11 research outputs found

    State-Dependent Relay Channel with Private Messages with Partial Causal and Non-Causal Channel State Information

    Full text link
    In this paper, we introduce a discrete memoryless State-Dependent Relay Channel with Private Messages (SD-RCPM) as a generalization of the state-dependent relay channel. We investigate two main cases: SD-RCPM with non-causal Channel State Information (CSI), and SD-RCPM with causal CSI. In each case, it is assumed that partial CSI is available at the source and relay. For non-causal case, we establish an achievable rate region using Gel'fand-Pinsker type coding scheme at the nodes informed of CSI, and Compress-and-Forward (CF) scheme at the relay. Using Shannon's strategy and CF scheme, an achievable rate region for causal case is obtained. As an example, the Gaussian version of SD-RCPM is considered, and an achievable rate region for Gaussian SD-RCPM with non-causal perfect CSI only at the source, is derived. Providing numerical examples, we illustrate the comparison between achievable rate regions derived using CF and Decode-and-Forward (DF) schemes.Comment: 5 pages, 2 figures, to be presented at the IEEE International Symposium on Information Theory (ISIT 2010), Austin, Texas, June 201

    Compound Multiple Access Channel with Confidential Messages

    Full text link
    In this paper, we study the problem of secret communication over a Compound Multiple Access Channel (MAC). In this channel, we assume that one of the transmitted messages is confidential that is only decoded by its corresponding receiver and kept secret from the other receiver. For this proposed setting (compound MAC with confidential messages), we derive general inner and outer bounds on the secrecy capacity region. Also, as examples, we investigate 'Less noisy' and 'Gaussian' versions of this channel, and extend the results of the discrete memoryless version to these cases. Moreover, providing numerical examples for the Gaussian case, we illustrate the comparison between achievable rate regions of compound MAC and compound MAC with confidential messages.Comment: Accepted at IEEE ICC 2014. arXiv admin note: substantial text overlap with arXiv:1402.479

    Secrecy performance analysis of IRS-NOMA systems

    No full text
    Abstract In this paper, we propose to utilize an intelligent reflecting surface (IRS) as a promising technology to enhance the coverage and physical layer security of non-orthogonal multiple access (NOMA) system. In particular, an IRS-assisted NOMA system is considered with the aid of careful channel ordering of the NOMA users, in which the transmitter sends superposed signals to multiple legitimate users by virtue of the IRS in the presence of multiple eavesdroppers. Meanwhile, the secrecy performance of the IRS-assisted NOMA system is investigated under two wiretapping cases: non-colluding and colluding external eavesdroppers. In the non-colluding case, eavesdroppers operate independently, while in the colluding case, every eavesdroppers can combine their observations to decode the messages. To this end, we derive the approximate closed-form expressions for the secrecy outage probability (SOP) and the asymptotic SOP for each wiretapping case. Also, we assume that the phase of the IRS elements is set by using the ON–OFF control method. Based on analytical results, we show that the secrecy diversity order of the IRS-NOMA at legitimate users is in connection with the number of reflecting elements. From the numerical results, it can be seen that the IRS-NOMA can achieve superior secrecy performance with increasing the number of reflecting elements of the IRS. However, we also find out that using the finite ON state reflective elements can improve the secrecy performance. Actually, increasing the number of ON state reflective elements above five has a negative effect on the system’s secrecy performance

    Secrecy Sum-Rate Enhancement in the Interference Channel via Price-Based Power Splitting

    No full text
    corecore