Secure degrees of freedom of the Gaussian wiretap channel with helpers

The secrecy capacity of the canonical Gaussian wiretap channel does not scale with the transmit power, and hence, the secure d.o.f. of the Gaussian wiretap channel with no helpers is zero. It has been known that a strictly positive secure d.o.f. can be obtained in the Gaussian wiretap channel by using a helper which sends structured cooperative signals. We show that the exact secure d.o.f. of the Gaussian wiretap channel with a helper is 1/2. Our achievable scheme is based on real interference alignment and cooperative jamming, which renders the message signal and the cooperative jamming signal separable at the legitimate receiver, but aligns them perfectly at the eavesdropper preventing any reliable decoding of the message signal. Our converse is based on two key lemmas. The first lemma quantifies the secrecy penalty by showing that the net effect of an eavesdropper on the system is that it eliminates one of the independent channel inputs. The second lemma quantifies the role of a helper by developing a direct relationship between the cooperative jamming signal of a helper and the message rate. We extend this result to the case of M helpers, and show that the exact secure d.o.f. in this case is M/M+1.

[1]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[2]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[3]  Aylin Yener,et al.  Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels , 2009, ArXiv.

[4]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[5]  Sennur Ulukus,et al.  Secrecy in Cooperative Relay Broadcast Channels , 2008, IEEE Transactions on Information Theory.

[6]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[7]  Amir K. Khandani,et al.  Real Interference Alignment with Real Numbers , 2009, ArXiv.

[8]  Raef Bassily,et al.  Ergodic Secret Alignment , 2010, IEEE Transactions on Information Theory.

[9]  Elza Erkip,et al.  The Relay Channel with a Wire-tapper , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[10]  Sennur Ulukus,et al.  Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper , 2009, EURASIP J. Wirel. Commun. Netw..

[11]  Aylin Yener,et al.  K-user interference channels: Achievable secrecy rate and degrees of freedom , 2009, 2009 IEEE Information Theory Workshop on Networking and Information Theory.

[12]  Shlomo Shamai,et al.  Compound Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..

[13]  Jianwei Xie,et al.  On the sum secure degrees of freedom of two-unicast layered wireless networks , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[14]  Syed Ali Jafar,et al.  On the secure degrees of freedom of wireless X networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[15]  Andrew Thangaraj,et al.  Confidential messages to a cooperative relay , 2008, 2008 IEEE Information Theory Workshop.

[16]  Ender Tekin,et al.  The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.

[17]  Aylin Yener,et al.  A new outer bound for the gaussian interference channel with confidential messages , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[18]  Xiang He,et al.  Cooperation and information theoretic security in wireless networks. , 2011 .

[19]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[20]  Yasutada Oohama,et al.  Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).

[21]  Amir K. Khandani,et al.  Real Interference Alignment: Exploiting the Potential of Single Antenna Systems , 2009, IEEE Transactions on Information Theory.

[22]  H. Vincent Poor,et al.  The Gaussian wiretap channel with a helping interferer , 2008, 2008 IEEE International Symposium on Information Theory.

[23]  H. Vincent Poor,et al.  Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.

[24]  Sennur Ulukus,et al.  Cooperative Secrecy in Wireless Communications , 2009 .

[25]  Ruoheng Liu,et al.  Securing Wireless Communications at the Physical Layer , 2014 .

[26]  Onur Ozan Koyluoglu,et al.  Cooperative Encoding for Secrecy in Interference Channels , 2011, IEEE Transactions on Information Theory.

[27]  Amir K. Khandani,et al.  On the Secure Degrees-of-Freedom of the Multiple-Access-Channel , 2010, ArXiv.

[28]  Gregory W. Wornell,et al.  Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.

[29]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[30]  Ashish Khisti,et al.  Interference Alignment for the Multiantenna Compound Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[31]  Sennur Ulukus,et al.  Secure broadcasting using multiple antennas , 2010, Journal of Communications and Networks.

[32]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[33]  S. Ulukus,et al.  On the secrecy of multiple access wiretap channel , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[34]  Onur Ozan Koyluoglu,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.

[35]  Sennur Ulukus,et al.  Degraded Compound Multi-Receiver Wiretap Channels , 2009, IEEE Transactions on Information Theory.

[36]  Aylin Yener,et al.  Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[37]  Jin Xu,et al.  Capacity Bounds for Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.

[38]  H. Vincent Poor,et al.  Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.

[39]  A.K. Khandani,et al.  Secure broadcasting : The secrecy rate region , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[40]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[41]  Ashish Khisti,et al.  Artificial-Noise Alignment for Secure Multicast using Multiple Antennas , 2012, IEEE Communications Letters.

[42]  Jianwei Xie,et al.  Real interference alignment for the K-user Gaussian interference compound wiretap channel , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[43]  Yasutada Oohama Relay Channels with Confidential Messages , 2006, ArXiv.