Detail View

On the Secrecy Capacity Region of the Two-User Symmetric Z Interference Channel With Unidirectional Transmitter Cooperation
Citations

WEB OF SCIENCE

Citations

SCOPUS

Metadata Downloads

DC Field Value Language
dc.contributor.author Mohapatra, Parthajit -
dc.contributor.author Murthy, Chandra R. -
dc.contributor.author Lee, Jemin -
dc.date.available 2017-08-10T08:16:38Z -
dc.date.created 2017-08-09 -
dc.date.issued 2017-03 -
dc.identifier.issn 1556-6013 -
dc.identifier.uri http://hdl.handle.net/20.500.11750/4226 -
dc.description.abstract In this paper, the role of unidirectional limited rate transmitter cooperation is studied for the two-user symmetric Z interference channel (Z-IC) with secrecy constraints at the receivers, in achieving two conflicting goals simultaneously: mitigating interference and ensuring secrecy. First, the problem is studied under the linear deterministic model. A novel scheme for partitioning the encoded messages and outputs based on the relative strengths of the signal and interference is proposed. The partitioning reveals the side information that needs to be provided to the receiver and facilitates the development of tight outer bounds on the secrecy capacity region. The achievable schemes for the deterministic model use a fusion of cooperative precoding and transmission of a jamming signal. The optimality of the proposed scheme is established for the deterministic model for all possible parameter settings. The insights obtained from the deterministic model are used to derive inner and outer bounds on the secrecy capacity region of the two-user Gaussian symmetric Z-IC. The achievable scheme for the Gaussian model uses stochastic encoding in addition to cooperative precoding and transmission of a jamming signal. For the Gaussian case, the secure sum generalized degrees of freedom (GDOF) is characterized and shown to be optimal for the weak/moderate interference regime. It is also shown that the secure sum capacity lies within 2 bits/s/Hz of the outer bound for the weak/moderate interference regime for all values of the capacity of the cooperative link. Interestingly, in the deterministic model, it is found that there is no penalty on the capacity region of the Z-IC due to the secrecy constraints at the receivers in the weak/moderate interference regimes. Similarly, it is found that there is no loss in the secure sum GDOF for the Gaussian case due to the secrecy constraint at the receiver, in the weak/moderate interference regimes. The results highlight the importance of cooperation in facilitating secure communication over the Z-IC. © 2005-2012 IEEE. -
dc.language English -
dc.publisher Institute of Electrical and Electronics Engineers Inc. -
dc.title On the Secrecy Capacity Region of the Two-User Symmetric Z Interference Channel With Unidirectional Transmitter Cooperation -
dc.type Article -
dc.identifier.doi 10.1109/TIFS.2016.2622007 -
dc.identifier.wosid 000394666300002 -
dc.identifier.scopusid 2-s2.0-85014839529 -
dc.identifier.bibliographicCitation IEEE Transactions on Information Forensics and Security, v.12, no.3, pp.572 - 587 -
dc.description.isOpenAccess FALSE -
dc.subject.keywordAuthor Z interference channel -
dc.subject.keywordAuthor information theoretic secrecy -
dc.subject.keywordAuthor deterministic approximation -
dc.subject.keywordAuthor cooperation -
dc.subject.keywordPlus Jamming -
dc.subject.keywordPlus Linear Deterministic Models -
dc.subject.keywordPlus Mitigation -
dc.subject.keywordPlus Relative Strength -
dc.subject.keywordPlus Secrecy Capacity Regions -
dc.subject.keywordPlus Signal Interference -
dc.subject.keywordPlus Stochastic Models -
dc.subject.keywordPlus Stochastic Systems -
dc.subject.keywordPlus Transmitters -
dc.subject.keywordPlus Z Interference Channel -
dc.subject.keywordPlus Achievable Rate Region -
dc.subject.keywordPlus Broadcast Channels -
dc.subject.keywordPlus Channel Capacity -
dc.subject.keywordPlus Communication -
dc.subject.keywordPlus Cooperation -
dc.subject.keywordPlus Degrees of Freedom (Mechanics) -
dc.subject.keywordPlus Deterministic Approximation -
dc.subject.keywordPlus Deterministic Modeling -
dc.subject.keywordPlus Gaussian Distribution -
dc.subject.keywordPlus Gaussian Interference -
dc.subject.keywordPlus Information Theoretic Secrecy -
dc.subject.keywordPlus Information Theory -
dc.subject.keywordPlus Integrated Circuits -
dc.subject.keywordPlus Interference Channels -
dc.subject.keywordPlus Interference Suppression -
dc.citation.endPage 587 -
dc.citation.number 3 -
dc.citation.startPage 572 -
dc.citation.title IEEE Transactions on Information Forensics and Security -
dc.citation.volume 12 -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.relation.journalResearchArea Computer Science; Engineering -
dc.relation.journalWebOfScienceCategory Computer Science, Theory & Methods; Engineering, Electrical & Electronic -
dc.type.docType Article -
Show Simple Item Record

File Downloads

  • There are no files associated with this item.

공유

qrcode
공유하기

Total Views & Downloads