An outer bound on secrecy achievable rate region for BCE

This paper considers the problems of the achievable rate regions on broadcast channel with the eavesdropper (BCE). Many articles have given the meaningful results, like the inner bound of this model. However, the specific analysis processes for this model have not been given by previous work, especially, the outer bound of BCE have not been given. So we focus on the study of the outer bound on the secrecy achievable rate regions of BCE and obtain a convincing result.

[1]  Jie Gu,et al.  Security in Single-Input Single-Output Multiple-helpers Wireless Channel , 2012, 2012 Fourth International Conference on Computational and Information Sciences.

[2]  Zhi Xue,et al.  Artificial Noise Generated in MIMO Scenario: Optimal Power Design , 2013, IEEE Signal Processing Letters.

[3]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[4]  Zhi Xue,et al.  Research on Secrecy Communication via Bilateral Artificial Noise Transmitting , 2013, 2013 International Conference on Computational and Information Sciences.

[5]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[6]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[7]  Amir K. Khandani,et al.  The Secrecy Rate Region of the Broadcast Channel , 2008, ArXiv.

[8]  Katalin Marton,et al.  A coding theorem for the discrete memoryless broadcast channel , 1979, IEEE Trans. Inf. Theory.

[9]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[10]  Alfred O. Hero,et al.  Secure space-time communication , 2003, IEEE Trans. Inf. Theory.

[11]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[12]  Zhi Xue,et al.  Research on the Security of MISO Wireless Channel with Artificial Noise , 2013, 2013 International Conference on Computational and Information Sciences.

[13]  Jie Gu,et al.  Research on the Multiple-Input Single-Output Channel under Attack , 2012, 2012 Fourth International Conference on Computational and Information Sciences.