14,590 research outputs found
Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper
We study the security of communication between a single transmitter and
multiple receivers in a broadcast channel in the presence of an eavesdropper.
We consider several special classes of channels. As the first model, we
consider the degraded multi-receiver wiretap channel where the legitimate
receivers exhibit a degradedness order while the eavesdropper is more noisy
with respect to all legitimate receivers. We establish the secrecy capacity
region of this channel model. Secondly, we consider the parallel multi-receiver
wiretap channel with a less noisiness order in each sub-channel, where this
order is not necessarily the same for all sub-channels. We establish the common
message secrecy capacity and sum secrecy capacity of this channel. Thirdly, we
study a special class of degraded parallel multi-receiver wiretap channels and
provide a stronger result. In particular, we study the case with two
sub-channels two users and one eavesdropper, where there is a degradedness
order in each sub-channel such that in the first (resp. second) sub-channel the
second (resp. first) receiver is degraded with respect to the first (resp.
second) receiver, while the eavesdropper is degraded with respect to both
legitimate receivers in both sub-channels. We determine the secrecy capacity
region of this channel. Finally, we focus on a variant of this previous channel
model where the transmitter can use only one of the sub-channels at any time.
We characterize the secrecy capacity region of this channel as well.Comment: Submitted to EURASIP Journal on Wireless Communications and
Networking (Special Issue on Wireless Physical Layer Security
Power Allocation in Multiuser Parallel Gaussian Broadcast Channels With Common and Confidential Messages
We consider a broadcast communication over parallel channels, where the transmitter sends K+1 messages: one common message to all users, and K confidential messages to each user, which need to be kept secret from all unintended users. We assume partial channel state information at the transmitter, stemming from noisy channel estimation. Our main goal is to design a power allocation algorithm in order to maximize the weighted sum rate of common and confidential messages under a total power constraint. The resulting problem for joint encoding across channels is formulated as the cascade of two problems, the inner min problem being discrete, and the outer max problem being convex. Thereby, efficient algorithms for this kind of optimization program can be used as solutions to our power allocation problem. For the special case K=2 , we provide an almost closed-form solution, where only two single variables must be optimized, e.g., through dichotomic searches. To reduce computational complexity, we propose three new algorithms, maximizing the weighted sum rate achievable by two suboptimal schemes that perform per-user and per-channel encoding. By numerical results, we assess the performance of all proposed algorithms as a function of different system parameters
Practical LDPC coded modulation schemes for the fading broadcast channel with confidential messages
The broadcast channel with confidential messages is a well studied scenario
from the theoretical standpoint, but there is still lack of practical schemes
able to achieve some fixed level of reliability and security over such a
channel. In this paper, we consider a quasi-static fading channel in which both
public and private messages must be sent from the transmitter to the receivers,
and we aim at designing suitable coding and modulation schemes to achieve such
a target. For this purpose, we adopt the error rate as a metric, by considering
that reliability (security) is achieved when a sufficiently low (high) error
rate is experienced at the receiving side. We show that some conditions exist
on the system feasibility, and that some outage probability must be tolerated
to cope with the fading nature of the channel. The proposed solution exploits
low-density parity-check codes with unequal error protection, which are able to
guarantee two different levels of protection against noise for the public and
the private information, in conjunction with different modulation schemes for
the public and the private message bits.Comment: 6 pages, 4 figures, to be presented at IEEE ICC'14 - Workshop on
Wireless Physical Layer Securit
LDPC coded transmissions over the Gaussian broadcast channel with confidential messages
We design and assess some practical low-density parity-check (LDPC) coded
transmission schemes for the Gaussian broadcast channel with confidential
messages (BCC). This channel model is different from the classical wiretap
channel model as the unauthorized receiver (Eve) must be able to decode some
part of the information. Hence, the reliability and security targets are
different from those of the wiretap channel. In order to design and assess
practical coding schemes, we use the error rate as a metric of the performance
achieved by the authorized receiver (Bob) and the unauthorized receiver (Eve).
We study the system feasibility, and show that two different levels of
protection against noise are required on the public and the secret messages.
This can be achieved in two ways: i) by using LDPC codes with unequal error
protection (UEP) of the transmitted information bits or ii) by using two
classical non-UEP LDPC codes with different rates. We compare these two
approaches and show that, for the considered examples, the solution exploiting
UEP LDPC codes is more efficient than that using non-UEP LDPC codes.Comment: 5 pages, 5 figures, to be presented at IEEE ICT 201
Multiple Access Channels with Generalized Feedback and Confidential Messages
This paper considers the problem of secret communication over a multiple
access channel with generalized feedback. Two trusted users send independent
confidential messages to an intended receiver, in the presence of a passive
eavesdropper. In this setting, an active cooperation between two trusted users
is enabled through using channel feedback in order to improve the communication
efficiency. Based on rate-splitting and decode-and-forward strategies,
achievable secrecy rate regions are derived for both discrete memoryless and
Gaussian channels. Results show that channel feedback improves the achievable
secrecy rates.Comment: To appear in the Proceedings of the 2007 IEEE Information Theory
Workshop on Frontiers in Coding Theory, Lake Tahoe, CA, September 2-6, 200
- …