2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton) 2012
DOI: 10.1109/allerton.2012.6483217
|View full text |Cite
|
Sign up to set email alerts
|

Secure degrees of freedom of the Gaussian wiretap channel with helpers

Abstract: Abstract-The secrecy capacity of the canonical Gaussian wiretap channel does not scale with the transmit power, and hence, the secure d.o.f. of the Gaussian wiretap channel with no helpers is zero. It has been known that a strictly positive secure d.o.f. can be obtained in the Gaussian wiretap channel by using a helper which sends structured cooperative signals. We show that the exact secure d.o.f. of the Gaussian wiretap channel with a helper is 1 2. Our achievable scheme is based on real interference alignme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

3
56
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
6
2

Relationship

4
4

Authors

Journals

citations
Cited by 36 publications
(59 citation statements)
references
References 32 publications
3
56
0
Order By: Relevance
“…With the widespread adoption of multiple-input multiple-output (MIMO) systems, there has been a significant recent interest in information theoretic physical layer security, the main premise of which is to exploit the difference in the wireless channels of different users. Information theoretic security has been investigated for a variety of channel models ranging from fading channels [1], [2], MIMO wiretap channels [3]- [6], multiple access channels [7]- [9], multi-receiver wiretap channels [10], broadcast channels with confidential messages [11]- [13], wiretap channels with helpers [14], etc.…”
Section: Introductionmentioning
confidence: 99%
“…With the widespread adoption of multiple-input multiple-output (MIMO) systems, there has been a significant recent interest in information theoretic physical layer security, the main premise of which is to exploit the difference in the wireless channels of different users. Information theoretic security has been investigated for a variety of channel models ranging from fading channels [1], [2], MIMO wiretap channels [3]- [6], multiple access channels [7]- [9], multi-receiver wiretap channels [10], broadcast channels with confidential messages [11]- [13], wiretap channels with helpers [14], etc.…”
Section: Introductionmentioning
confidence: 99%
“…There have been many studies on utilizing jammers for increasing secure DoF [23], [24], [26]. In [23], cooperative jamming with structured jamming signals based on lattice coding was proposed for a Gaussian wiretap channel.…”
Section: Introductionmentioning
confidence: 99%
“…In ESA, the concept of ergodic IA [25] was extended to secrecy communications. In [26], cooperative jammers were exploited to increase secure DoF in a Gaussian wiretap channel, where transmitter and cooperative jammers send jointly designed signals according to channel conditions. Contrary to the previous works, in our proposed OJS schemes, the selected jammers adopt i.i.d Gaussian signals oblivious to CSI.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, our achievable scheme combines: channel prefixing, structured signalling, structured cooperative jamming, and interference alignment. Our converse is a generalization of our converse in [14]. We first show that the sum secrecy rate is upper bounded by the sum of differential entropies of all channel inputs except the one eliminated by the eavesdropper's observation.…”
mentioning
confidence: 99%
“…For the K-user Gaussian MAC wiretap channel, the best known achievable sum secure d.o.f is [11], [14], [15] strike a better balance between these two end-effects, i.e., by hurting the eavesdropper sufficiently, and not hurting the legitimate receiver as much. In addition, [12] achieved positive sum secure d.o.f.…”
mentioning
confidence: 99%