6,281 research outputs found
Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure
The sum secure degrees of freedom (s.d.o.f.) of two fundamental multi-user
network structures, the K-user Gaussian multiple access (MAC) wiretap channel
and the K-user interference channel (IC) with secrecy constraints, have been
determined recently as K(K-1)/(K(K-1)+1) [1,2] and K(K-1)/(2K-1) [3,4],
respectively. In this paper, we determine the entire s.d.o.f. regions of these
two channel models. The converse for the MAC follows from a middle step in the
converse of [1,2]. The converse for the IC includes constraints both due to
secrecy as well as due to interference. Although the portion of the region
close to the optimum sum s.d.o.f. point is governed by the upper bounds due to
secrecy constraints, the other portions of the region are governed by the upper
bounds due to interference constraints. Different from the existing literature,
in order to fully understand the characterization of the s.d.o.f. region of the
IC, one has to study the 4-user case, i.e., the 2 or 3-user cases do not
illustrate the generality of the problem. In order to prove the achievability,
we use the polytope structure of the converse region. In both MAC and IC cases,
we develop explicit schemes that achieve the extreme points of the polytope
region given by the converse. Specifically, the extreme points of the MAC
region are achieved by an m-user MAC wiretap channel with (K-m) helpers, i.e.,
by setting (K-m) users' secure rates to zero and utilizing them as pure
(structured) cooperative jammers. The extreme points of the IC region are
achieved by a (K-m)-user IC with confidential messages, m helpers, and N
external eavesdroppers, for m>=1 and a finite N. A byproduct of our results in
this paper is that the sum s.d.o.f. is achieved only at one extreme point of
the s.d.o.f. region, which is the symmetric-rate extreme point, for both MAC
and IC channel models.Comment: Submitted to IEEE Transactions on Information Theory, April 201
Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling
In this work, we prove that a positive secure degree of freedom is achievable
for a large class of Gaussian channels as long as the channel is not degraded
and the channel is fully connected. This class includes the MAC wire-tap
channel, the 2-user interference channel with confidential messages, the 2-user
interference channel with an external eavesdropper. Best known achievable
schemes to date for these channels use Gaussian signaling. In this work, we
show that structured codes outperform Gaussian random codes at high SNR when
channel gains are real numbers.Comment: 6 pages, Submitted to IEEE Globecom, March 200
On the Secure DoF of the Single-Antenna MAC
A new achievability rate region for the secure discrete memoryless
Multiple-Access-Channel (MAC) is presented. Thereafter, a novel secure coding
scheme is proposed to achieve a positive Secure Degrees-of-Freedom (S-DoF) in
the single-antenna MAC. This scheme converts the single-antenna system into a
multiple-dimension system with fractional dimensions. The achievability scheme
is based on the alignment of signals into a small sub-space at the
eavesdropper, and the simultaneous separation of the signals at the intended
receiver. Tools from the field of Diophantine Approximation in number theory
are used to analyze the probability of error in the coding scheme.Comment: 5 Pages, Submitted to ISIT 201
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
- …