Abstract
This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any jamming strategy subject to a given power constraint and shares her jamming signal with the eavesdropper. Four such models are considered: (i) the Gaussian point-to-point wiretap channel; (ii) the Gaussian multiple-access wiretap channel; (iii) the Gaussian broadcast wiretap channel; and (iv) the Gaussian symmetric interference wiretap channel. The use of pre-shared randomness between the legitimate users is not allowed in our models. Inner and outer bounds are derived for these four models. For (i), the secrecy capacity is obtained. For (ii) and (iv) under a degraded setup, the optimal secrecy sum-rate is characterized. Finally, for (iii), ranges of model parameter values for which the inner and outer bounds coincide are identified.
Subject
General Physics and Astronomy
Reference35 articles.
1. Capacity of the Gaussian arbitrarily varying channel;IEEE Trans. Inf. Theory,1991
2. The Gaussian wire-tap channel;IEEE Trans. Inf. Theory,1978
3. The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming;IEEE Trans. Inf. Theory,2008
4. Bagherikaram, G., Motahari, A.S., and Khandani, A.K. (2008, January 23–26). Secure broadcasting: The secrecy rate region. Proceedings of the Communication, Control, and Computing, 2008 46th Annual Allerton Conference, Monticello, IL, USA.
5. Rate-splitting multiple access for discrete memoryless channels;IEEE Trans. Inf. Theory,2001
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献