• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

On the secrecy capacity of fading channels,” (2008)

by P K Gopala, L Lai, H El Gamal
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 203
Next 10 →

Secure Transmission with Multiple Antennas: The MISOME Wiretap Channel

by Ashish Khisti, Gregory W. Wornell , 2007
"... The role of multiple antennas for secure communication is investigated within the framework of Wyner’s wiretap channel. We characterize the secrecy capacity in terms of generalized eigenvalues when the sender and eavesdropper have multiple antennas, the intended receiver has a single antenna, and t ..."
Abstract - Cited by 240 (19 self) - Add to MetaCart
The role of multiple antennas for secure communication is investigated within the framework of Wyner’s wiretap channel. We characterize the secrecy capacity in terms of generalized eigenvalues when the sender and eavesdropper have multiple antennas, the intended receiver has a single antenna, and the channel matrices are fixed and known to all the terminals, and show that a beamforming strategy is capacity-achieving. In addition, we show that in the high signal-to-noise (SNR) ratio regime the penalty for not knowing eavesdropper’s channel is small—a simple “secure space-time code ” that can be thought of as masked beamforming and radiates power isotropically attains near-optimal performance. In the limit of large number of antennas, we obtain a realization-independent characterization of the secrecy capacity as a function of the number β: the number of eavesdropper antennas per sender antenna. We show that the eavesdropper is comparatively ineffective when β < 1, but that for β≥2 the eavesdropper can drive the secrecy capacity to zero, thereby blocking secure communication to the intended receiver. Extensions to ergodic fading channels are also provided.

Secure communication over fading channels

by Yingbin Liang, H. Vincent Poor, Shlomo Shamai (Shitz) , 2007
"... The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1. The confidential information needs to be kept as secret as possible from rec ..."
Abstract - Cited by 186 (21 self) - Add to MetaCart
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1. The confidential information needs to be kept as secret as possible from receiver 2. The broadcast channel from the source node to receivers 1 and 2 is corrupted by multiplicative fading gain coefficients in addition to additive Gaussian noise terms. The channel state information (CSI) is assumed to be known at both the transmitter and the receivers. The parallel BCC with independent subchannels is first studied, which serves as an information-theoretic model for the fading BCC. The secrecy capacity region of the parallel BCC is established. This result is then specialized to give the secrecy capacity region of the parallel BCC with degraded subchannels. The secrecy capacity region is then established for the parallel Gaussian BCC, and the optimal source power allocations that achieve the boundary of the secrecy capacity region are derived. In particular, the secrecy capacity region is established for the basic Gaussian BCC. The secrecy capacity results are then
(Show Context)

Citation Context

... confidential information for one receiver must be perfectly secret from the other receiver. 2sCompared to the fading wire-tap channel studied in [12] (the conference version of this paper), [13] and =-=[14]-=- (full CSI case), the fading BCC we study in this paper assumes that the source node has a common message for both receivers in addition to the confidential message for receiver 1. Hence the fading BC...

Discrete memoryless interference and broadcast channels with confidential messages: secrecy rate regions

by Ruoheng Liu, Ivana Marić, Predrag Spasojević, Roy D. Yates - IEEE Transactions on Information Theory , 2008
"... Abstract — Discrete memoryless interference and broadcast channels in which independent confidential messages are sent to two receivers are considered. Confidential messages are transmitted to each receiver with perfect secrecy, as measured by the equivocation at the other receiver. In this paper, w ..."
Abstract - Cited by 162 (13 self) - Add to MetaCart
Abstract — Discrete memoryless interference and broadcast channels in which independent confidential messages are sent to two receivers are considered. Confidential messages are transmitted to each receiver with perfect secrecy, as measured by the equivocation at the other receiver. In this paper, we derive inner and outer bounds for the achievable rate regions for these two communication systems. I.

The Gaussian Multiple Access Wire-tap Channel

by Ender Tekin, Aylin Yener - IEEE TRANSACTION ON INFORMATION THEORY , 2008
"... We consider the Gaussian multiple access wire-tap channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and informed wire-tapper who receives a degraded version of the signal at the receiver. We define suitable security measures ..."
Abstract - Cited by 110 (13 self) - Add to MetaCart
We consider the Gaussian multiple access wire-tap channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and informed wire-tapper who receives a degraded version of the signal at the receiver. We define suitable security measures for this multiaccess environment. Using codebooks generated randomly according to a Gaussian distribution, achievable secrecy rate regions are identified using superposition coding and time-division multiple access (TDMA) coding schemes. An upper bound for the secrecy sum-rate is derived, and our coding schemes are shown to achieve the sum capacity. Numerical results are presented showing the new rate region and comparing it with the capacity region of the Gaussian multiple-access channel (GMAC) with no secrecy constraints, which quantifies the price paid for secrecy.

Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel

by Shabnam Shafiee, Nan Liu, Sennur Ulukus - IEEE TRANSACTIONS ON INFORMATION THEORY , 2009
"... We find the secrecy capacity of the 2-2-1 Gaussian MIMO wiretap channel, which consists of a transmitter and a receiver with two antennas each, and an eavesdropper with a single antenna. We determine the secrecy capacity of this channel by proposing an achievable scheme and then developing a tight ..."
Abstract - Cited by 78 (20 self) - Add to MetaCart
We find the secrecy capacity of the 2-2-1 Gaussian MIMO wiretap channel, which consists of a transmitter and a receiver with two antennas each, and an eavesdropper with a single antenna. We determine the secrecy capacity of this channel by proposing an achievable scheme and then developing a tight upper bound that meets the proposed achievable secrecy rate. We show that, for this channel, Gaussian signalling in the form of beam-forming is optimal, and no pre-processing of information is necessary.

Secure broadcasting over fading channels

by Ashish Khisti, Student Member, Aslan Tchamkerten, Gregory W. Wornell - IEEE Transactions on Information Theory , 2008
"... Abstract—We study a problem of broadcasting confidential messages to multiple receivers under an information-theoretic secrecy constraint. Two scenarios are considered: 1) all receivers are to obtain a common message; and 2) each receiver is to obtain an independent message. Moreover, two models are ..."
Abstract - Cited by 66 (9 self) - Add to MetaCart
Abstract—We study a problem of broadcasting confidential messages to multiple receivers under an information-theoretic secrecy constraint. Two scenarios are considered: 1) all receivers are to obtain a common message; and 2) each receiver is to obtain an independent message. Moreover, two models are considered: parallel channels and fast-fading channels. For the case of reversely degraded parallel channels, one eavesdropper, and an arbitrary number of legitimate receivers, we determine the secrecy capacity for transmitting a common message, and the secrecy sum-capacity for transmitting independent messages. For the case of fast-fading channels, we assume that the channel state information of the legitimate receivers is known to all the terminals, while that of the eavesdropper is known only to itself. We show that, using a suitable binning strategy, a common message can be reliably and securely transmitted at a rate independent of the number of receivers. We also show that a simple opportunistic transmission strategy is optimal for the reliable and secure transmission of independent messages in the limit of large number of receivers. Index Terms—Confidential messages, cryptography, fading channels, information-theoretic secrecy, key distribution, multicasting, multiuser diversity, parallel channels, wiretap channel. I.
(Show Context)

Citation Context

...t channels in [5], and applied to Gaussian channels in [13]. Recently, the wiretap channel has received renewed interest for secure communication in wireless environments [20], [2], [12], [15], [17], =-=[11]-=-. The approach in these works is to exploit the channel variations experienced by the receivers to enable secure communication even when the eavesdropper has, on average, a channel stronger than that ...

The wiretap channel with feedback: Encryption over the channel

by Lifeng Lai, Hesham El Gamal, H. Vincent Poor - IEEE TRANS. INF. THEORY , 2008
"... In this work, the critical role of noisy feedback in enhancing the secrecy capacity of the wiretap channel is established. Unlike previous works, where a noiseless public discussion channel is used for feedback, the feed-forward and feedback signals share the same noisy channel in the present model ..."
Abstract - Cited by 57 (8 self) - Add to MetaCart
In this work, the critical role of noisy feedback in enhancing the secrecy capacity of the wiretap channel is established. Unlike previous works, where a noiseless public discussion channel is used for feedback, the feed-forward and feedback signals share the same noisy channel in the present model. Quite interestingly, this noisy feedback model is shown to be more advantageous in the current setting. More specifically, the discrete memoryless modulo-additive channel with a full-duplex destination node is considered first, and it is shown that the judicious use of feedback increases the secrecy capacity to the capacity of the source–destination channel in the absence of the wiretapper. In the achievability scheme, the feedback signal corresponds to a private key, known only to the destination. In the half-duplex scheme, a novel feedback technique that always achieves a positive perfect secrecy rate (even when the source–wiretapper channel is less noisy than the source–destination channel) is proposed. These results hinge on the modulo-additive property of the channel, which is exploited by the destination to perform encryption over the channel without revealing its key to the source. Finally, this scheme is extended to the continuous real valued modulo- channel where it is shown that the secrecy capacity with feedback is also equal to the capacity in the absence of the wiretapper.
(Show Context)

Citation Context

... there has been a resurgent interest in studying secure communications from information theoretic perspective under various scenarios. The point-to-point fading eavesdropper channel was considered in =-=[13]-=-–[18] under different assumptions on the delay constraints and the available transmitter Channel State Information (CSI). In [19]–[22], the information theoretic limits of secure communications over m...

