Deep Learning for the Gaussian Wiretap Channel

by   Rick Fritschek, et al.
Freie Universität Berlin
Berlin Institute of Technology (Technische Universität Berlin)

End-to-end learning of communication systems with neural networks and particularly autoencoders is an emerging research direction which gained popularity in the last year. In this approach, neural networks learn to simultaneously optimize encoding and decoding functions to establish reliable message transmission. In this paper, this line of thinking is extended to communication scenarios in which an eavesdropper must further be kept ignorant about the communication. The secrecy of the transmission is achieved by utilizing a modified secure loss function based on cross-entropy which can be implemented with state-of-the-art machine-learning libraries. This secure loss function approach is applied in a Gaussian wiretap channel setup, for which it is shown that the neural network learns a trade-off between reliable communication and information secrecy by clustering learned constellations. As a result, an eavesdropper with higher noise cannot distinguish between the symbols anymore.


page 1

page 2

page 3

page 4


Secure Deep-JSCC Against Multiple Eavesdroppers

In this paper, a generalization of deep learning-aided joint source chan...

Learning End-to-End Codes for the BPSK-constrained Gaussian Wiretap Channel

Finite-length codes are learned for the Gaussian wiretap channel in an e...

Capacity-Approaching Autoencoders for Communications

The autoencoder concept has fostered the reinterpretation and the design...

Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free One-Way Public Communication

It is natural in a quantum network system that multiple users intend to ...

The Secrecy Gain of Formally Unimodular Lattices on the Gaussian Wiretap Channel

We consider lattice coding for the Gaussian wiretap channel, where the c...

Deep Divergence-Based Approach to Clustering

A promising direction in deep learning research consists in learning rep...

Constrained Secrecy Capacity of Partial-Response Wiretap Channels

We consider reliable and secure communication over partial-response wire...

Please sign up or login with your details

Forgot password? Click here to reset