Secure Communication over Interference Channel: To Jam or Not to Jam?

10/30/2018
by   Jinyuan Chen, et al.
0

We consider a secure communication over a two-user Gaussian interference channel, where each transmitter sends a confidential message to its legitimate receiver. For this setting, we identify a regime where the simple scheme of using Gaussian wiretap codebook at each transmitter (without cooperative jamming) and treating interference as noise at each intended receiver (in short, GWC-TIN scheme) achieves the optimal secure sum capacity to within a constant gap. For the symmetric case, this simple scheme is optimal when the interference-to-signal ratio (all link strengths in decibel scale) is no more than 2/3. However, when the ratio is more than 2/3, we show that this simple scheme is not optimal anymore and a scheme with cooperative jamming is proposed to achieve the optimal secure sum generalized degrees-of-freedom (GDoF). Specifically, for the symmetric case, we complete the optimal secure sum GDoF characterization for all the interference regimes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/26/2018

Optimal Secure GDoF of Symmetric Gaussian Wiretap Channel with a Helper

We study a symmetric Gaussian wiretap channel with a helper, where a con...
research
10/28/2019

Multi-layer Interference Alignment and GDoF of the K-User Asymmetric Interference Channel

In wireless networks, link strengths are often affected by some topologi...
research
12/09/2018

On the Generalized Degrees of Freedom of Noncoherent Interference Channel

We study the generalized degrees of freedom (gDoF) of the block-fading n...
research
10/27/2020

Topological Interference Management with Confidential Messages

The topological interference management (TIM) problem refers to the stud...
research
04/14/2020

Scalable Security in Interference Channels With Arbitrary Number of Users

In this paper, we present an achievable security scheme for an interfere...
research
04/14/2020

Towards Scalable Security in Interference Channels With Arbitrary Number of Users

In this paper, we present an achievable security scheme for an interfere...
research
08/27/2018

Opportunistic Treating Interference as Noise

We consider a K-user interference network with M states, where each tran...

Please sign up or login with your details

Forgot password? Click here to reset