Polar Coding for the Cognitive Interference Channel With Confidential Messages

被引:3
作者
Zheng, Mengfan [1 ]
Chen, Wen [1 ]
Ling, Cong [2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200240, Peoples R China
[2] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
基金
中国国家自然科学基金;
关键词
Polar codes; cognitive interference channel; physical layer security; superposition coding; BROADCAST CHANNELS; SECRECY CAPACITY; RADIO CHANNELS; ERGODIC-THEORY; CODES; POLARIZATION; INFORMATION; REGION; COMMON;
D O I
10.1109/JSAC.2018.2825139
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose a low-complexity, secrecy capacity achieving polar coding scheme for the cognitive interference channel with confidential messages (CICC) under the strong secrecy criterion. Existing polar coding schemes for interference channels rely on the use of polar codes for the multiple access channel, the code construction problem of which can be complicated. We show that the whole secrecy capacity region of the CICC can be achieved by simple point-to-point polar codes due to the cognitivity, and our proposed scheme requires the minimum rate of randomness at the encoder.
引用
收藏
页码:762 / 774
页数:13
相关论文
共 50 条
[31]   Polar Coding for Physical-layer Security without Knowledge of the Eavesdropper's Channel [J].
Monteiro, Thyago ;
Gomes, Marco ;
Vilela, Joao P. ;
Harrison, Willie K. .
2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING), 2019,
[32]   Layered Coding for the Interference Channel With a Relay [J].
Do, Hieu T. ;
Oechtering, Tobias J. ;
Skoglund, Mikael .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (10) :6154-6180
[33]   Directional modulation method to increase the capacity of confidential messages over broadcast channels [J].
Yamada, Randy M. ;
Christopher, Ryan M. .
IET COMMUNICATIONS, 2020, 14 (11) :1740-1748
[34]   Fading Cognitive Multiple-Access Channels With Confidential Messages [J].
Liu, Ruoheng ;
Liang, Yingbin ;
Poor, H. Vincent .
2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, :371-+
[35]   Fading Cognitive Multiple-Access Channels With Confidential Messages [J].
Liu, Ruoheng ;
Liang, Yingbin ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (08) :4992-5005
[36]   Polar Coding for Channels With Deletions [J].
Tian, Kuangda ;
Fazeli, Arman ;
Vardy, Alexander .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (11) :7081-7095
[37]   Polar Coding for the Binary Erasure Channel With Deletions [J].
Thomas, Eldho K. ;
Tan, Vincent Y. F. ;
Vardy, Alexander ;
Motani, Mehul .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (04) :710-713
[38]   Two-Transmitter Two-Receiver Channel with Confidential Messages [J].
ZivariFard, Hassan ;
Bloch, Matthieu ;
Nosratinia, Aria .
2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2017, :103-110
[39]   Secure Beamforming for SWIPT in Multiuser MISO Broadcast Channel With Confidential Messages [J].
Zhang, Haiyang ;
Li, Chunguo ;
Huang, Yongming ;
Yang, Luxi .
IEEE COMMUNICATIONS LETTERS, 2015, 19 (08) :1347-1350
[40]   Secure joint source-channel coding with interference known at the transmitter [J].
Bagherikaram, G. ;
Plataniotis, K. N. .
IET COMMUNICATIONS, 2012, 6 (17) :2796-2808