The Gaussian multiple access wiretap channel when the eavesdropper can arbitrarily jam

We study the Gaussian multiple access channel in presence of an adversary, who is simultaneously able to eavesdrop and jam, i.e., an active wiretapper. We assume that the adversary has a power constraint, which she can utilize to have any arbitrary jamming strategy. The multiple access channel between the legitimate transmitters and the receiver thus becomes arbitrarily varying. We derive inner and outer bounds on the secrecy rate region of our model. In the case of a degraded channel, we characterize the optimal secrecy sum-rate, and within 0.5 bits per channel use the optimal individual rate constraints. As a special case, we obtain the secrecy capacity of the point-to-point Gaussian wiretap channel when the eavesdropper is able to arbitrarily jam.

[1]  Sennur Ulukus,et al.  Achievable secrecy rates in the multiple access wiretap channel with deviating users , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[2]  Moritz Wiese,et al.  A Channel Under Simultaneous Jamming and Eavesdropping Attack—Correlated Random Coding Capacities Under Strong Secrecy Criteria , 2014, IEEE Transactions on Information Theory.

[3]  Philip A. Whiting,et al.  Rate-splitting multiple access for discrete memoryless channels , 2001, IEEE Trans. Inf. Theory.

[4]  Moritz Wiese,et al.  The Arbitrarily Varying Wiretap Channel - Secret Randomness, Stability, and Super-Activation , 2016, IEEE Trans. Inf. Theory.

[5]  Imre Csiszár,et al.  Capacity of the Gaussian arbitrarily varying channel , 1991, IEEE Trans. Inf. Theory.

[6]  J. Nicholas Laneman,et al.  Arbitrary jamming can preclude secure communication , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[7]  Amin Gohari,et al.  Achievability Proof via Output Statistics of Random Binning , 2014, IEEE Trans. Inf. Theory.

[8]  George T. Amariucai,et al.  Half-Duplex Active Eavesdropping in Fast-Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme , 2012, IEEE Transactions on Information Theory.

[9]  Ender Tekin,et al.  The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.

[10]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[11]  Holger Boche,et al.  Capacity Results for Arbitrarily Varying Wiretap Channels , 2012, Information Theory, Combinatorics, and Search Theory.

[12]  A. Lee Swindlehurst,et al.  Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.

[13]  Holger Boche,et al.  Capacity results and super-activation for wiretap channels with active wiretappers , 2013, IEEE Transactions on Information Forensics and Security.

[14]  S. Ulukus,et al.  On the secrecy of multiple access wiretap channel , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[15]  Remi A. Chou,et al.  Polar coding for the multiple access wiretap channel via rate-splitting and cooperative jamming , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[16]  Aylin Yener,et al.  MIMO Wiretap Channels With Unknown and Varying Eavesdropper Channel States , 2014, IEEE Transactions on Information Theory.

[17]  Can Emre Koksal,et al.  On the Secrecy Capacity of Block Fading Channels With a Hybrid Adversary , 2013, IEEE Transactions on Information Theory.

[18]  Himanshu Tyagi,et al.  Explicit capacity-achieving coding scheme for the Gaussian wiretap channel , 2014, 2014 IEEE International Symposium on Information Theory.

[19]  Matthieu R. Bloch,et al.  Strong Secrecy From Channel Resolvability , 2011, IEEE Transactions on Information Theory.

[20]  Haim H. Permuter,et al.  Arbitrarily Varying Wiretap Channels with Type Constrained States , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[21]  Richard J. La,et al.  DIMACS Series in Discrete Mathematics and Theoretical Computer Science A Game-theoretic Look at the Gaussian Multiaccess Channel , 2022 .