On secure signaling for the Gaussian Multiple Access Wire-Tap Channel

被引:0
|
作者
Tekin, Ender [1 ]
Serbetli, Semih [1 ]
Yener, Aylin [1 ]
机构
[1] Penn State Univ, Dept Elect Engn, Wireless Commun & Networking Lab, University Pk, PA 16802 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT) where multiple users communicate with the intended receiver in the presence of an intelligent and informed wire-tapper (eavesdropper). The wire-tapper receives a degraded version of the signal at the receiver. We assume that the wire-tapper is as capable as the intended receiver, and there is no other shared secret key. We consider two different secure communication scenarios: (i) keeping the wire-tapper totally ignorant of the message of any group of users even if the remaining users are compromised, (ii) using the secrecy of the other users to ensure secrecy for a group of users. We first derive the outer bounds for the secure rate region. Next, using Gaussian codebooks, we show the achievability of a secure rate region for each measure in which the wire-tapper is kept perfectly ignorant of the messages. We also find the power allocations that yield the maximum sum rate, and show that upper bound on the secure sum rate can be achieved by a TDMA scheme. We present numerical results showing the new rate region and compare it with that of the Gaussian Multiple-Access Channel (GMAC) with no secrecy constraints.
引用
收藏
页码:1747 / 1751
页数:5
相关论文
共 50 条
  • [41] The General Gaussian Multiple Access and Two-Way Wire-Tap Channels: Achievable Rates and Cooperative Jamming (vol 54, pg 2735, 2008)
    Tekin, Ender
    Yener, Aylin
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (09) : 4762 - 4763
  • [42] Asymptotic analysis of large MIMO wire-tap channel via replica method
    Wang, H. S.
    Zeng, G. H.
    2007 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY, VOLS 1-3, 2007, : 34 - 38
  • [43] Recent Results on Compound Wire-tap Channels
    Ling, Yingbin
    Kramer, Gerhard
    Poor, H. Vincent
    Shamai , Shlomo
    2008 IEEE 19TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2008, : 2678 - +
  • [44] Secure Degrees of Freedom Region of the Gaussian Multiple Access Wiretap Channel
    Xie, Jianwei
    Ulukus, Sennur
    2013 ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, 2013, : 293 - 297
  • [45] Protecting AES against side-channel analysis using wire-tap codes
    Bringer, Julien
    Chabanne, Herve
    Thanh Ha Le
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (02) : 129 - 141
  • [46] Wire-Tap Codes as Side-Channel Countermeasure - An FPGA-Based Experiment
    Moradi, Amir
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2014, 2014, 8885 : 341 - 359
  • [47] Secrecy Rate of the Amplify-and-Forward Relay Wire-Tap Channel in Rayleigh Fading
    Dang, Cuong
    Rodriguez, Leonardo J.
    Le, Duc-Anh
    Bao, Forrest Sheng
    Tran, Nghi H.
    MOBILE AND WIRELESS TECHNOLOGY 2015, 2015, 310 : 25 - 32
  • [48] Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis
    Baldi, Marco
    Bianchi, Marco
    Chiaraluce, Franco
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 883 - 894
  • [49] Flags of almost affine codes and the two-party wire-tap channel of type II
    Johnsen, Trygve
    Verdure, Hugues
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (09) : 2075 - 2090
  • [50] Flags of almost affine codes and the two-party wire-tap channel of type II
    Trygve Johnsen
    Hugues Verdure
    Designs, Codes and Cryptography, 2018, 86 : 2075 - 2090