On the Secrecy Rate Region for the Interference Channel

被引:0
|
作者
Koyluoglu, Onur Ozan [1 ]
El Gamal, Hesham [1 ]
机构
[1] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43210 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies interference channels with security constraints. The existence of an external eavesdropper in a two-user interference channel is assumed, where the network users would like to secure their messages from the external eavesdropper. The cooperative binning and channel prefixing scheme is proposed for this system model which allows users to cooperatively add randomness to the channel in order to degrade the observations of the external eavesdropper. This scheme allows users to add randomness to the channel in two ways: 1) Users cooperate in their design of the binning codebooks, and 2) Users cooperatively exploit the channel prefixing technique. As an example, the channel prefixing technique is exploited in the Gaussian case to transmit a superposition signal consisting of binning codewords and independently generated noise samples. Gains obtained form the cooperative binning and channel prefixing scheme compared to the single user scenario reveals the positive effect of interference in increasing the network security. Remarkably, interference can be exploited to cooperatively add randomness into the network in order to enhance the security.
引用
收藏
页码:2932 / 2936
页数:5
相关论文
共 50 条
  • [21] On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Noncausal Side Information
    Sonee, Amir
    Hodtani, Ghosheh Abed
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) : 1151 - 1166
  • [22] A New Achievable Ergodic Secrecy Rate Region for the Fading Multiple Access Wiretap Channel
    Bassily, Raef
    Ulukus, Sennur
    [J]. 2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, : 819 - 826
  • [23] Secrecy in Broadcast Channel with Combating Helpers and Interference Channel with Selfish Users
    Banawan, Karim
    Ulukus, Sennur
    [J]. 2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 2444 - 2448
  • [24] Secrecy Games on the One-Sided Interference Channel
    Xie, Jianwei
    Ulukus, Sennur
    [J]. 2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2011, : 1245 - 1249
  • [25] Strong Secrecy for Interference Channels from Channel Resolvability
    Wang, Zhao
    Schaefer, Rafael F.
    Skoglund, Mikael
    Poor, H. Vincent
    Xiao, Ming
    [J]. 2015 49TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, 2015, : 559 - 563
  • [26] Strong Secrecy for Interference Channels Based on Channel Resolvability
    Wang, Zhao
    Schaefer, Rafael F.
    Skoglund, Mikael
    Xiao, Ming
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (07) : 5110 - 5130
  • [27] Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers
    Chu, Zheng
    Xing, Hong
    Johnston, Martin
    Le Goff, Stephane
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) : 283 - 297
  • [28] SECRECY RATE OPTIMIZATION FOR A MIMO SECRECY CHANNEL BASED ON STACKELBERG GAME
    Chu, Zheng
    Cuntanan, Kanapathippillai
    Ding, Zhiguo
    Johnston, Martin
    Le Goff, Stephane
    [J]. 2014 PROCEEDINGS OF THE 22ND EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2014, : 126 - 130
  • [29] On the Secrecy Capacity Region of the Wiretap Broadcast Channel
    Benammar, Meryem
    Piantanida, Pablo
    [J]. 2014 IEEE INFORMATION THEORY WORKSHOP (ITW), 2014, : 421 - 425
  • [30] On the Secrecy Capacity Region of the Two-User Symmetric Z Interference Channel With Unidirectional Transmitter Cooperation
    Mohapatra, Parthajit
    Murthy, Chandra R.
    Lee, Jemin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) : 572 - 587