Secure Communication Over Fading Channels
Top Cited Papers
- 23 May 2008
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Theory
- Vol. 54 (6) , 2470-2492
- https://doi.org/10.1109/tit.2008.921678
Abstract
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1. The confidential information needs to be kept as secret as possible from receiver 2. The broadcast channel from the source node to receivers 1 and 2 is corrupted by multiplicative fading gain coefficients in addition to additive Gaussian noise terms. The channel state information (CSI) is assumed to be known at both the transmitter and the receivers. The parallel BCC with independent subchannels is first studied, which serves as an information-theoretic model for the fading BCC. The secrecy capacity region of the parallel BCC is established, which gives the secrecy capacity region of the parallel BCC with degraded subchannels. The secrecy capacity region is then established for the parallel Gaussian BCC, and the optimal source power allocations that achieve the boundary of the secrecy capacity region are derived. In particular, the secrecy capacity region is established for the basic Gaussian BCC. The secrecy capacity results are then applied to study the fading BCC. The ergodic performance is first studied. The ergodic secrecy capacity region and the optimal power allocations that achieve the boundary of this region are derived. The outage performance is then studied, where a long-term power constraint is assumed. The power allocation is derived that minimizes the outage probability where either the target rate of the common message or the target rate of the confidential message is not achieved. The power allocation is also derived that minimizes the outage probability where the target rate of the confidential message is not achieved subject to the constraint that the target rate of the common message must be achieved for all channel states.Keywords
All Related Versions
This publication has 47 references indexed in Scilit:
- Compound Wiretap ChannelsEURASIP Journal on Wireless Communications and Networking, 2009
- Secure Broadcasting Over Fading ChannelsIEEE Transactions on Information Theory, 2008
- Wireless Information-Theoretic SecurityIEEE Transactions on Information Theory, 2008
- Secure Nested Codes for Type II Wiretap ChannelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Applications of LDPC Codes to the Wiretap ChannelIEEE Transactions on Information Theory, 2007
- General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channelIEEE Transactions on Information Theory, 2006
- Common randomness and secret key generation with a helperIEEE Transactions on Information Theory, 2000
- Common randomness in information theory and cryptography. II. CR capacityIEEE Transactions on Information Theory, 1998
- Common randomness in information theory and cryptography. I. Secret sharingIEEE Transactions on Information Theory, 1993
- Secret key agreement by public discussion from common informationIEEE Transactions on Information Theory, 1993