Loading…
Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions
We study information-theoretic security for discrete memoryless interference and broadcast channels with independent confidential messages sent to two receivers. Confidential messages are transmitted to their respective receivers while ensuring mutual information-theoretic secrecy. That is, each rec...
Saved in:
Published in: | IEEE transactions on information theory 2008-06, Vol.54 (6), p.2493-2507 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c392t-2f2a93b2ab1b773f104dcd090df5be2d96a05dd2ba4ca868ecc2e5c409cfa5853 |
---|---|
cites | cdi_FETCH-LOGICAL-c392t-2f2a93b2ab1b773f104dcd090df5be2d96a05dd2ba4ca868ecc2e5c409cfa5853 |
container_end_page | 2507 |
container_issue | 6 |
container_start_page | 2493 |
container_title | IEEE transactions on information theory |
container_volume | 54 |
creator | Ruoheng Liu Maric, I. Spasojevic, P. Yates, R.D. |
description | We study information-theoretic security for discrete memoryless interference and broadcast channels with independent confidential messages sent to two receivers. Confidential messages are transmitted to their respective receivers while ensuring mutual information-theoretic secrecy. That is, each receiver is kept in total ignorance with respect to the message intended for the other receiver. The secrecy level is measured by the equivocation rate at the eavesdropping receiver. In this paper, we present inner and outer bounds on secrecy capacity regions for these two communication systems. The derived outer bounds have an identical mutual information expression that applies to both channel models. The difference is in the input distributions over which the expression is optimized. The inner bound rate regions are achieved by random binning techniques. For the broadcast channel, a double-binning coding scheme allows for both joint encoding and preserving of confidentiality. Furthermore, we show that, for a special case of the interference channel, referred to as the switch channel, derived bounds meet. Finally, we describe several transmission schemes for Gaussian interference channels and derive their achievable rate regions while ensuring mutual information-theoretic secrecy. An encoding scheme in which transmitters dedicate some of their power to create artificial noise is proposed and shown to outperform both time-sharing and simple multiplexed transmission of the confidential messages. |
doi_str_mv | 10.1109/TIT.2008.921879 |
format | article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_4529283</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4529283</ieee_id><sourcerecordid>875023478</sourcerecordid><originalsourceid>FETCH-LOGICAL-c392t-2f2a93b2ab1b773f104dcd090df5be2d96a05dd2ba4ca868ecc2e5c409cfa5853</originalsourceid><addsrcrecordid>eNp9kb9LAzEYhoMoWKuzg0tw0OnaJJc0iZvWXwVF0IpjyCXf2SvXnCbXof-9kYqDg9PHB8_7wsuD0DElI0qJHs9n8xEjRI00o0rqHTSgQshCTwTfRQNCqCo052ofHaS0zC8XlA3Q4rpJLkIP-BFWXdy0kBKehR5iDRGCA2yDx1exs97Z1OPpwoYAbcJvTb_A0y7UjYfQN7bNBSnZd0gX-AVypdvgZ5t7n-G96UI6RHu1bRMc_dwher29mU_vi4enu9n08qFwpWZ9wWpmdVkxW9FKyrKmhHvniSa-FhUwryeWCO9ZZbmzaqLAOQbCcaJdbYUS5RCdb3s_Yve5htSbVV4IbWsDdOtklBSElVyqTJ79S5ZcSKkpy-DpH3DZrWPIKwzVQjPJpc7QeAu52KUUoTYfsVnZuDGUmG9BJgsy34LMVlBOnGwTDQD80lwwzVRZfgF1E41C</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>195927479</pqid></control><display><type>article</type><title>Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions</title><source>IEEE Xplore (Online service)</source><creator>Ruoheng Liu ; Maric, I. ; Spasojevic, P. ; Yates, R.D.</creator><creatorcontrib>Ruoheng Liu ; Maric, I. ; Spasojevic, P. ; Yates, R.D.</creatorcontrib><description>We study information-theoretic security for discrete memoryless interference and broadcast channels with independent confidential messages sent to two receivers. Confidential messages are transmitted to their respective receivers while ensuring mutual information-theoretic secrecy. That is, each receiver is kept in total ignorance with respect to the message intended for the other receiver. The secrecy level is measured by the equivocation rate at the eavesdropping receiver. In this paper, we present inner and outer bounds on secrecy capacity regions for these two communication systems. The derived outer bounds have an identical mutual information expression that applies to both channel models. The difference is in the input distributions over which the expression is optimized. The inner bound rate regions are achieved by random binning techniques. For the broadcast channel, a double-binning coding scheme allows for both joint encoding and preserving of confidentiality. Furthermore, we show that, for a special case of the interference channel, referred to as the switch channel, derived bounds meet. Finally, we describe several transmission schemes for Gaussian interference channels and derive their achievable rate regions while ensuring mutual information-theoretic secrecy. An encoding scheme in which transmitters dedicate some of their power to create artificial noise is proposed and shown to outperform both time-sharing and simple multiplexed transmission of the confidential messages.