 (1 self)
- Add to MetaCart
(Show Context)
Abstract — Due to the broadcast nature of the wireless medium, wireless communication is susceptible to adversarial eavesdropping. This paper describes how eavesdropping can potentially be defeated by exploiting the superposition nature of the wireless medium. A Gaussian wire-tap channel with a helping interferer (WTC-HI) is considered in which a transmitter sends confidential messages to its intended receiver in the presence of a passive eavesdropper and with the help of an interferer. The interferer, which does not know the confidential message assists the confidential message transmission by sending a signal that is independent of the transmitted message. An achievable secrecy rate and a Sato-type upper bound on the secrecy capacity are given for the Gaussian WTC-HI. Through numerical analysis, it is found that the upper bound is close to the achievable secrecy rate when the interference is weak for symmetric interference channels, and under more general conditions for asymmetric Gaussian interference channels. I.
Two-hop secure communication using an untrusted relay
- EURASIP J. Wireless Commun. Netw., Special Issue in Wireless Physical Layer Security
, 2009
"... Abstract—We consider a source-destination pair that can communicate only through an unauthenticated intermediate relay node. In this two-hop communication scenario, where the cooperation from the relay node is essential, we investigate whether achieving non-zero secrecy rate is possible. Specificall ..."
Abstract
-
Cited by 31 (13 self)
- Add to MetaCart
(Show Context)
Abstract—We consider a source-destination pair that can communicate only through an unauthenticated intermediate relay node. In this two-hop communication scenario, where the cooperation from the relay node is essential, we investigate whether achieving non-zero secrecy rate is possible. Specifically, we treat the relay node as an eavesdropper from whom the source information needs to be kept secret, despite the fact that its cooperation in relaying this information is needed. We find that a positive secrecy rate is indeed achievable, with the aid of the destination node or an external node that jams the relay, i.e., by cooperative jamming. We derive an upper bound on the secrecy rate by means of an eavesdropper-relay separation argument. We remark that this upper bound is the first of its kind in Gaussian channels with cooperative jamming. The upper bound is strictly smaller than the channel capacity without secrecy constraints. The achievable secrecy rates are found using stochastic encoding and compress-and-forward at the relay. Numerical results show that the gap between the bound and the achievable rate is small when the relay’s power is larger than the power of the jammer and the source. In essence, this paper shows that a cooperative jammer enables secure communication to take place using an untrusted relay which would be otherwise impossible. I.