Interference alignment for secrecy

by Onur Ozan Koyluoglu, Hesham El Gamal, Lifeng Lai, H. Vincent Poor - IEEE Trans. on Inf. Theory , 2011
"... ..."
Abstract - Cited by 41 (4 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...ed in [7], [8], [9]. Finally, the role of multiple antennas in enhancing the secrecy capacity was established in [10], [11] and the positive impact of fading on secrecy capacity was revealed in [12], =-=[13]-=-. Here, the frequency/time selective K-user Gaussian interference channel with secrecy constraints is considered. Without the secrecy constraints, it has been recently shown that a 1 degrees of freedo...

Secure wireless communications via cooperation

by Lun Dong, Zhu Han, Athina P. Petropulu, H. Vincent Poor - in Proc. Allerton Conf. Commun., Control, Comput , 2008
"... Abstract — The feasibility of physical-layer-based security approaches for wireless communications in the presence of one or more eavesdroppers is hampered by channel conditions. In this paper, cooperation is investigated as an approach to overcome this problem and improve the performance of secure ..."
Abstract - Cited by 40 (10 self) - Add to MetaCart
Abstract — The feasibility of physical-layer-based security approaches for wireless communications in the presence of one or more eavesdroppers is hampered by channel conditions. In this paper, cooperation is investigated as an approach to overcome this problem and improve the performance of secure communications. In particular, a decode-and-forward (DF) based cooperative protocol is considered, and the objective is to design the system for secrecy capacity maximization or transmit power minimization. System design for the DF-based cooperative protocol is first studied by assuming the availability of global channel state information (CSI). For the case of one eavesdropper, an iterative scheme is proposed to obtain the optimal solution for the problem of transmit power minimization. For the case of multiple eavesdroppers, the problem of secrecy capacity maximization or transmit power minimization is in general intractable. Suboptimal system design is proposed by adding an additional constraint, i.e., the complete nulling of signals at all eavesdroppers, which yields simple closed-form solutions for the aforementioned two problems. Then, the impact of imperfect CSI of eavesdroppers on system design is studied, in which the ergodic secrecy capacity is of interest. I.
(Show Context)

Citation Context

...on of confidential messages over broadcast channels [3]. Recently, there have been considerable efforts devoted to generalizing these studies to the wireless channel and multi-user scenarios (see [4]-=-=[6]-=- and references therein). The feasibility of traditional PHY-based security approaches based on single antenna systems is hampered by channel conditions: if the channel between source and destination ...

On the Gaussian MIMO wiretap channel

by Ashish Khisti, Gregory Womell - in Proc. IEEE International Symposium on Information Theory (ISIT , 2007
"... Wyner's wiretap channel is generalized to the case when the sender, the receiver and the eavesdropper have multiple antennas. We consider two cases: the deterministic case and the fading case. In the deterministic case, the channel matrices of the intended receiver and the eavesdropper are fixe ..."
Abstract - Cited by 39 (2 self) - Add to MetaCart
Wyner's wiretap channel is generalized to the case when the sender, the receiver and the eavesdropper have multiple antennas. We consider two cases: the deterministic case and the fading case. In the deterministic case, the channel matrices of the intended receiver and the eavesdropper are fixed and known to all the nodes. In the fading case, the channel matrices experience block fading and the sender has only the intended receiver's channel state information (CSI) and statistical knowledge of the eavesdropper's channel. For the deterministic case, a scheme based on the generalized-singular-value-decomposition (GSVD) of the channel matrices is proposed and shown to achieve the secrecy capacity in the high signal-to-noise-ratio (SNR) limit. When the intended receiver has only one antenna (MISO case) the secrecy-capacity is characterized for any SNR. Next, a suboptimal "artificial noise " based scheme is considered. Its performance is characterized and observed to be nearly optimal in the high SNR regime for the MISO case. This scheme extends naturally to the fading case and results are reported for the MISO case. For the independent Rayleigh fading distribution as we simultaneously increase the number of antennas at the sender and the eavesdropper, the secrecy capacity approaches zero if and only if the ratio of the number of eavesdropper antennas to transmitter antennas is at least two. I.
(Show Context)

Citation Context

...hannel matrices Hr(t) and He(t) are constant for a duration of T symbols and change independently across coherence periods. In the limit of large coherence periods, the variable rate coding scheme in =-=[8]-=- can be naturally combined with the artificial noise based scheme. In what follows, we state our results only for the MISO case, but the extensions to the MIMO case are analogous. Proposition 2: In th...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University