• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

The secrecy capacity region of the Gaussian MIMO multireceiver wiretap channel,” (2011)

by E Ekrem, S Ulukus
Venue:IEEE Trans. Inf. Theory,
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 70
Next 10 →

Cooperation with an untrusted relay: a secrecy perspective

by Xiang He, Aylin Yener - IEEE TRANSACTIONS ON INFORMATION THEORY , 2010
"... We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario, an interesting question is whether the relay node should be deployed at all. That is, whether cooperation with an untr ..."
Abstract - Cited by 52 (13 self) - Add to MetaCart
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario, an interesting question is whether the relay node should be deployed at all. That is, whether cooperation with an untrusted relay node can ever be beneficial. We first provide an achievable secrecy rate for the general untrusted relay channel, and proceed to investigate this question for two types of relay networks with orthogonal components. For the first model, there is an orthogonal link from the source to the relay. For the second model, there is an orthogonal link from the relay to the destination. For the first model, we find the equivocation capacity region and show that answer is negative. In contrast, for the second model, we find that the answer is positive. Specifically, we show, by means of the achievable secrecy rate based on compress-and-forward, that by asking the untrusted relay node to relay information, we can achieve a higher secrecy rate than just treating the relay as an eavesdropper. For a special class of the second model, where the relay is not interfering itself, we derive an upper bound for the secrecy rate using an argument whose net effect is to separate the eavesdropper from the relay. The merit of the new upper bound is demonstrated on two channels that belong to this special class. The Gaussian case of the second model mentioned above benefits from this approach in that the new upper bound improves the previously known bounds. For the Cover–Kim deterministic relay channel, the new upper bound finds the secrecy capacity when the source-destination link is not worse than the source-relay link, by matching with achievable rate we present.

Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels

by Xiang He, Aylin Yener , 2009
"... Recent results have shown that structured codes can be used to construct good channel codes, source codes and physical layer network codes for Gaussian channels. For Gaussian channels with secrecy constraints, however, efforts to date rely on random codes. In this work, we advocate that structured c ..."
Abstract - Cited by 45 (17 self) - Add to MetaCart
Recent results have shown that structured codes can be used to construct good channel codes, source codes and physical layer network codes for Gaussian channels. For Gaussian channels with secrecy constraints, however, efforts to date rely on random codes. In this work, we advocate that structured codes are useful for providing secrecy, and show how to compute the secrecy rate when structured codes are used. In particular, we solve the problem of bounding equivocation rates with one important class of structured codes, i.e., nested lattice codes. Having established this result, we next demonstrate the use of structured codes for secrecy in two-user Gaussian channels. In particular, with structured codes, we prove that a positive secure degree of freedom is achievable for a large class of fully connected Gaussian channels as long as the channel is not degraded. By way of this, for these channels, we establish that structured codes outperform Gaussian random codes at high SNR. This class of channels include the two-user multiple access wiretap channel, the two-user interference channel with confidential messages and the two-user interference wiretap channel. A notable consequence of this result is that, unlike the case with Gaussian random codes, using structured codes for both transmission and cooperative jamming, it is possible to achieve an arbitrary large secrecy rate given enough power.
(Show Context)

Citation Context

...h secrecy was identified for some of these models including the Gaussian wiretap channel [4], the MIMO wiretap channel [5], [6] and the MIMO Gaussian broadcast channel with confidential messages [7], =-=[8]-=-. On the other hand, secrecy capacity regions for models with multiple transmitters remain in general as open problems except for some special cases, e.g., sum secrecy capacity for a degraded Gaussian...

Interference Alignment for the Multi-Antenna Compound Wiretap Channel

by Ashish Khisti , 2010
"... ..."
Abstract - Cited by 27 (3 self) - Add to MetaCart
Abstract not found

MIMO Wiretap Channels with Arbitrarily Varying Eavesdropper Channel States. Arxiv.org:1007.4801

by Xiang He, Aylin Yener
"... ar ..."
Abstract - Cited by 25 (9 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

... with strong secrecy. The achievable rate with weak secrecy is derived for completeness as well as maintaining consistency with most of current literature in information theoretic secrecy, e.g., [7], =-=[8]-=-. A diagram summarizing the steps leading to the achievability proof along with key methodologies is provided in Figure 4. Finally, in Section IV-G, we present the converse to establish the secure deg...

