4.6 Article

Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper

期刊

ENTROPY
卷 24, 期 11, 页码 -

出版社

MDPI
DOI: 10.3390/e24111595

关键词

Gaussian wiretap channel; Gaussian multiple-access wiretap channel; Gaussian broadcast wiretap channel; jamming; secure communication

资金

  1. NSF
  2. [CIF-1319338]
  3. [CNS-1314719]
  4. [CCF-2105872]
  5. [CCF-2047913]

向作者/读者索取更多资源

This paper discusses the issue of secure communication in the presence of an eavesdropper and a malicious jammer. Four different models are considered, and inner and outer bounds are derived for each model. The results show that secure communication can be achieved under certain conditions.
This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any jamming strategy subject to a given power constraint and shares her jamming signal with the eavesdropper. Four such models are considered: (i) the Gaussian point-to-point wiretap channel; (ii) the Gaussian multiple-access wiretap channel; (iii) the Gaussian broadcast wiretap channel; and (iv) the Gaussian symmetric interference wiretap channel. The use of pre-shared randomness between the legitimate users is not allowed in our models. Inner and outer bounds are derived for these four models. For (i), the secrecy capacity is obtained. For (ii) and (iv) under a degraded setup, the optimal secrecy sum-rate is characterized. Finally, for (iii), ranges of model parameter values for which the inner and outer bounds coincide are identified.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据