Multiple access wiretap channel with noiseless feedback

被引:1
作者
Dai, Bin [1 ,2 ]
Ma, Zheng [1 ]
机构
[1] Southwest JiaoTong Univ, Sch Informat Sci & Technol, Chengdu 610031, Sichuan, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
radiocommunication; telecommunication security; decode and forward communication; multiple access wiretap channel; noiseless feedback; physical layer security; wireless communication systems; legitimate receiver; noiseless channels; secrecy capacity region; decode-and-forward inner bound; feedback model; DF; independent transmitters; secret keys; sato-type outer bound; Gaussian MAC-WT; CONFIDENTIAL MESSAGES; BROADCAST CHANNELS; TAP CHANNEL;
D O I
10.1049/iet-com.2016.1287
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The physical layer security in the up-link of the wireless communication systems is often modelled as the multiple access wiretap channel (MAC-WT), and recently it has received a lot attention. In this paper, the MAC-WT has been re-visited by considering the situation that the legitimate receiver feeds his received channel output back to the transmitters via two noiseless channels, respectively. This model is called the MAC-WT with noiseless feedback. Inner and outer bounds on the secrecy capacity region of this feedback model are provided. To be specific, we first present a decode-and-forward (DF) inner bound on the secrecy capacity region of this feedback model, and this bound is constructed by allowing each transmitter to decode the other one's transmitted message from the feedback, and then each transmitter uses the decoded message to re-encode his own messages, i.e. this DF inner bound allows the independent transmitters to co-operate with each other. Then, we provide a hybrid inner bound which is strictly larger than the DF inner bound, and it is constructed by using the feedback as a tool not only to allow the independent transmitters to co-operate with each other but also to generate two secret keys, respectively, shared between the legitimate receiver and the two transmitters. Finally, we give a sato-type outer bound on the secrecy capacity region of this feedback model. The results of this paper are further explained via a Gaussian example, and from this example, we see that the noiseless feedback helps to enhance the achievable secrecy rate region of the Gaussian MAC-WT without feedback.
引用
收藏
页码:2190 / 2198
页数:9
相关论文
共 18 条
  • [1] Ahlswede R, 2006, LECT NOTES COMPUT SC, V4123, P258
  • [2] Wiretap Channel With Secure Rate-Limited Feedback
    Ardestanizadeh, Ehsan
    Franceschetti, Massimo
    Javidi, Tara
    Kim, Young-Han
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (12) : 5353 - 5361
  • [3] An improved achievable region for the discrete memoryless two-user multiple-access channel with noiseless feedback
    Bross, SI
    Lapidoth, A
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (03) : 811 - 833
  • [4] AN ACHIEVABLE RATE REGION FOR THE MULTIPLE-ACCESS CHANNEL WITH FEEDBACK
    COVER, TM
    LEUNG, CSK
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1981, 27 (03) : 292 - 298
  • [5] COVER TM, 1979, IEEE T INFORM THEORY, V25, P572, DOI 10.1109/TIT.1979.1056084
  • [6] Cover TM., 1991, ELEMENTS INFORM THEO, V1, P279
  • [7] CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
  • [8] Dai B., 2012, P 2012 IEEE INT S IN
  • [9] Feedback Enhances the Security of State-Dependent Degraded Broadcast Channels With Confidential Messages
    Dai, Bin
    Ma, Zheng
    Fang, Xuming
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1529 - 1542
  • [10] Ekrem E., 2008, P ANN ALL C COMM CON