331 research outputs found
Secrecy Capacity Region of Some Classes of Wiretap Broadcast Channels
This work investigates the secrecy capacity of the Wiretap Broadcast Channel
(WBC) with an external eavesdropper where a source wishes to communicate two
private messages over a Broadcast Channel (BC) while keeping them secret from
the eavesdropper. We derive a non-trivial outer bound on the secrecy capacity
region of this channel which, in absence of security constraints, reduces to
the best known outer bound to the capacity of the standard BC. An inner bound
is also derived which follows the behavior of both the best known inner bound
for the BC and the Wiretap Channel. These bounds are shown to be tight for the
deterministic BC with a general eavesdropper, the semi-deterministic BC with a
more-noisy eavesdropper and the Wiretap BC where users exhibit a less-noisiness
order between them. Finally, by rewriting our outer bound to encompass the
characteristics of parallel channels, we also derive the secrecy capacity
region of the product of two inversely less-noisy BCs with a more-noisy
eavesdropper. We illustrate our results by studying the impact of security
constraints on the capacity of the WBC with binary erasure (BEC) and binary
symmetric (BSC) components.Comment: 19 pages, 8 figures, To appear in IEEE Trans. on Information Theor
Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper
We study the security of communication between a single transmitter and
multiple receivers in a broadcast channel in the presence of an eavesdropper.
We consider several special classes of channels. As the first model, we
consider the degraded multi-receiver wiretap channel where the legitimate
receivers exhibit a degradedness order while the eavesdropper is more noisy
with respect to all legitimate receivers. We establish the secrecy capacity
region of this channel model. Secondly, we consider the parallel multi-receiver
wiretap channel with a less noisiness order in each sub-channel, where this
order is not necessarily the same for all sub-channels. We establish the common
message secrecy capacity and sum secrecy capacity of this channel. Thirdly, we
study a special class of degraded parallel multi-receiver wiretap channels and
provide a stronger result. In particular, we study the case with two
sub-channels two users and one eavesdropper, where there is a degradedness
order in each sub-channel such that in the first (resp. second) sub-channel the
second (resp. first) receiver is degraded with respect to the first (resp.
second) receiver, while the eavesdropper is degraded with respect to both
legitimate receivers in both sub-channels. We determine the secrecy capacity
region of this channel. Finally, we focus on a variant of this previous channel
model where the transmitter can use only one of the sub-channels at any time.
We characterize the secrecy capacity region of this channel as well.Comment: Submitted to EURASIP Journal on Wireless Communications and
Networking (Special Issue on Wireless Physical Layer Security
Wiretap and Gelfand-Pinsker Channels Analogy and its Applications
An analogy framework between wiretap channels (WTCs) and state-dependent
point-to-point channels with non-causal encoder channel state information
(referred to as Gelfand-Pinker channels (GPCs)) is proposed. A good sequence of
stealth-wiretap codes is shown to induce a good sequence of codes for a
corresponding GPC. Consequently, the framework enables exploiting existing
results for GPCs to produce converse proofs for their wiretap analogs. The
analogy readily extends to multiuser broadcasting scenarios, encompassing
broadcast channels (BCs) with deterministic components, degradation ordering
between users, and BCs with cooperative receivers. Given a wiretap BC (WTBC)
with two receivers and one eavesdropper, an analogous Gelfand-Pinsker BC (GPBC)
is constructed by converting the eavesdropper's observation sequence into a
state sequence with an appropriate product distribution (induced by the
stealth-wiretap code for the WTBC), and non-causally revealing the states to
the encoder. The transition matrix of the state-dependent GPBC is extracted
from WTBC's transition law, with the eavesdropper's output playing the role of
the channel state. Past capacity results for the semi-deterministic (SD) GPBC
and the physically-degraded (PD) GPBC with an informed receiver are leveraged
to furnish analogy-based converse proofs for the analogous WTBC setups. This
characterizes the secrecy-capacity regions of the SD-WTBC and the PD-WTBC, in
which the stronger receiver also observes the eavesdropper's channel output.
These derivations exemplify how the wiretap-GP analogy enables translating
results on one problem into advances in the study of the other
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Strong secrecy on a class of degraded broadcast channels using polar codes
Two polar coding schemes are proposed for the degraded
broadcast channel under different reliability and secrecy
requirements. In these settings, the transmitter wishes to send
multiple messages to a set of legitimate receivers keeping them
masked from a set of eavesdroppers, and individual channels are
assumed to gradually degrade in such a way that each legitimate
receiver has a better channel than any eavesdropper. The layered
decoding structure requires receivers with better channel quality
to reliably decode more messages, while the layered secrecy
structure requires eavesdroppers with worse channel quality to
be kept ignorant of more messages.Postprint (author's final draft
- …