Loading…

Collective Secrecy Over the K -Transmitter Multiple Access Channel

This paper studies the problem of secure communication over a K-transmitter multiple access channel (MAC) in the presence of an external eavesdropper, subject to a collective secrecy constraint (i.e., information leakage rate to an eavesdropper on a collection of messages that are from a pre-specifi...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on information forensics and security 2018-09, Vol.13 (9), p.2279-2293
Main Authors: Yanling Chen, Koyluoglu, O. Ozan, Han Vinck, A. J.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:This paper studies the problem of secure communication over a K-transmitter multiple access channel (MAC) in the presence of an external eavesdropper, subject to a collective secrecy constraint (i.e., information leakage rate to an eavesdropper on a collection of messages that are from a pre-specified subset of the K transmitters, say S ⊆ K = (1, 2, ⋯, K}, is made vanishing). Since secrecy is of concern only to transmitters (i|i ϵ S} but not to transmitters (i|i ϵ S c }, where S c = K\S, different transmission strategies could be employed at transmitters (i|i ϵ S c }. Consider the following two scenarios: 1) transmitters (i|i ϵ S c } use deterministic encoders (which are conventionally used for MAC without secrecy), competing for the channel resource (i.e., being competitive) and 2) transmitters (i|i ϵ S c } use stochastic encoders, helping to hide other transmitters' messages from the eavesdropper (i.e., being cooperative). As a result, we establish the respective S-collective secrecy achievable rate regions and demonstrate the advantage of being cooperative theoretically and numerically. To this end, in addition to the standard techniques, our results build upon two techniques. The first is a generalization of Chia-El Gamal's lemma on entropy bound for a set of codewords given partial information. The second is to utilize a compact representation of a list of sets that, together with submodular properties of mutual information functions involved, leads to an efficient Fourier-Motzkin elimination. These two approaches allow us to derive achievable regions in this work, and could also be of independent interest in other context.
ISSN:1556-6013
1556-6021
DOI:10.1109/TIFS.2018.2818067