Abstract-A lower bound on the secrecy capacity of the wiretap channel with state information available causally at both the encoder and decoder is established. The lower bound is shown to be strictly larger than that for the noncausal case by Liu and Chen. Achievability is proved using block Markov coding, Shannon strategy, and key generation from common state information. The state sequence available at the end of each block is used to generate a key, which is used to enhance the transmission rate of the confidential message in the following block. An upper bound on the secrecy capacity when the state is available noncausally at the encoder and decoder is established and is shown to coincide with the lower bound for several classes of wiretap channels with state.
In this paper, we propose a model for energy cooperation between cellular base stations (BSs) with individual hybrid power supplies (including both the conventional grid and renewable energy sources), limited energy storages, and connected by resistive power lines for energy sharing. When the renewable energy profile and energy demand profile at all BSs are deterministic or known ahead of time, we show that the optimal energy cooperation policy for the BSs can be found by solving a linear program. We show the benefits of energy cooperation in this regime. When the renewable energy and demand profiles are stochastic and only causally known at the BSs, we propose an online energy cooperation algorithm and show the optimality properties of this algorithm under certain conditions. Furthermore, the energy-saving performances of the developed offline and online algorithms are compared by simulations, and the effect of the availability of energy state information (ESI) on the performance gains of the BSs' energy cooperation is investigated. Finally, we propose a hybrid algorithm that can incorporate offline information about the energy profiles, but operates in an online manner. .sg 2 sources. Examples where such a scenario occurs include the deployment of BSs with renewable energy sources by Ericsson in Africa [1] and Huawei in Bangladesh [2].Although renewable energy sources are attractive for the above reasons, they also suffer from significantly higher variability as compared to conventional energy sources. As a result, even in BSs that deploy renewable energy sources, conventional energy sources, such as diesel generators or the power grid, is still required to compensate for the variability of the renewable energy sources. One practical method of mitigating the variability of renewable energy sources is through energy storage means such as fuel cells and batteries. Energy storage, however, is very costly to deploy and therefore, the amount of storage available at BSs will usually be quite limited. A key consideration in deploying BSs with renewable energy sources is minimization of the amount of conventional energy consumed, because it is only then cost-effective to deploy renewable energy sources and storage. A survey of issues involved in deploying renewable energy sources in BSs is given in [3]. Related work on deploying renewable energy sources in smart grids, not necessarily constrained to a communications systems setup can be found in [4], [5] and the references therein. Other than work in smart grid, a closely related area of research is in the area of energy harvesting for wireless communications, where several authors have proposed the idea of energy cooperation between different nodes in a communications network; see e.g. [6], and [7]. More broadly, the area of "green communications" has attracted significant attention from the communications community in recent years. For an overview of the many significant research activities in this area, interested readers may refer to, e.g., [8], [9], [10], [11], [1...
This paper establishes inner bounds on the secrecy capacity regions for the general 3-receiver broadcast channel with one common and one confidential message sets. We consider two setups. The first is when the confidential message is to be sent to two receivers and kept secret from the third receiver. Achievability is established using indirect decoding, Wyner wiretap channel coding, and the new idea of generating secrecy from a publicly available superposition codebook. The inner bound is shown to be tight for a class of reversely degraded broadcast channels and when both legitimate receivers are less noisy than the third receiver. The second setup investigated in this paper is when the confidential message is to be sent to one receiver and kept secret from the other two receivers. Achievability in this case follows from Wyner wiretap channel coding and indirect decoding. This inner bound is also shown to be tight for several special cases.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.