Strong Secrecy for Interference Channels: Achievable Rate Region and Degrees of Freedom
نویسندگان
چکیده
The achievable rate region and degrees of freedom are studied for interference channels with confidential messages under strong secrecy constraints. The problem is studied based on the framework of Han and Verdú’s channel resolvability theory. It is shown that if the random binning rate for securing a confidential message is slightly above the resolution of its corresponding wiretapped channel, strong secrecy can be guaranteed. At first, the information-spectrum method introduced by Han and Verdú is generalized to an arbitrary interference channel to obtain a direct channel resolvability result. After specifying the channel transition probability, the derived resolvability results are shown to be the achievable strong secrecy rates for the stationary and memoryless interference channel. As an application, the secure degrees of freedom (SDOF) for the K-user Gaussian interference channel with confidential messages are investigated under strong secrecy constraints. It is shown that the optimal SDOF of the considered network is K−1 2K−1 for each user, which equals to its counterpart with weak secrecy constraints. The optimal SDOF scheme is achieved by combining the resolvability-based secrecy coding and artificial noise alignment on the real line. A suboptimal ergodic secure alignment is also proposed for the time-varying interference channels to achieve a sum SDOF of K−3 2K−2 for each user. Following the footsteps of Hayashi and of Bloch and Laneman, our results provide further evidence that channel resolvability can be a powerful and general framework for strong secrecy analysis in multiuser networks.
منابع مشابه
Achievable Secrecy Rate Regions of State Dependent Causal Cognitive Interference Channel
In this paper, the secrecy problem in the state dependent causal cognitive interference channel is studied. The channel state is non-causally known at the cognitive encoder. The message of the cognitive encoder must be kept secret from the primary receiver. We use a coding scheme which is a combination of compress-and-forward strategy with Marton coding, Gel’fand-Pinsker coding and Wyner’s wire...
متن کاملOn The Secrecy of the Cognitive Interference Channel with Channel State
In this paper the secrecy problem in the cognitive state-dependent interference channel is considered. In this scenario we have a primary and a cognitive transmitter-receiver pairs. The cognitive transmitter has the message of the primary sender as side information. In addition, the state of the channel is known at the cognitive encoder. Hence, the cognitive encoder uses this side information t...
متن کاملSecrecy Rate Region of Wiretap Interference Channels with Energy Harvesting Receivers
The secrecy rate region of wiretap interference channels under receiver energy harvesting constraint is studied. The legitimate users are equipped with single transmit/receive antennas, while the passive eavesdropper has multiple antennas. To stay operational in the network, the legitimate receivers demand energy alongside information, which is fulfilled by power transmission and exploiting a p...
متن کاملRate Regions for Multicarrier Point-to-Multipoint Transmission over Channels with Intersymbol Interference
Point-to-multipoint (downlink) transmission from a central base station to multiple spatially scattered receivers over frequency-selective channels is considered. Multiple-input/multiple-output multicarrier transmission with spatial Tomlinson-Harashima precoding per carrier is compared to other transmission schemes in terms of the achievable rate regions. To derive the rate regions the respecti...
متن کاملOn the Secrecy Capacity Region of the 2-user Z Interference Channel with Unidirectional Transmitter Cooperation
In this work, the role of unidirectional limited rate transmitter cooperation is studied in the case of the 2user Z interference channel (Z-IC) with secrecy constraints at the receivers, on achieving two conflicting goals simultaneously: mitigating interference and ensuring secrecy. First, the problem is studied under the linear deterministic model. The achievable schemes for the deterministic ...
متن کامل