Chou Rémi A, Yener Aylin
Department of Electrical Engineering and Computer Science, Wichita State University, Wichita, KS 67260, USA.
Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH 43210, USA.
Entropy (Basel). 2022 Nov 2;24(11):1595. doi: 10.3390/e24111595.
This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any jamming strategy subject to a given power constraint and shares her jamming signal with the eavesdropper. Four such models are considered: (i) the Gaussian point-to-point wiretap channel; (ii) the Gaussian multiple-access wiretap channel; (iii) the Gaussian broadcast wiretap channel; and (iv) the Gaussian symmetric interference wiretap channel. The use of pre-shared randomness between the legitimate users is not allowed in our models. Inner and outer bounds are derived for these four models. For (i), the secrecy capacity is obtained. For (ii) and (iv) under a degraded setup, the optimal secrecy sum-rate is characterized. Finally, for (iii), ranges of model parameter values for which the inner and outer bounds coincide are identified.
本文考虑了存在窃听者和恶意干扰器情况下的安全通信。假设干扰器不知道合法发射机发出的通信信号,但可以在给定功率约束下采用任何干扰策略,并与窃听者共享其干扰信号。考虑了四种这样的模型:(i)高斯点对点窃听信道;(ii)高斯多址窃听信道;(iii)高斯广播窃听信道;以及(iv)高斯对称干扰窃听信道。在我们的模型中不允许合法用户之间使用预共享随机性。推导了这四种模型的内界和外界。对于(i),得到了保密容量。对于(ii)和(iv)在降级设置下,刻画了最优保密和速率。最后,对于(iii),确定了内界和外界重合的模型参数值范围。