Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper
This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any jamming strategy subject to a given power constraint and shares her jamm...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-11-01
|
Series: | Entropy |
Subjects: | |
Online Access: | https://www.mdpi.com/1099-4300/24/11/1595 |
_version_ | 1797468402171772928 |
---|---|
author | Rémi A. Chou Aylin Yener |
author_facet | Rémi A. Chou Aylin Yener |
author_sort | Rémi A. Chou |
collection | DOAJ |
description | This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any jamming strategy subject to a given power constraint and shares her jamming signal with the eavesdropper. Four such models are considered: (i) the Gaussian point-to-point wiretap channel; (ii) the Gaussian multiple-access wiretap channel; (iii) the Gaussian broadcast wiretap channel; and (iv) the Gaussian symmetric interference wiretap channel. The use of pre-shared randomness between the legitimate users is not allowed in our models. Inner and outer bounds are derived for these four models. For (i), the secrecy capacity is obtained. For (ii) and (iv) under a degraded setup, the optimal secrecy sum-rate is characterized. Finally, for (iii), ranges of model parameter values for which the inner and outer bounds coincide are identified. |
first_indexed | 2024-03-09T19:05:58Z |
format | Article |
id | doaj.art-f28cafedf72d492a97cfef00c04bb24e |
institution | Directory Open Access Journal |
issn | 1099-4300 |
language | English |
last_indexed | 2024-03-09T19:05:58Z |
publishDate | 2022-11-01 |
publisher | MDPI AG |
record_format | Article |
series | Entropy |
spelling | doaj.art-f28cafedf72d492a97cfef00c04bb24e2023-11-24T04:36:49ZengMDPI AGEntropy1099-43002022-11-012411159510.3390/e24111595Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided EavesdropperRémi A. Chou0Aylin Yener1Department of Electrical Engineering and Computer Science, Wichita State University, Wichita, KS 67260, USADepartment of Electrical and Computer Engineering, The Ohio State University, Columbus, OH 43210, USAThis paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any jamming strategy subject to a given power constraint and shares her jamming signal with the eavesdropper. Four such models are considered: (i) the Gaussian point-to-point wiretap channel; (ii) the Gaussian multiple-access wiretap channel; (iii) the Gaussian broadcast wiretap channel; and (iv) the Gaussian symmetric interference wiretap channel. The use of pre-shared randomness between the legitimate users is not allowed in our models. Inner and outer bounds are derived for these four models. For (i), the secrecy capacity is obtained. For (ii) and (iv) under a degraded setup, the optimal secrecy sum-rate is characterized. Finally, for (iii), ranges of model parameter values for which the inner and outer bounds coincide are identified.https://www.mdpi.com/1099-4300/24/11/1595Gaussian wiretap channelGaussian multiple-access wiretap channelGaussian broadcast wiretap channeljammingsecure communication |
spellingShingle | Rémi A. Chou Aylin Yener Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper Entropy Gaussian wiretap channel Gaussian multiple-access wiretap channel Gaussian broadcast wiretap channel jamming secure communication |
title | Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper |
title_full | Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper |
title_fullStr | Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper |
title_full_unstemmed | Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper |
title_short | Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper |
title_sort | gaussian multiuser wiretap channels in the presence of a jammer aided eavesdropper |
topic | Gaussian wiretap channel Gaussian multiple-access wiretap channel Gaussian broadcast wiretap channel jamming secure communication |
url | https://www.mdpi.com/1099-4300/24/11/1595 |
work_keys_str_mv | AT remiachou gaussianmultiuserwiretapchannelsinthepresenceofajammeraidedeavesdropper AT aylinyener gaussianmultiuserwiretapchannelsinthepresenceofajammeraidedeavesdropper |