SDMA with secrecy constraints

Wireless transmission requires the access to a shared medium, so the communication may be susceptible to adversarial eavesdropping. This paper describes how eavesdropping can potentially be limited by resorting to waterfilling-like algorithms by introducing additional constraints. A Gaussian Wire-Tap Channel (WTC) has been considered as the channel in which a transmitter sends confidential messages to its reference receiver in the presence of a passive eavesdropper. In the more general context of an ad-hoc network, we propose two different Space Division Multiple Access (SDMA) techniques by paying attention to the rate of the main link and to secrecy level. Through numerical analysis, we show the information-secrecy regions to evaluate the quality of main link and secrecy level that the algorithms can allow when constrained SDMA is considered. Finally, we evaluate the effect of interference (induced by users sharing the same transmission resource) to evaluate the effect of disturbing signals on information rate and secrecy.

[1]  Roy D. Yates,et al.  The Discrete Memoryless Multiple Access Channel with Confidential Messages , 2006, 2006 IEEE International Symposium on Information Theory.

[2]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[3]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[4]  H. Vincent Poor,et al.  Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.

[5]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[6]  Enzo Baccarelli,et al.  On the Information Rate of Multiantenna Systems With Isotropic Unitary Input Signals in the Presence of Channel Estimation Errors , 2007, IEEE Transactions on Signal Processing.

[7]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[8]  P. Deuflhard Newton Methods for Nonlinear Problems: Affine Invariance and Adaptive Algorithms , 2011 .

[9]  H. Vincent Poor,et al.  Multiple Access Channels with Generalized Feedback and Confidential Messages , 2007, 2007 IEEE Information Theory Workshop.

[10]  Enzo Baccarelli,et al.  Power-allocation policy and optimized design of multiple-antenna systems with imperfect channel estimation , 2004, IEEE Transactions on Vehicular Technology.

[11]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[12]  Yasutada Oohama,et al.  Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).

[13]  Shlomo Shamai,et al.  Cognitive Interference Channels with Confidential Messages , 2007, ArXiv.

[14]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[15]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[16]  Elza Erkip,et al.  The Relay Channel with a Wire-tapper , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[17]  Enzo Baccarelli,et al.  Optimized Power Allocation for Multiantenna Systems Impaired by Multiple Access Interference and Imperfect Channel Estimation , 2007, IEEE Transactions on Vehicular Technology.

[18]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[19]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.