Degraded Compound Multi-receiver Wiretap Channels

by Ersen Ekrem, Sennur Ulukus , 2009
"... In this paper, we study the degraded compound multi-receiver wiretap channel. The degraded compound multi-receiver wiretap channel consists of two groups of users and a group of eavesdroppers, where, if we pick an arbitrary user from each group of users and an arbitrary eavesdropper, they satisfy a ..."
Abstract - Cited by 22 (11 self) - Add to MetaCart
In this paper, we study the degraded compound multi-receiver wiretap channel. The degraded compound multi-receiver wiretap channel consists of two groups of users and a group of eavesdroppers, where, if we pick an arbitrary user from each group of users and an arbitrary eavesdropper, they satisfy a certain Markov chain. We study two different communication scenarios for this channel. In the first scenario, the transmitter wants to send a confidential message to users in the first (stronger) group and a different confidential message to users in the second (weaker) group, where both messages need to be kept confidential from the eavesdroppers. For this scenario, we assume that there is only one eavesdropper. We obtain the secrecy capacity region for the general discrete memoryless channel model, the parallel channel model, and the Gaussian parallel channel model. For the Gaussian multiple-input multiple-output (MIMO) channel model, we obtain the secrecy capacity region when there is only one user in the second group. In the second scenario we study, the transmitter sends a confidential message to users in the first group which needs to be kept confidential from the second group of users and the eavesdroppers. Furthermore, the transmitter sends a different confidential message to users in the second group which needs to be kept confidential only from the eavesdroppers. For this scenario, we do not put any restriction on the number of eavesdroppers. As in the first scenario, we obtain the secrecy capacity region for the general discrete memoryless channel model, the parallel channel model, and the Gaussian parallel channel model. For the Gaussian MIMO channel model, we establish the secrecy capacity region when there is only one user in the second group.
(Show Context)

Citation Context

...essarily degraded, wiretap channels in [2]. In recent years, multi-user versions of the wiretap channel have attracted a considerable amount of research interest; see for example references [3-21] in =-=[3]-=-. Among all these extensions, two natural extensions of the wiretap channel to the multi-user setting are particularly of interest here: secure broadcasting and compound wiretap channels. Secure broad...

Capacity region of Gaussian MIMO broadcast channels with common and confidential messages. submitted to

by Ersen Ekrem, Student Member, Sennur Ulukus - IEEE Trans. Inf. Theory , 2010
"... Abstract—We study the two-user Gaussian multiple-input multiple-output (MIMO) broadcast channel with common and confidential messages. In this channel, the transmitter sends a common message to both users, and a confidential message to each user which needs to be kept perfectly secret from the other ..."
Abstract - Cited by 18 (2 self) - Add to MetaCart
Abstract—We study the two-user Gaussian multiple-input multiple-output (MIMO) broadcast channel with common and confidential messages. In this channel, the transmitter sends a common message to both users, and a confidential message to each user which needs to be kept perfectly secret from the other user. We obtain the entire capacity region of this channel. We also explore the connections between the capacity region we obtain for the Gaussian MIMO broadcast channel with common and confidential messages and the capacity region of its nonconfidential counterpart, i.e., the Gaussian MIMO broadcast channel with common and private messages, which is not known completely. Index Terms—Gaussian multiple-input multiple-output (MIMO) broadcast channel, secrecy capacity region. Gaussian MIMO broadcast channel with common and confidential mes-Fig. 1. sages. I.
(Show Context)

Citation Context

...m 1 for the aligned Gaussian MIMO broadcast channel. Then, we establish the capacity region for the general channel model in (1)-(2) by following the analysis in Section V.B of [6] and Section 7.1 of =-=[14]-=- in conjunction with the capacity result we obtain for the aligned channel. 2.2 Capacity Region under a Power Constraint We note that the covariance constraint on the channel input in (3) is a rather ...

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

by Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
"... This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, with-out rely ..."
Abstract - Cited by 18 (1 self) - Add to MetaCart
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, with-out relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical layer message authentication is also briefly introduced. The survey concludes with observations on potential research directions in this area.

