On the Secrecy Rate Region for the Interference Channel

被引:0
|
作者
Koyluoglu, Onur Ozan [1 ]
El Gamal, Hesham [1 ]
机构
[1] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43210 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies interference channels with security constraints. The existence of an external eavesdropper in a two-user interference channel is assumed, where the network users would like to secure their messages from the external eavesdropper. The cooperative binning and channel prefixing scheme is proposed for this system model which allows users to cooperatively add randomness to the channel in order to degrade the observations of the external eavesdropper. This scheme allows users to add randomness to the channel in two ways: 1) Users cooperate in their design of the binning codebooks, and 2) Users cooperatively exploit the channel prefixing technique. As an example, the channel prefixing technique is exploited in the Gaussian case to transmit a superposition signal consisting of binning codewords and independently generated noise samples. Gains obtained form the cooperative binning and channel prefixing scheme compared to the single user scenario reveals the positive effect of interference in increasing the network security. Remarkably, interference can be exploited to cooperatively add randomness into the network in order to enhance the security.
引用
收藏
页码:2932 / 2936
页数:5
相关论文
共 50 条
  • [1] Secrecy Capacity Region of a Class of One-Sided Interference Channel
    Li, Zang
    Yates, Roy D.
    Trappe, Wade
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 379 - 383
  • [2] Secure Degrees of Freedom Region of the Gaussian Interference Channel with Secrecy Constraints
    Xie, Jianwei
    Ulukus, Sennur
    [J]. 2014 IEEE INFORMATION THEORY WORKSHOP (ITW), 2014, : 361 - 365
  • [3] The Secrecy Capacity region of fading Erasure Z interference channel with No CSIT
    Karmakar, Sanjay
    Ghosh, Anirban
    [J]. 2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2018,
  • [4] Research on the Secrecy Achievable Rate Region for the Broadcast channel with eavesdropper
    Zhu, Yan
    Chen, Xiao
    Zhou, Yongkai
    Li, Fangbiao
    Pang, Liang
    Yin, Xinxing
    Xue, Zhi
    [J]. PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 77 - 80
  • [5] On the Individual Secrecy Rate Region for the Broadcast Channel with an External Eavesdropper
    Chen, Yanling
    Koyluoglu, O. Ozan
    Sezgin, Aydin
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 1347 - 1351
  • [6] A NEW ACHIEVABLE RATE REGION FOR THE INTERFERENCE CHANNEL
    HAN, TS
    KOBAYASHI, K
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1981, 27 (01) : 49 - 60
  • [7] Secrecy Capacity Region of Fading Binary Z Interference Channel With Statistical CSIT
    Karmakar, Sanjay
    Ghosh, Anirban
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (04) : 848 - 857
  • [8] Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel
    Shah, Shahid Mehraj
    Sharma, Vinod
    [J]. 2015 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2015, : 759 - 764
  • [9] Competing for Secrecy in the MISO Interference Channel
    Fakoorian, S. Ali A.
    Swindlehurst, A. Lee
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (01) : 170 - 181
  • [10] On the secrecy of the cognitive interference channel with partial channel states
    Bafghi, Hamid G.
    Seyfe, Babak
    Mirmohseni, Mahtab
    Aref, Mohammad Reza
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2016, 27 (11): : 1472 - 1485