</description><identifier>ISSN: 0018-9448</identifier><identifier>EISSN: 1557-9654</identifier><identifier>DOI: 10.1109/TIT.2008.921879</identifier><identifier>CODEN: IETTAW</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Broadcast channels ; Broadcasting ; channel capacity ; Channels ; Communication channels ; Communication system security ; Communication systems ; Communications systems ; Computer memory ; Data integrity ; Data transmission ; Eavesdropping ; Encoding ; equivocation rate ; Information security ; information-theoretic secrecy ; Interference ; Interference channels ; Messages ; Multiplexing ; Mutual information ; Network security ; Receivers ; Relays ; secrecy capacity region ; Switches ; telecommunication security ; Transmitters ; Wireless communication</subject><ispartof>IEEE transactions on information theory, 2008-06, Vol.54 (6), p.2493-2507</ispartof><rights>Copyright Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jun 2008</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c392t-2f2a93b2ab1b773f104dcd090df5be2d96a05dd2ba4ca868ecc2e5c409cfa5853</citedby><cites>FETCH-LOGICAL-c392t-2f2a93b2ab1b773f104dcd090df5be2d96a05dd2ba4ca868ecc2e5c409cfa5853</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4529283$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Ruoheng Liu</creatorcontrib><creatorcontrib>Maric, I.</creatorcontrib><creatorcontrib>Spasojevic, P.</creatorcontrib><creatorcontrib>Yates, R.D.</creatorcontrib><title>Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions</title><title>IEEE transactions on information theory</title><addtitle>TIT</addtitle><description>We study information-theoretic security for discrete memoryless interference and broadcast channels with independent confidential messages sent to two receivers. Confidential messages are transmitted to their respective receivers while ensuring mutual information-theoretic secrecy. That is, each receiver is kept in total ignorance with respect to the message intended for the other receiver. The secrecy level is measured by the equivocation rate at the eavesdropping receiver. In this paper, we present inner and outer bounds on secrecy capacity regions for these two communication systems. The derived outer bounds have an identical mutual information expression that applies to both channel models. The difference is in the input distributions over which the expression is optimized. The inner bound rate regions are achieved by random binning techniques. For the broadcast channel, a double-binning coding scheme allows for both joint encoding and preserving of confidentiality. Furthermore, we show that, for a special case of the interference channel, referred to as the switch channel, derived bounds meet. Finally, we describe several transmission schemes for Gaussian interference channels and derive their achievable rate regions while ensuring mutual information-theoretic secrecy. An encoding scheme in which transmitters dedicate some of their power to create artificial noise is proposed and shown to outperform both time-sharing and simple multiplexed transmission of the confidential messages.</description><subject>Broadcast channels</subject><subject>Broadcasting</subject><subject>channel capacity</subject><subject>Channels</subject><subject>Communication channels</subject><subject>Communication system security</subject><subject>Communication systems</subject><subject>Communications systems</subject><subject>Computer memory</subject><subject>Data integrity</subject><subject>Data transmission</subject><subject>Eavesdropping</subject><subject>Encoding</subject><subject>equivocation rate</subject><subject>Information security</subject><subject>information-theoretic secrecy</subject><subject>Interference</subject><subject>Interference channels</subject><subject>Messages</subject><subject>Multiplexing</subject><subject>Mutual information</subject><subject>Network security</subject><subject>Receivers</subject><subject>Relays</subject><subject>secrecy capacity region</subject><subject>Switches</subject><subject>telecommunication security</subject><subject>Transmitters</subject><subject>Wireless communication</subject><issn>0018-9448</issn><issn>1557-9654</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2008</creationdate><recordtype>article</recordtype><recordid>eNp9kb9LAzEYhoMoWKuzg0tw0OnaJJc0iZvWXwVF0IpjyCXf2SvXnCbXof-9kYqDg9PHB8_7wsuD0DElI0qJHs9n8xEjRI00o0rqHTSgQshCTwTfRQNCqCo052ofHaS0zC8XlA3Q4rpJLkIP-BFWXdy0kBKehR5iDRGCA2yDx1exs97Z1OPpwoYAbcJvTb_A0y7UjYfQN7bNBSnZd0gX-AVypdvgZ5t7n-G96UI6RHu1bRMc_dwher29mU_vi4enu9n08qFwpWZ9wWpmdVkxW9FKyrKmhHvniSa-FhUwryeWCO9ZZbmzaqLAOQbCcaJdbYUS5RCdb3s_Yve5htSbVV4IbWsDdOtklBSElVyqTJ79S5ZcSKkpy-DpH3DZrWPIKwzVQjPJpc7QeAu52KUUoTYfsVnZuDGUmG9BJgsy34LMVlBOnGwTDQD80lwwzVRZfgF1E41C</recordid><startdate>20080601</startdate><enddate>20080601</enddate><creator>Ruoheng Liu</creator><creator>Maric, I.</creator><creator>Spasojevic, P.</creator><creator>Yates, R.D.