Secure Degrees of Freedom of K-User Gaussian Interference Channels: A Unified View
نویسندگان
چکیده
We determine the exact sum secure degrees of freedom (d.o.f.) of the K -user Gaussian interference channel. We consider three different secrecy constraints: 1) K -user interference channel with one external eavesdropper (IC-EE); 2) K -user interference channel with confidential messages (IC-CM); and 3) K -user interference channel with confidential messages and one external eavesdropper (IC-CM-EE). We show that for all of these three cases, the exact sum secure d.o.f. is K(K − 1)/(2K − 1). We show converses for IC-EE and IC-CM, which imply a converse for IC-CM-EE. We show achievability for IC-CM-EE, which implies achievability for IC-EE and IC-CM. Our converse is based on developing a direct relationship between the differential entropies of the channel inputs and the rates of the users, and quantifying the effect of eavesdropping on the rates in terms of the differential entropies of the eavesdroppers’ observations. Our achievability is based on structured signaling, structured cooperative jamming, channel prefixing, and asymptotic real interference alignment. While the traditional interference alignment provides some amount of secrecy by mixing unintended signals in a smaller subspace at every receiver, in order to attain the optimum sum secure d.o.f., we incorporate structured cooperative jamming into the achievable scheme, and intricately design the structure of all of the transmitted signals jointly.
منابع مشابه
Strong Secrecy for Interference Channels: Achievable Rate Region and Degrees of Freedom
The achievable rate region and degrees of freedom are studied for interference channels with confidential messages under strong secrecy constraints. The problem is studied based on the framework of Han and Verdú’s channel resolvability theory. It is shown that if the random binning rate for securing a confidential message is slightly above the resolution of its corresponding wiretapped channel,...
متن کاملOn the Secure Degrees of Freedom of the K-user MAC and 2-user Interference Channels
We investigate the secure degrees of freedom (SDoF) of the K-user MIMO multiple access (MAC) and the two user MIMO interference channel. An unknown number of eavesdroppers are trying to decode the messages sent by the transmitters. Each eavesdropper is equipped with a number of antennas less than or equal to a known value NE . The legitimate transmitters and receivers are assumed to have global...
متن کاملThe Expected Achievable Distortion of Two-User Decentralized Interference Channels
This paper concerns the transmission of two independent Gaussian sources over a two-user decentralized interference channel, assuming that the transmitters are unaware of the instantaneous CSIs. The availability of the channel state information at receivers (CSIR) is considered in two scenarios of perfect and imperfect CSIR. In the imperfect CSIR case, we consider a more practical assumption of...
متن کاملDegrees of Freedom of the K User M×N MIMO Interference Channel
We provide inner bound and outer bound for the total number of degrees of freedom of the K user multiple input multiple output (MIMO) Gaussian interference channel with M antennas at each transmitter and N antennas at each receiver if the channel coefficients are time-varying and drawn from a continuous distribution. The bounds are tight when the ratio max(M,N) min(M,N) = R is equal to an integ...
متن کاملDegrees of Freedom of the K User M times N MIMO Interference Channel
We provide innerbound and outerbound for the total number of degrees of freedom of the K user multiple input multiple output (MIMO) Gaussian interference channel with M antennas at each transmitter and N antennas at each receiver if the channel coefficients are time-varying and drawn from a continuous distribution. The bounds are tight when the ratio max(M,N) min(M,N) = R is equal to an integer...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Trans. Information Theory
دوره 61 شماره
صفحات -
تاریخ انتشار 2015