Impact of Action-Dependent State and Channel Feedback on Gaussian Wiretap Channels

被引:16
作者
Dai, Bin [1 ]
Li, Chong [2 ]
Liang, Yingbin [3 ]
Ma, Zheng [1 ]
Shamai , Shlomo [4 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
[2] Nakamoto & Turing Labs, New York, NY 10018 USA
[3] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43220 USA
[4] Technion Israel Inst Technol, Dept Elect Engn, Technion, IL-32000 Haifa, Israel
基金
中国国家自然科学基金;
关键词
Transmitters; Channel models; Upper bound; Channel capacity; Receivers; Channel state information; Interference; Action-dependent channel; dirty paper channel; feedback; secrecy capacity; wiretap channel; BROADCAST CHANNELS; NOISE CHANNELS; CODING SCHEME; DIRTY PAPER; INFORMATION; CAPACITY; TAPE;
D O I
10.1109/TIT.2020.2967757
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We investigate the state-dependent Gaussian wiretap channel with noncausal channel state information at the transmitter (GWTC-N-CSIT), and explore whether three strategies (i.e., taking action on the state, legitimate receiver's channel output feedback, and combining the former two strategies together) help to enhance the secrecy capacity of the GWTC-N-CSIT. To be specific, we first determine the secrecy capacity of the GWTC-N-CSIT with noiseless feedback. Next, we derive lower and upper bounds on the secrecy capacity of the GWTC-N-CSIT with action-dependent state. Finally, we derive lower and upper bounds on the secrecy capacity of the GWTC-N-CSIT with both action-dependent state and noiseless feedback, and show that these bounds meet for a special case. Numerical results of this paper indicate that all three strategies enhance the secrecy capacity of the GWTC-N-CSIT. The study of this paper offers new options for enhancing the secrecy rates of the state-dependent wiretap channel models.
引用
收藏
页码:3435 / 3455
页数:21
相关论文
共 49 条
[21]   On the Secrecy Capacity of Wiretap Channels With Side Information at the Transmitter [J].
Fujita, Hachiro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) :2441-2452
[22]  
Gamal A., 2011, Network Information Theory
[23]  
Gel'fand S. I., 1980, Problems of Control and Information Theory, V9, P19
[24]  
Gunduz D., 2008, P IEEE GLOBECOM, P1
[25]   Wiretap Channels With Causal State Information: Strong Secrecy [J].
Han, Te Sun ;
Sasaki, Masahide .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (10) :6750-6765
[26]   Channel Coding in the Presence of Side Information [J].
Keshet, Guy ;
Steinberg, Yossef ;
Merhav, Neri .
FOUNDATIONS AND TRENDS IN COMMUNICATIONS AND INFORMATION THEORY, 2007, 4 (06) :445-586
[27]  
Kuznetsov N.V., 1974, PROBLEMY PEREDACHI I, V10, P52
[28]  
LEUNGYANCHEONG SK, 1978, IEEE T INFORM THEORY, V24, P451, DOI 10.1109/TIT.1978.1055917
[29]   Secrecy Capacity of Colored Gaussian Noise Channels With Feedback [J].
Li, Chong ;
Liang, Yingbin ;
Poor, H. Vincent ;
Shamai , Shlomo .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (09) :5771-5782
[30]   An Energy-Efficient Sleep Scheduling With QoS Consideration in 3GPP LTE-Advanced Networks for Internet of Things [J].
Liang, Jia-Ming ;
Chen, Jen-Jee ;
Cheng, Hung-Hsin ;
Tseng, Yu-Chee .
IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2013, 3 (01) :13-22