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20080601</creationdate><title>Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions</title><author>Ruoheng Liu ; Maric, I. ; Spasojevic, P. ; Yates, R.D.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c392t-2f2a93b2ab1b773f104dcd090df5be2d96a05dd2ba4ca868ecc2e5c409cfa5853</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Broadcast channels</topic><topic>Broadcasting</topic><topic>channel capacity</topic><topic>Channels</topic><topic>Communication channels</topic><topic>Communication system security</topic><topic>Communication systems</topic><topic>Communications systems</topic><topic>Computer memory</topic><topic>Data integrity</topic><topic>Data transmission</topic><topic>Eavesdropping</topic><topic>Encoding</topic><topic>equivocation rate</topic><topic>Information security</topic><topic>information-theoretic secrecy</topic><topic>Interference</topic><topic>Interference channels</topic><topic>Messages</topic><topic>Multiplexing</topic><topic>Mutual information</topic><topic>Network security</topic><topic>Receivers</topic><topic>Relays</topic><topic>secrecy capacity region</topic><topic>Switches</topic><topic>telecommunication security</topic><topic>Transmitters</topic><topic>Wireless communication</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ruoheng Liu</creatorcontrib><creatorcontrib>Maric, I.</creatorcontrib><creatorcontrib>Spasojevic, P.</creatorcontrib><creatorcontrib>Yates, R.D.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on information theory</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ruoheng Liu</au><au>Maric, I.</au><au>Spasojevic, P.</au><au>Yates, R.D.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions</atitle><jtitle>IEEE transactions on information theory</jtitle><stitle>TIT</stitle><date>2008-06-01</date><risdate>2008</risdate><volume>54</volume><issue>6</issue><spage>2493</spage><epage>2507</epage><pages>2493-2507</pages><issn>0018-9448</issn><eissn>1557-9654</eissn><coden>IETTAW</coden><abstract>We study information-theoretic security for discrete memoryless interference and broadcast channels with independent confidential messages sent to two receivers. Confidential messages are transmitted to their respective receivers while ensuring mutual information-theoretic secrecy. That is, each receiver is kept in total ignorance with respect to the message intended for the other receiver. The secrecy level is measured by the equivocation rate at the eavesdropping receiver. In this paper, we present inner and outer bounds on secrecy capacity regions for these two communication systems. The derived outer bounds have an identical mutual information expression that applies to both channel models. The difference is in the input distributions over which the expression is optimized. The inner bound rate regions are achieved by random binning techniques. For the broadcast channel, a double-binning coding scheme allows for both joint encoding and preserving of confidentiality. Furthermore, we show that, for a special case of the interference channel, referred to as the switch channel, derived bounds meet. Finally, we describe several transmission schemes for Gaussian interference channels and derive their achievable rate regions while ensuring mutual information-theoretic secrecy. An encoding scheme in which transmitters dedicate some of their power to create artificial noise is proposed and shown to outperform both time-sharing and simple multiplexed transmission of the confidential messages.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIT.2008.921879</doi><tpages>15</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0018-9448 |
ispartof | IEEE transactions on information theory, 2008-06, Vol.54 (6), p.2493-2507 |
issn | 0018-9448 1557-9654 |
language | eng |
recordid | cdi_ieee_primary_4529283 |
source | IEEE Xplore (Online service) |
subjects | Broadcast channels Broadcasting channel capacity Channels Communication channels Communication system security Communication systems Communications systems Computer memory Data integrity Data transmission Eavesdropping Encoding equivocation rate Information security information-theoretic secrecy Interference Interference channels Messages Multiplexing Mutual information Network security Receivers Relays secrecy capacity region Switches telecommunication security Transmitters Wireless communication |
title | Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T11%3A33%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Discrete%20Memoryless%20Interference%20and%20Broadcast%20Channels%20With%20Confidential%20Messages:%20Secrecy%20Rate%20Regions&rft.jtitle=IEEE%20transactions%20on%20information%20theory&rft.au=Ruoheng%20Liu&rft.date=2008-06-01&rft.volume=54&rft.issue=6&rft.spage=2493&rft.epage=2507&rft.pages=2493-2507&rft.issn=0018-9448&rft.eissn=1557-9654&rft.coden=IETTAW&rft_id=info:doi/10.1109/TIT.2008.921879&rft_dat=%3Cproquest_ieee_%3E875023478%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c392t-2f2a93b2ab1b773f104dcd090df5be2d96a05dd2ba4ca868ecc2e5c409cfa5853%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=195927479&rft_id=info:pmid/&rft_ieee_id=4529283&rfr_iscdi=true |