Secure Degrees of Freedom of One-Hop Wireless Networks With No Eavesdropper CSIT

被引:29
作者
Mukherjee, Pritam [1 ]
Xie, Jianwei [1 ,2 ]
Ulukus, Sennur [1 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[2] Google Inc, Mountain View, CA 94043 USA
关键词
Wiretap channel; multiple access channel; interference channel; secure degrees of freedom; channel state information; cooperative jamming; interference alignment; GAUSSIAN MULTIPLE-ACCESS; INTERFERENCE ALIGNMENT; FADING CHANNELS; TAP CHANNEL; SECRET COMMUNICATION; BROADCAST CHANNELS; WIRETAP CHANNELS; INFORMATION; MESSAGES; CAPACITY;
D O I
10.1109/TIT.2016.2618725
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider three channel models: the wiretap channel with M helpers, the K-user multiple access wiretap channel, and the K-user interference channel with an external eavesdropper, when no eavesdropper's channel state information (CSI) is available at the transmitters. In each case, we establish the optimal sum secure degrees of freedom (s.d.o.f.) by providing achievable schemes and matching converses. We show that the unavailability of the eavesdropper's channel state information at the transmitter (CSIT) does not reduce the s.d.o.f. of the wiretap channel with helpers. However, there is loss in s.d.o.f. for both the multiple access wiretap channel and the interference channel with an external eavesdropper. In particular, we show that in the absence of eavesdropper's CSIT, the K-user multiple access wiretap channel reduces to a wiretap channel with (K - 1) helpers from a sum s.d.o.f. perspective, and the optimal sum s.d.o.f. reduces from K(K-1)/K(K-1)+1 to K-1/K. For the interference channel with an external eavesdropper, the optimal sum s.d.o.f. decreases from K(K-1)/2K-1 to K-1/2 in the absence of the eavesdropper's CSIT. Our results show that the lack of eavesdropper's CSIT does not have a significant impact on the optimal s.d.o.f. for any of the three channel models, especially when the number of users is large. This implies that physical layer security can be made robust to the unavailability of eavesdropper CSIT at high signal-to-noise ratio regimes by the careful modification of the achievable schemes as demonstrated in this paper.
引用
收藏
页码:1898 / 1922
页数:25
相关论文
共 34 条
[1]  
[Anonymous], ALIGNED IMAGE SETS C
[2]   Wireless Network Information Flow: A Deterministic Approach [J].
Avestimehr, A. Salman ;
Diggavi, Suhas N. ;
Tse, David N. C. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (04) :1872-1905
[3]   Ergodic Secret Alignment [J].
Bassily, Raef ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (03) :1594-1611
[4]   The two-user Gaussian interference channel: a deterministic view [J].
Bresler, Guy ;
Tse, David .
EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2008, 19 (04) :333-354
[5]   Interference alignment and degrees of freedom of the K-user interference channel [J].
Cadambe, Viveck R. ;
Jafar, Syed Ali .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (08) :3425-3441
[6]   Interference Alignment and the Degrees of Freedom of Wireless X Networks [J].
Cadambe, Viveck R. ;
Jafar, Syed A. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (09) :3893-3908
[7]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[8]   Capacity of fading channels with channel side information [J].
Goldsmith, AJ ;
Varaiya, PP .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1997, 43 (06) :1986-1992
[9]   On the secrecy capacity of fading channels [J].
Gopala, Praveen Kumar ;
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (10) :4687-4698
[10]   MIMO Wiretap Channels With Unknown and Varying Eavesdropper Channel States [J].
He, Xiang ;
Yener, Aylin .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (11) :6844-6869