11 research outputs found
State-Dependent Relay Channel with Private Messages with Partial Causal and Non-Causal Channel State Information
In this paper, we introduce a discrete memoryless State-Dependent Relay
Channel with Private Messages (SD-RCPM) as a generalization of the
state-dependent relay channel. We investigate two main cases: SD-RCPM with
non-causal Channel State Information (CSI), and SD-RCPM with causal CSI. In
each case, it is assumed that partial CSI is available at the source and relay.
For non-causal case, we establish an achievable rate region using
Gel'fand-Pinsker type coding scheme at the nodes informed of CSI, and
Compress-and-Forward (CF) scheme at the relay. Using Shannon's strategy and CF
scheme, an achievable rate region for causal case is obtained. As an example,
the Gaussian version of SD-RCPM is considered, and an achievable rate region
for Gaussian SD-RCPM with non-causal perfect CSI only at the source, is
derived. Providing numerical examples, we illustrate the comparison between
achievable rate regions derived using CF and Decode-and-Forward (DF) schemes.Comment: 5 pages, 2 figures, to be presented at the IEEE International
Symposium on Information Theory (ISIT 2010), Austin, Texas, June 201
Compound Multiple Access Channel with Confidential Messages
In this paper, we study the problem of secret communication over a Compound
Multiple Access Channel (MAC). In this channel, we assume that one of the
transmitted messages is confidential that is only decoded by its corresponding
receiver and kept secret from the other receiver. For this proposed setting
(compound MAC with confidential messages), we derive general inner and outer
bounds on the secrecy capacity region. Also, as examples, we investigate 'Less
noisy' and 'Gaussian' versions of this channel, and extend the results of the
discrete memoryless version to these cases. Moreover, providing numerical
examples for the Gaussian case, we illustrate the comparison between achievable
rate regions of compound MAC and compound MAC with confidential messages.Comment: Accepted at IEEE ICC 2014. arXiv admin note: substantial text overlap
with arXiv:1402.479
Secrecy performance analysis of IRS-NOMA systems
Abstract In this paper, we propose to utilize an intelligent reflecting surface (IRS) as a promising technology to enhance the coverage and physical layer security of non-orthogonal multiple access (NOMA) system. In particular, an IRS-assisted NOMA system is considered with the aid of careful channel ordering of the NOMA users, in which the transmitter sends superposed signals to multiple legitimate users by virtue of the IRS in the presence of multiple eavesdroppers. Meanwhile, the secrecy performance of the IRS-assisted NOMA system is investigated under two wiretapping cases: non-colluding and colluding external eavesdroppers. In the non-colluding case, eavesdroppers operate independently, while in the colluding case, every eavesdroppers can combine their observations to decode the messages. To this end, we derive the approximate closed-form expressions for the secrecy outage probability (SOP) and the asymptotic SOP for each wiretapping case. Also, we assume that the phase of the IRS elements is set by using the ON–OFF control method. Based on analytical results, we show that the secrecy diversity order of the IRS-NOMA at legitimate users is in connection with the number of reflecting elements. From the numerical results, it can be seen that the IRS-NOMA can achieve superior secrecy performance with increasing the number of reflecting elements of the IRS. However, we also find out that using the finite ON state reflective elements can improve the secrecy performance. Actually, increasing the number of ON state reflective elements above five has a negative effect on the system’s secrecy performance