Cargando…
Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper †
This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any jamming strategy subject to a given power constraint and shares her jamm...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9689472/ https://www.ncbi.nlm.nih.gov/pubmed/36359685 http://dx.doi.org/10.3390/e24111595 |
_version_ | 1784836543577325568 |
---|---|
author | Chou, Rémi A. Yener, Aylin |
author_facet | Chou, Rémi A. Yener, Aylin |
author_sort | Chou, Rémi A. |
collection | PubMed |
description | This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any jamming strategy subject to a given power constraint and shares her jamming signal with the eavesdropper. Four such models are considered: (i) the Gaussian point-to-point wiretap channel; (ii) the Gaussian multiple-access wiretap channel; (iii) the Gaussian broadcast wiretap channel; and (iv) the Gaussian symmetric interference wiretap channel. The use of pre-shared randomness between the legitimate users is not allowed in our models. Inner and outer bounds are derived for these four models. For (i), the secrecy capacity is obtained. For (ii) and (iv) under a degraded setup, the optimal secrecy sum-rate is characterized. Finally, for (iii), ranges of model parameter values for which the inner and outer bounds coincide are identified. |
format | Online Article Text |
id | pubmed-9689472 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-96894722022-11-25 Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper † Chou, Rémi A. Yener, Aylin Entropy (Basel) Article This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any jamming strategy subject to a given power constraint and shares her jamming signal with the eavesdropper. Four such models are considered: (i) the Gaussian point-to-point wiretap channel; (ii) the Gaussian multiple-access wiretap channel; (iii) the Gaussian broadcast wiretap channel; and (iv) the Gaussian symmetric interference wiretap channel. The use of pre-shared randomness between the legitimate users is not allowed in our models. Inner and outer bounds are derived for these four models. For (i), the secrecy capacity is obtained. For (ii) and (iv) under a degraded setup, the optimal secrecy sum-rate is characterized. Finally, for (iii), ranges of model parameter values for which the inner and outer bounds coincide are identified. MDPI 2022-11-02 /pmc/articles/PMC9689472/ /pubmed/36359685 http://dx.doi.org/10.3390/e24111595 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Chou, Rémi A. Yener, Aylin Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper † |
title | Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper † |
title_full | Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper † |
title_fullStr | Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper † |
title_full_unstemmed | Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper † |
title_short | Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper † |
title_sort | gaussian multiuser wiretap channels in the presence of a jammer-aided eavesdropper † |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9689472/ https://www.ncbi.nlm.nih.gov/pubmed/36359685 http://dx.doi.org/10.3390/e24111595 |
work_keys_str_mv | AT chouremia gaussianmultiuserwiretapchannelsinthepresenceofajammeraidedeavesdropper AT yeneraylin gaussianmultiuserwiretapchannelsinthepresenceofajammeraidedeavesdropper |