Secure Degrees of Freedom of <inline-formula> <tex-math notation="LaTeX">K </tex-math></inline-formula>-User Gaussian Interference Channels: A Unified View
From MaRDI portal
Publication:2978632
DOI10.1109/TIT.2015.2411260zbMATH Open1359.94535arXiv1305.7214MaRDI QIDQ2978632FDOQ2978632
Authors: Jianwei Xie, Sennur Ulukus
Publication date: 28 April 2017
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Abstract: We determine the exact sum secure degrees of freedom (d.o.f.) of the K-user Gaussian interference channel. We consider three different secrecy constraints: 1) K-user interference channel with one external eavesdropper (IC-EE), 2) K-user interference channel with confidential messages (IC-CM), and 3) K-user interference channel with confidential messages and one external eavesdropper (IC-CM-EE). We show that for all of these three cases, the exact sum secure d.o.f. is K(K-1)/(2K-1). We show converses for IC-EE and IC-CM, which imply a converse for IC-CM-EE. We show achievability for IC-CM-EE, which implies achievability for IC-EE and IC-CM. We develop the converses by relating the channel inputs of interfering users to the reliable rates of the interfered users, and by quantifying the secrecy penalty in terms of the eavesdroppers' observations. Our achievability uses structured signaling, structured cooperative jamming, channel prefixing, and asymptotic real interference alignment. While the traditional interference alignment provides some amount of secrecy by mixing unintended signals in a smaller sub-space at every receiver, in order to attain the optimum sum secure d.o.f., we incorporate structured cooperative jamming into the achievable scheme, and intricately design the structure of all of the transmitted signals jointly.
Full work available at URL: https://arxiv.org/abs/1305.7214
Cited In (3)
- Optimal Secure GDoF of Symmetric Gaussian Wiretap Channel With a Helper
- The Degrees-of-Freedom of the $K$-User Gaussian Interference Channel Is Discontinuous at Rational Channel Coefficients
- Multiuser Diversity for Secrecy Communications Using Opportunistic Jammer Selection: Secure DoF and Jammer Scaling Law
This page was built for publication: Secure Degrees of Freedom of <inline-formula> <tex-math notation="LaTeX">$K$ </tex-math></inline-formula>-User Gaussian Interference Channels: A Unified View
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2978632)