MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom

被引:48
作者
He, Xiang [1 ]
Khisti, Ashish [2 ]
Yener, Aylin [1 ]
机构
[1] Penn State Univ, Dept Elect Engn, University Pk, PA 16802 USA
[2] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
基金
加拿大自然科学与工程研究理事会; 美国国家科学基金会;
关键词
Arbitrarily varying channel; information theoretic security; MIMO multiple access wiretap channel; secrecy degrees of freedom; SECURE TRANSMISSION; BROADCAST CHANNELS; WIRETAP CHANNELS; CAPACITY;
D O I
10.1109/TIT.2013.2256952
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A two-transmitter Gaussian multiple access wiretap channel with multiple antennas at each of the nodes is investigated. The channel matrices of the legitimate users are fixed and revealed to all the terminals, whereas the channel matrices of the eavesdropper are arbitrarily varying and only known to the eavesdropper. The secrecy degrees of freedom (s.d.o.f.) region under a strong secrecy constraint is characterized. A transmission scheme that orthogonalizes the transmit signals of the two users at the intended receiver, and uses a single-user wiretap code for each user, is shown to achieve the s.d.o.f. region. The converse involves establishing an upper bound on a weighted-sum-rate expression. This is accomplished by using induction, where at each step one combines the secrecy and multiple-access constraints associated with an adversary eavesdropping a carefully selected group of sub-channels.
引用
收藏
页码:4733 / 4745
页数:13
相关论文
共 39 条
[1]  
[Anonymous], 2011, INFORM THEORY CODING, DOI DOI 10.1017/CBO9780511921889
[2]  
[Anonymous], 2011, Physical-layer security:from information theory to security engineering, DOI DOI 10.1017/CBO9780511977985
[3]  
[Anonymous], MIMO WIRETAP CHANNEL
[4]   On the Secure DoF of the Single-Antenna MAC [J].
Bagherikaram, Ghadamali ;
Motahari, Abolfazl S. ;
Khandani, Amir K. .
2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, :2588-2592
[5]  
Bellare M., 2012, POLYNOMIAL TIME SEMA
[6]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[7]   The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel [J].
Ekrem, Ersen ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (04) :2083-2114
[8]   On the Secrecy of Multiple Access Wiretap Channel [J].
Ekrem, Ersen ;
Ulukus, Sennur .
2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, :1014-1021
[9]  
Ekrem Ersen., 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS), P1
[10]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189