Cargando…

Secure Retrospective Interference Alignment

In this paper, the K-user interference channel with secrecy constraints is considered with delayed channel state information at transmitters (CSIT). We propose a novel secure retrospective interference alignment scheme in which the transmitters carefully mix information symbols with artificial noise...

Descripción completa

Detalles Bibliográficos
Autores principales: Seif, Mohamed, Tandon, Ravi, Li, Ming
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514436/
http://dx.doi.org/10.3390/e21111092
_version_ 1783586587731296256
author Seif, Mohamed
Tandon, Ravi
Li, Ming
author_facet Seif, Mohamed
Tandon, Ravi
Li, Ming
author_sort Seif, Mohamed
collection PubMed
description In this paper, the K-user interference channel with secrecy constraints is considered with delayed channel state information at transmitters (CSIT). We propose a novel secure retrospective interference alignment scheme in which the transmitters carefully mix information symbols with artificial noises to ensure confidentiality. Achieving positive secure degrees of freedom (SDoF) is challenging due to the delayed nature of CSIT, and the distributed nature of the transmitters. Our scheme works over two phases: Phase one, in which each transmitter sends information symbols mixed with artificial noises, and repeats such transmission over multiple rounds. In the next phase, each transmitter uses the delayed CSIT of the previous phase and sends a function of the net interference and artificial noises (generated in previous phase), which is simultaneously useful for all receivers. These phases are designed to ensure the decodability of the desired messages while satisfying the secrecy constraints. We present our achievable scheme for three models, namely: (1) K-user interference channel with confidential messages (IC-CM), and we show that [Formula: see text] SDoF is achievable; (2) K-user interference channel with an external eavesdropper (IC-EE); and (3) K-user IC with confidential messages and an external eavesdropper (IC-CM-EE). We show that for the K-user IC-EE, [Formula: see text] SDoF is achievable, and for the K-user IC-CM-EE, [Formula: see text] is achievable. To the best of our knowledge, this is the first result on the K-user interference channel with secrecy constrained models and delayed CSIT that achieves an SDoF which scales with [Formula: see text] , square-root of number of users.
format Online
Article
Text
id pubmed-7514436
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75144362020-11-09 Secure Retrospective Interference Alignment Seif, Mohamed Tandon, Ravi Li, Ming Entropy (Basel) Article In this paper, the K-user interference channel with secrecy constraints is considered with delayed channel state information at transmitters (CSIT). We propose a novel secure retrospective interference alignment scheme in which the transmitters carefully mix information symbols with artificial noises to ensure confidentiality. Achieving positive secure degrees of freedom (SDoF) is challenging due to the delayed nature of CSIT, and the distributed nature of the transmitters. Our scheme works over two phases: Phase one, in which each transmitter sends information symbols mixed with artificial noises, and repeats such transmission over multiple rounds. In the next phase, each transmitter uses the delayed CSIT of the previous phase and sends a function of the net interference and artificial noises (generated in previous phase), which is simultaneously useful for all receivers. These phases are designed to ensure the decodability of the desired messages while satisfying the secrecy constraints. We present our achievable scheme for three models, namely: (1) K-user interference channel with confidential messages (IC-CM), and we show that [Formula: see text] SDoF is achievable; (2) K-user interference channel with an external eavesdropper (IC-EE); and (3) K-user IC with confidential messages and an external eavesdropper (IC-CM-EE). We show that for the K-user IC-EE, [Formula: see text] SDoF is achievable, and for the K-user IC-CM-EE, [Formula: see text] is achievable. To the best of our knowledge, this is the first result on the K-user interference channel with secrecy constrained models and delayed CSIT that achieves an SDoF which scales with [Formula: see text] , square-root of number of users. MDPI 2019-11-07 /pmc/articles/PMC7514436/ http://dx.doi.org/10.3390/e21111092 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Seif, Mohamed
Tandon, Ravi
Li, Ming
Secure Retrospective Interference Alignment
title Secure Retrospective Interference Alignment
title_full Secure Retrospective Interference Alignment
title_fullStr Secure Retrospective Interference Alignment
title_full_unstemmed Secure Retrospective Interference Alignment
title_short Secure Retrospective Interference Alignment
title_sort secure retrospective interference alignment
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514436/
http://dx.doi.org/10.3390/e21111092
work_keys_str_mv AT seifmohamed secureretrospectiveinterferencealignment
AT tandonravi secureretrospectiveinterferencealignment
AT liming secureretrospectiveinterferencealignment