237 research outputs found
Secrecy Capacity Region of Some Classes of Wiretap Broadcast Channels
This work investigates the secrecy capacity of the Wiretap Broadcast Channel
(WBC) with an external eavesdropper where a source wishes to communicate two
private messages over a Broadcast Channel (BC) while keeping them secret from
the eavesdropper. We derive a non-trivial outer bound on the secrecy capacity
region of this channel which, in absence of security constraints, reduces to
the best known outer bound to the capacity of the standard BC. An inner bound
is also derived which follows the behavior of both the best known inner bound
for the BC and the Wiretap Channel. These bounds are shown to be tight for the
deterministic BC with a general eavesdropper, the semi-deterministic BC with a
more-noisy eavesdropper and the Wiretap BC where users exhibit a less-noisiness
order between them. Finally, by rewriting our outer bound to encompass the
characteristics of parallel channels, we also derive the secrecy capacity
region of the product of two inversely less-noisy BCs with a more-noisy
eavesdropper. We illustrate our results by studying the impact of security
constraints on the capacity of the WBC with binary erasure (BEC) and binary
symmetric (BSC) components.Comment: 19 pages, 8 figures, To appear in IEEE Trans. on Information Theor
Secure Communication over Parallel Relay Channel
We investigate the problem of secure communication over parallel relay
channel in the presence of a passive eavesdropper. We consider a four terminal
relay-eavesdropper channel which consists of multiple relay-eavesdropper
channels as subchannels. For the discrete memoryless model, we establish outer
and inner bounds on the rate-equivocation region. The inner bound allows mode
selection at the relay. For each subchannel, secure transmission is obtained
through one of two coding schemes at the relay: decoding-and-forwarding the
source message or confusing the eavesdropper through noise injection. For the
Gaussian memoryless channel, we establish lower and upper bounds on the perfect
secrecy rate. Furthermore, we study a special case in which the relay does not
hear the source and show that under certain conditions the lower and upper
bounds coincide. The results established for the parallel Gaussian
relay-eavesdropper channel are then applied to study the fading
relay-eavesdropper channel. Analytical results are illustrated through some
numerical examples.Comment: To Appear in IEEE Transactions on Information Forensics and Securit
Strongly Secure Communications Over the Two-Way Wiretap Channel
We consider the problem of secure communications over the two-way wiretap
channel under a strong secrecy criterion. We improve existing results by
developing an achievable region based on strategies that exploit both the
interference at the eavesdropper's terminal and cooperation between legitimate
users. We leverage the notion of channel resolvability for the multiple-access
channel to analyze cooperative jamming and we show that the artificial noise
created by cooperative jamming induces a source of common randomness that can
be used for secret-key agreement. We illustrate the gain provided by this
coding technique in the case of the Gaussian two-way wiretap channel, and we
show significant improvements for some channel configurations.Comment: 11 pages, 7 figures, submitted to IEEE Transactions on Information
Forensics and Security, Special Issue: "Using the Physical Layer for Securing
the Next Generation of Communication Systems
- …