Suppr超能文献

存在干扰辅助窃听者情况下的高斯多用户窃听信道

Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper.

作者信息

Chou Rémi A, Yener Aylin

机构信息

Department of Electrical Engineering and Computer Science, Wichita State University, Wichita, KS 67260, USA.

Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH 43210, USA.

出版信息

Entropy (Basel). 2022 Nov 2;24(11):1595. doi: 10.3390/e24111595.

Abstract

This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any jamming strategy subject to a given power constraint and shares her jamming signal with the eavesdropper. Four such models are considered: (i) the Gaussian point-to-point wiretap channel; (ii) the Gaussian multiple-access wiretap channel; (iii) the Gaussian broadcast wiretap channel; and (iv) the Gaussian symmetric interference wiretap channel. The use of pre-shared randomness between the legitimate users is not allowed in our models. Inner and outer bounds are derived for these four models. For (i), the secrecy capacity is obtained. For (ii) and (iv) under a degraded setup, the optimal secrecy sum-rate is characterized. Finally, for (iii), ranges of model parameter values for which the inner and outer bounds coincide are identified.

摘要

本文考虑了存在窃听者和恶意干扰器情况下的安全通信。假设干扰器不知道合法发射机发出的通信信号,但可以在给定功率约束下采用任何干扰策略,并与窃听者共享其干扰信号。考虑了四种这样的模型:(i)高斯点对点窃听信道;(ii)高斯多址窃听信道;(iii)高斯广播窃听信道;以及(iv)高斯对称干扰窃听信道。在我们的模型中不允许合法用户之间使用预共享随机性。推导了这四种模型的内界和外界。对于(i),得到了保密容量。对于(ii)和(iv)在降级设置下,刻画了最优保密和速率。最后,对于(iii),确定了内界和外界重合的模型参数值范围。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1588/9689472/25a5e0c96ff8/entropy-24-01595-g001.jpg

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验