Secure Communication Over Interference Channel: To Jam or not to Jam?

被引:7
|
作者
Chen, Jinyuan [1 ]
机构
[1] Louisiana Tech Univ, Dept Elect Engn, Ruston, LA 71272 USA
关键词
Information-theoretic secrecy; interference channel; cooperative jamming; treating interference as noise; secure capacity; MULTIPLE-ACCESS CHANNELS; BROADCAST CHANNELS; WIRELESS NETWORKS; SECRECY; CAPACITY; FREEDOM; ALIGNMENT;
D O I
10.1109/TIT.2019.2961099
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a secure communication over a two-user Gaussian interference channel, where each transmitter sends a confidential message to its legitimate receiver. For this setting, we identify a regime where the simple scheme of using Gaussian wiretap codebook at each transmitter (without cooperative jamming) and treating interference as noise at each intended receiver (in short, GWC-TIN scheme) achieves the optimal secure sum capacity to within a constant gap. For the symmetric case, this simple scheme is optimal when the interference-to-signal ratio (all link strengths in decibel scale) is no more than 2/3. However, when the ratio is more than 2/3, we show that this simple scheme is not optimal anymore and a scheme with cooperative jamming is proposed to achieve the optimal secure sum generalized degrees-of-freedom (GDoF). Specifically, for the symmetric case, we complete the optimal secure sum GDoF characterization for all the interference regimes, for almost all channel gains (except for a set of channel gains of measure zero).
引用
收藏
页码:2819 / 2841
页数:23
相关论文
共 50 条
  • [1] Secure Communication over Interference Channel: To Jam or Not to Jam?
    Chen, Jinyuan
    2018 56TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2018, : 1120 - 1127
  • [2] Optimal Secure GDoF of Symmetric Gaussian Wiretap Channel With a Helper
    Chen, Jinyuan
    Geng, Chunhua
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (04) : 2334 - 2352
  • [3] On Secure Communication over the Z-Channel
    Fayed, Abdallah
    Khattab, Tamer
    Lai, Lifeng
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 606 - 610
  • [4] On Secure Communication over the Multiple Access Channel
    Chen, Yanling
    Koyluoglu, O. Ozan
    Vinck, A. J. Han
    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 350 - 354
  • [5] Accumulate and Jam: Towards Secure Communication via A Wireless-Powered Full-Duplex Jammer
    Bi, Ying
    Chen, He
    IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2016, 10 (08) : 1538 - 1550
  • [6] Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments
    Phu Tran Tin
    Nguyen, Tan N.
    Sang, Nguyen Q.
    Tran Trung Duy
    Tran, Phuong T.
    Voznak, Miroslav
    ENTROPY, 2019, 21 (07) : 1 - 18
  • [7] Role of Shared Key for Secure Communication Over 2-User Gaussian Z-Interference Channel
    Somalatha, Uppalapati
    Mohapatra, Parthajit
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 85 - 98
  • [8] Lossy Source-Channel Communication over a Phase-Incoherent Interference Relay Channel
    Saffar, H. Ebrahimzadeh
    Khuzani, M. Badiei
    Mitran, P.
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012,
  • [9] Secure Communication Over Parallel Relay Channel
    Awan, Zohaib Hassan
    Zaidi, Abdellatif
    Vandendorpe, Luc
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 359 - 371
  • [10] Secure Communication Over Finite State Multiple-Access Wiretap Channel With Delayed Feedback
    Dai, Bin
    Ma, Zheng
    Xiao, Ming
    Tang, Xiaohu
    Fan, Pingzhi
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (04) : 723 - 736