Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper

This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any jamming strategy subject to a given power constraint and shares her jamm...

Full description

Bibliographic Details
Main Authors: Rémi A. Chou, Aylin Yener
Format: Article
Language:English
Published: MDPI AG 2022-11-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/24/11/1595
_version_ 1797468402171772928
author Rémi A. Chou
Aylin Yener
author_facet Rémi A. Chou
Aylin Yener
author_sort Rémi A. Chou
collection DOAJ
description This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any jamming strategy subject to a given power constraint and shares her jamming signal with the eavesdropper. Four such models are considered: (i) the Gaussian point-to-point wiretap channel; (ii) the Gaussian multiple-access wiretap channel; (iii) the Gaussian broadcast wiretap channel; and (iv) the Gaussian symmetric interference wiretap channel. The use of pre-shared randomness between the legitimate users is not allowed in our models. Inner and outer bounds are derived for these four models. For (i), the secrecy capacity is obtained. For (ii) and (iv) under a degraded setup, the optimal secrecy sum-rate is characterized. Finally, for (iii), ranges of model parameter values for which the inner and outer bounds coincide are identified.
first_indexed 2024-03-09T19:05:58Z
format Article
id doaj.art-f28cafedf72d492a97cfef00c04bb24e
institution Directory Open Access Journal
issn 1099-4300
language English
last_indexed 2024-03-09T19:05:58Z
publishDate 2022-11-01
publisher MDPI AG
record_format Article
series Entropy
spelling doaj.art-f28cafedf72d492a97cfef00c04bb24e2023-11-24T04:36:49ZengMDPI AGEntropy1099-43002022-11-012411159510.3390/e24111595Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided EavesdropperRémi A. Chou0Aylin Yener1Department of Electrical Engineering and Computer Science, Wichita State University, Wichita, KS 67260, USADepartment of Electrical and Computer Engineering, The Ohio State University, Columbus, OH 43210, USAThis paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any jamming strategy subject to a given power constraint and shares her jamming signal with the eavesdropper. Four such models are considered: (i) the Gaussian point-to-point wiretap channel; (ii) the Gaussian multiple-access wiretap channel; (iii) the Gaussian broadcast wiretap channel; and (iv) the Gaussian symmetric interference wiretap channel. The use of pre-shared randomness between the legitimate users is not allowed in our models. Inner and outer bounds are derived for these four models. For (i), the secrecy capacity is obtained. For (ii) and (iv) under a degraded setup, the optimal secrecy sum-rate is characterized. Finally, for (iii), ranges of model parameter values for which the inner and outer bounds coincide are identified.https://www.mdpi.com/1099-4300/24/11/1595Gaussian wiretap channelGaussian multiple-access wiretap channelGaussian broadcast wiretap channeljammingsecure communication
spellingShingle Rémi A. Chou
Aylin Yener
Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper
Entropy
Gaussian wiretap channel
Gaussian multiple-access wiretap channel
Gaussian broadcast wiretap channel
jamming
secure communication
title Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper
title_full Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper
title_fullStr Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper
title_full_unstemmed Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper
title_short Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper
title_sort gaussian multiuser wiretap channels in the presence of a jammer aided eavesdropper
topic Gaussian wiretap channel
Gaussian multiple-access wiretap channel
Gaussian broadcast wiretap channel
jamming
secure communication
url https://www.mdpi.com/1099-4300/24/11/1595
work_keys_str_mv AT remiachou gaussianmultiuserwiretapchannelsinthepresenceofajammeraidedeavesdropper
AT aylinyener gaussianmultiuserwiretapchannelsinthepresenceofajammeraidedeavesdropper