Sciweavers

Share
TIT
2016

Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure

3 years 7 months ago
Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure
—In this paper, we determine the entire secure degrees of freedom (s.d.o.f.) regions of the K-user Gaussian multiple access (MAC) wiretap channel and the K-user interference channel (IC) with secrecy constraints. For the IC, we consider three secrecy constraints: K-user IC with an external eavesdropper (ICEE), K-user IC with confidential messages (IC-CM), and their combination Kuser IC with confidential messages and external eavesdropper (IC-CM-EE). The converse for the IC includes constraints both due to secrecy as well as due to interference. For the IC, although the portion of the region close to the optimum sum s.d.o.f. point is governed by the upper bounds due to secrecy constraints, the other portions of the region are governed by the upper bounds due to interference constraints. Different from the existing literature, in order to fully understand the characterization of the s.d.o.f. region of the IC, one has to study the four-user case, i.e., the two- or three-user cases do ...
Jianwei Xie, Sennur Ulukus
Added 11 Apr 2016
Updated 11 Apr 2016
Type Journal
Year 2016
Where TIT
Authors Jianwei Xie, Sennur Ulukus
Comments (0)
books