On the Secrecy Capacity Region of the Two-User Symmetric Z Interference Channel With Unidirectional Transmitter Cooperation

In this paper, the role of unidirectional limited rate transmitter cooperation is studied for the two-user symmetric Z interference channel (Z-IC) with secrecy constraints at the receivers, in achieving two conflicting goals simultaneously: mitigating interference and ensuring secrecy. First, the problem is studied under the linear deterministic model. A novel scheme for partitioning the encoded messages and outputs based on the relative strengths of the signal and interference is proposed. The partitioning reveals the side information that needs to be provided to the receiver and facilitates the development of tight outer bounds on the secrecy capacity region. The achievable schemes for the deterministic model use a fusion of cooperative precoding and transmission of a jamming signal. The optimality of the proposed scheme is established for the deterministic model for all possible parameter settings. The insights obtained from the deterministic model are used to derive inner and outer bounds on the secrecy capacity region of the two-user Gaussian symmetric Z-IC. The achievable scheme for the Gaussian model uses stochastic encoding in addition to cooperative precoding and transmission of a jamming signal. For the Gaussian case, the secure sum generalized degrees of freedom (GDOF) is characterized and shown to be optimal for the weak/moderate interference regime. It is also shown that the secure sum capacity lies within 2 bits/s/Hz of the outer bound for the weak/moderate interference regime for all values of the capacity of the cooperative link. Interestingly, in the deterministic model, it is found that there is no penalty on the capacity region of the Z-IC due to the secrecy constraints at the receivers in the weak/moderate interference regimes. Similarly, it is found that there is no loss in the secure sum GDOF for the Gaussian case due to the secrecy constraint at the receiver, in the weak/moderate interference regimes. The results highlight the importance of cooperation in facilitating secure communication over the Z-IC.

[1]  Deniz Gündüz,et al.  Capacity results for a class of deterministic Z-interference channels with unidirectional receiver conferencing , 2011, 2011 6th International ICST Conference on Communications and Networking in China (CHINACOM).

[2]  Aydano B. Carleial,et al.  A case where interference does not reduce capacity (Corresp.) , 1975, IEEE Trans. Inf. Theory.

[3]  Luc Vandendorpe,et al.  Multiaccess Channel With Partially Cooperating Encoders and Security Constraints , 2012, IEEE Transactions on Information Forensics and Security.

[4]  Frans M. J. Willems,et al.  The discrete memoryless multiple access channel with partially cooperating encoders , 1983, IEEE Trans. Inf. Theory.

[5]  Te Sun Han,et al.  A new achievable rate region for the interference channel , 1981, IEEE Trans. Inf. Theory.

[6]  H. Vincent Poor,et al.  Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.

[7]  Hiroki Koga,et al.  Information-Spectrum Methods in Information Theory , 2002 .

[8]  Chandra R. Murthy,et al.  On the Capacity of the Two-User Symmetric Interference Channel With Transmitter Cooperation and Secrecy Constraints , 2016, IEEE Transactions on Information Theory.

[9]  Roy D. Yates,et al.  Secret communication on interference channels , 2008, 2008 IEEE International Symposium on Information Theory.

[10]  Sennur Ulukus,et al.  Secrecy in Cooperative Relay Broadcast Channels , 2011, IEEE Trans. Inf. Theory.

[11]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[12]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[13]  Hua Wang,et al.  Gaussian Interference Channel Capacity to Within One Bit , 2007, IEEE Transactions on Information Theory.

[14]  Matthieu R. Bloch,et al.  Strong Secrecy From Channel Resolvability , 2011, IEEE Transactions on Information Theory.

[15]  Hiroshi Sato,et al.  The capacity of the Gaussian interference channel under strong interference , 1981, IEEE Trans. Inf. Theory.

[16]  Syed Ali Jafar,et al.  Topological Interference Management Through Index Coding , 2013, IEEE Transactions on Information Theory.

[17]  David Tse,et al.  Interference Mitigation Through Limited Receiver Cooperation , 2009, IEEE Transactions on Information Theory.

[18]  Roy D. Yates,et al.  Secrecy capacity region of a class of one-sided interference channel , 2008, 2008 IEEE International Symposium on Information Theory.

[19]  Aylin Yener,et al.  A new outer bound for the gaussian interference channel with confidential messages , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[20]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[21]  Amir K. Khandani,et al.  The Approximate Capacity Region of the Gaussian Z-Interference Channel with Conferencing Encoders , 2010, ArXiv.

[22]  Syed Ali Jafar,et al.  On the Symmetric 2-User Deterministic Interference Channel with Confidential Messages , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[23]  Mojtaba Vaezi,et al.  On the capacity of the cognitive Z-interference channel , 2011, 2011 12th Canadian Workshop on Information Theory.

[24]  Shlomo Shamai,et al.  On the Capacity of a Class of Cognitive Z-Interference Channels , 2011, 2011 IEEE International Conference on Communications (ICC).

[25]  Chandra R. Murthy,et al.  Secrecy in the 2-user symmetric deterministic interference channel with transmitter cooperation , 2013, 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[26]  Chandra R. Murthy,et al.  Capacity of the deterministic z-interference channel with unidirectional transmitter cooperation and secrecy constraints , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[27]  David Tse,et al.  Interference Mitigation Through Limited Transmitter Cooperation , 2011, IEEE Trans. Inf. Theory.

[28]  Vinod M. Prabhakaran,et al.  Interference Channels With Destination Cooperation , 2009, IEEE Transactions on Information Theory.

[29]  Chandra R. Murthy,et al.  Outer Bounds on the Secrecy Capacity Region of the 2-user Z Interference Channel With Unidirectional Transmitter Cooperation , 2016, ArXiv.

[30]  Rafael F. Schaefer,et al.  On the Secrecy Capacity of the Z-Interference Channel , 2016 .

[31]  Onur Ozan Koyluoglu,et al.  Cooperative Encoding for Secrecy in Interference Channels , 2011, IEEE Transactions on Information Theory.

[32]  H. Vincent Poor,et al.  Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.

[33]  Daniela Tuninetti,et al.  New results on the capacity of the Gaussian cognitive interference channel , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[34]  Sennur Ulukus,et al.  Effects of cooperation on the secrecy of multiple access channels with generalized feedback , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[35]  Nan Liu,et al.  On the capacity region of the Gaussian Z-channel , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[36]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[37]  Andrea J. Goldsmith,et al.  Capacity Regions and Bounds for a Class of Z-Interference Channels , 2009, IEEE Transactions on Information Theory.

[38]  Gerhard Kramer,et al.  Topics in Multi-User Information Theory , 2008, Found. Trends Commun. Inf. Theory.

[39]  Wei Yu,et al.  Gaussian Z-Interference Channel With a Relay Link: Achievability Region and Asymptotic Sum Capacity , 2010, IEEE Transactions on Information Theory.

[40]  Tobias J. Oechtering,et al.  An achievable rate region for the Gaussian Z-interference channel with conferencing , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[41]  Vinod M. Prabhakaran,et al.  Interference Channels With Source Cooperation , 2009, IEEE Transactions on Information Theory.

[42]  H. Vincent Poor,et al.  Simplified Han-Kobayashi region for one-sided and mixed Gaussian interference channels , 2016, 2016 IEEE International Conference on Communications (ICC).

[43]  David Tse,et al.  Feedback Capacity of the Gaussian Interference Channel to Within 2 Bits , 2010, IEEE Transactions on Information Theory.