Secured Communication over Frequency-Selective Fading Channels: A Practical Vandermonde Precoding

by Mari Kobayashi, Mérouane Debbah, Shlomo Shamai (Shitz) , 2009
"... In this paper, we study the frequency-selective broadcast channel with confidential messages (BCC) in which the transmitter sends a confidential message to receiver 1 and a common message to receivers 1 and 2. In the case of a block transmission of N symbols followed by a guard interval of L symbols ..."
Abstract - Cited by 17 (8 self) - Add to MetaCart
In this paper, we study the frequency-selective broadcast channel with confidential messages (BCC) in which the transmitter sends a confidential message to receiver 1 and a common message to receivers 1 and 2. In the case of a block transmission of N symbols followed by a guard interval of L symbols, the frequency-selective channel can be modeled as a N × (N + L) Toeplitz matrix. For this special type of multiple-input multiple-output (MIMO) channels, we propose a practical Vandermonde precoding that consists of projecting the confidential messages in the null space of the channel seen by receiver 2 while superposing the common message. For this scheme, we provide the achievable rate region, i.e. the rate-tuple of the common and confidential messages, and characterize the optimal covariance inputs for some special cases of interest. It is proved that the proposed scheme achieves the optimal degree of freedom (d.o.f) region. More specifically, it enables to send l ≤ L confidential messages and N − l common messages simultaneously over a block of N + L symbols. Interestingly, the proposed scheme can be applied to secured multiuser scenarios such as the K + 1-user frequency-selective BCC with K confidential messages and the two-user frequency-selective BCC with two confidential messages. For

MIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper: Secrecy degrees of freedom

by Xiang He, Ashish Khisti, Aylin Yener - IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY , 2013
"... A two-transmitter Gaussian multiple access wiretap channel with multiple antennas at each of the nodes is investigated. The channel matrices of the legitimate users are fixed and revealed to all the terminals, whereas the channel matrices of the eavesdropper are arbitrarily varying and only known t ..."
Abstract - Cited by 13 (5 self) - Add to MetaCart
A two-transmitter Gaussian multiple access wiretap channel with multiple antennas at each of the nodes is investigated. The channel matrices of the legitimate users are fixed and revealed to all the terminals, whereas the channel matrices of the eavesdropper are arbitrarily varying and only known to the eavesdropper. The secrecy degrees of freedom (s.d.o.f.) region under a strong secrecy constraint is characterized. A transmission scheme that orthogonalizes the transmit signals of the two users at the intended receiver, and uses a single-user wiretap code for each user, is shown to achieve the s.d.o.f. region. The converse involves establishing an upper bound on a weighted-sum-rate expression. This is accomplished by using induction, where at each step one combines the secrecy and multiple-access constraints associated with an adversary eavesdropping a carefully selected group of sub-channels.

Secrecy Capacity Region of the Gaussian Multi-Receiver Wiretap Channel

by Ersen Ekrem, Sennur Ulukus
"... Abstract — We consider the Gaussian multi-receiver wiretap channel and evaluate its secrecy capacity region. This evaluation requires the identification of underlying auxiliary random variables. For this purpose, we first visit the converse proof of the scalar Gaussian broadcast channel, and show th ..."
Abstract - Cited by 12 (1 self) - Add to MetaCart
Abstract — We consider the Gaussian multi-receiver wiretap channel and evaluate its secrecy capacity region. This evaluation requires the identification of underlying auxiliary random variables. For this purpose, we first visit the converse proof of the scalar Gaussian broadcast channel, and show that this proof cannot be extended to this secrecy context. The failure of this extension comes from the insufficiency of the entropypower inequality to resolve the ambiguity regarding the auxiliary random variables. Instead, we provide two converse proofs. The first one uses the alternative representation of the mutual information as an integration of the minimum-mean-square-error (MMSE) along with the properties of the MMSE. The second one uses the relationship between the differential entropy and the Fisher information via the de Bruin identity along with the properties of the Fisher information. I.
(Show Context)

Citation Context

...positive definite. The channel gain matrices {Hk} K k=1 ,HZ are of sizes {rk × t} K k=1 ,rZ ×t, respectively, and they are known to the transmitter, all legitimate users and the eavesdropper. In [1], =-=[2]-=-, we show that a variant of dirty-paper coding with Gaussian signals is optimal for these channels. To find the secrecy capacity region of the most general case in (57)-(58), we first obtain the secre...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University