Polar Coding for the Cognitive Interference Channel With Confidential Messages

被引:4
作者
Zheng, Mengfan [1 ]
Chen, Wen [1 ]
Ling, Cong [2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200240, Peoples R China
[2] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
基金
中国国家自然科学基金;
关键词
Polar codes; cognitive interference channel; physical layer security; superposition coding; BROADCAST CHANNELS; SECRECY CAPACITY; RADIO CHANNELS; ERGODIC-THEORY; CODES; POLARIZATION; INFORMATION; REGION; COMMON;
D O I
10.1109/JSAC.2018.2825139
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose a low-complexity, secrecy capacity achieving polar coding scheme for the cognitive interference channel with confidential messages (CICC) under the strong secrecy criterion. Existing polar coding schemes for interference channels rely on the use of polar codes for the multiple access channel, the code construction problem of which can be complicated. We show that the whole secrecy capacity region of the CICC can be achieved by simple point-to-point polar codes due to the cognitivity, and our proposed scheme requires the minimum rate of randomness at the encoder.
引用
收藏
页码:762 / 774
页数:13
相关论文
共 50 条
[41]   On the Capacity of the Interference Channel With a Cognitive Relay [J].
Rini, Stefano ;
Tuninetti, Daniela ;
Devroye, Natasha ;
Goldsmith, Andrea J. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (04) :2148-2179
[42]   Discrete memoryless interference and broadcast channels with confidential, messages: Secrecy rate regions [J].
Liu, Ruoheng ;
Maric, Ivana ;
Spasojevic, Predrag ;
Yates, Roy D. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2493-2507
[43]   On the Achievability of Interference Channel Coding [J].
Muramatsu, Jun .
2022 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, ISITA, 2022, :39-43
[44]   Capacity bounds for multiple access-cognitive interference channel [J].
Mirmohseni, Mahtab ;
Akhbari, Bahareh ;
Aref, Mohammad Reza .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011,
[45]   Cognitive interference channel: achievable rate region and power allocation [J].
Al-qudah, Zouhair ;
Al Bataineh, Mohammad .
IET COMMUNICATIONS, 2015, 9 (02) :249-257
[46]   An ARQ-aided Polar Coding Scheme for Security Transmission of the Wiretap Channel [J].
Liang, Hao ;
Liu, Aijun ;
Zhang, Yingxian ;
Zhang, Qingshuang .
2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, :1530-1535
[47]   Superposition Lattice Coding for Gaussian Broadcast Channel with Confidential Message [J].
Choo, Li-Chia ;
Ling, Cong .
2014 IEEE INFORMATION THEORY WORKSHOP (ITW), 2014, :311-315
[48]   Polar Coding for the General Wiretap Channel [J].
Wei, Yi-Peng ;
Ulukus, Sennur .
2015 IEEE INFORMATION THEORY WORKSHOP (ITW), 2015,
[49]   Polar coding schemes for the AWGN channel [J].
Abbe, Emmanuel ;
Barron, Andrew .
2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2011, :194-198
[50]   Degraded Broadcast Channel with Noncausal Side Information, Confidential Messages and Noiseless Feedback [J].
Dai, Bin ;
Hong, Jiehua ;
Vinck, A. J. Han ;
Luo, Yuan ;
Zhuang, Zhuojun .
2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012, :438-442