Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper

被引:68
作者
Ekrem, Ersen [1 ]
Ulukus, Sennur [1 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
关键词
GAUSSIAN MULTIPLE-ACCESS; INTERFERENCE; REGION;
D O I
10.1155/2009/824235
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
080906 [电磁信息功能材料与结构]; 082806 [农业信息与电气工程];
摘要
We study the security of communication between a single transmitter and many receivers in the presence of an eavesdropper for several special classes of broadcast channels. As the first model, we consider the degraded multireceiver wiretap channel where the legitimate receivers exhibit a degradedness order while the eavesdropper is more noisy with respect to all legitimate receivers. We establish the secrecy capacity region of this channel model. Secondly, we consider the parallel multireceiver wiretap channel with a less noisiness order in each subchannel, where this order is not necessarily the same for all subchannels, and hence the overall channel does not exhibit a less noisiness order. We establish the common message secrecy capacity and sum secrecy capacity of this channel. Thirdly, we study a class of parallel multireceiver wiretap channels with two subchannels, two users and an eavesdropper. For channels in this class, in the first (resp., second) subchannel, the second ( resp., first) receiver is degraded with respect to the first ( resp., second) receiver, while the eavesdropper is degraded with respect to both legitimate receivers in both subchannels. We determine the secrecy capacity region of this channel, and discuss its extensions to arbitrary numbers of users and subchannels. Finally, we focus on a variant of this previous channel model where the transmitter can use only one of the subchannels at any time. We characterize the secrecy capacity region of this channel as well. Copyright (C) 2009 E. Ekrem and S. Ulukus.
引用
收藏
页数:29
相关论文
共 27 条
[11]
HE X, IEEE T INFORM UNPUB
[12]
He X, 2007, CONFERENCE RECORD OF THE FORTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1-5, P883
[13]
Secure broadcasting over fading channels [J].
Khisti, Ashish ;
Tchamkerten, Aslan ;
Wornell, Gregory W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2453-2469
[14]
The relay-eavesdropper channel: Cooperation for secrecy [J].
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (09) :4005-4019
[15]
Secure communication over fading channels [J].
Liang, Yingbin ;
Poor, H. Vincent ;
Sharnai , Shlorno .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2470-2492
[16]
Multiple-access channels with confidential messages [J].
Liang, Yingbin ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (03) :976-1002
[17]
LIU R, 2006, P IEEE INT S INF THE
[18]
Discrete memoryless interference and broadcast channels with confidential, messages: Secrecy rate regions [J].
Liu, Ruoheng ;
Maric, Ivana ;
Spasojevic, Predrag ;
Yates, Roy D. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2493-2507
[19]
Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages [J].
Liu, Ruoheng ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (03) :1235-1249
[20]
Oohama Y., 2006, Relay channels with confidential messages