The Caching Broadcast Channel with a Wire and Cache Tapping Adversary of Type II

08/07/2018
by   Mohamed Nafea, et al.
0

This paper introduces the notion of cache-tapping into the information theoretic models of coded caching. In particular, the wiretap II channel model in the presence of multiple receivers equipped with fixed-size cache memories, and an adversary who is able to choose symbols to tap into from cache placement, in addition to or in lieu of, delivery transmission, is introduced. The model is hence termed the caching broadcast channel with a wire and cache tapping adversary of type II. The legitimate parties know neither whether cache placement, delivery, or both phases are tapped, nor the positions in which they are tapped. Only the size of the overall tapped set is known. For the instance of two receivers and two library files, the strong secrecy capacity of the model, i.e., the maximum achievable file rate while keeping the overall library strongly secure, is identified. Lower and upper bounds on the achievable strong secrecy file rate are derived when the library has more than two files. Achievability schemes in this paper rely on a code design which combines wiretap coding, security embedding codes, one-time pad keys, and coded caching. A genie-aided upper bound, in which a genie provides the transmitter with user demands before cache placement, establishes the converse for the two files instance. For the library of more than two files, the upper bound is constructed by three successive channel transformations. Our results establish that strong information theoretic security is possible against a powerful adversary who optimizes its attack over both phases of communication in a cache-aided system.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/11/2023

Cache-Aided K-User Broadcast Channels with State Information at Receivers

We study a K-user coded-caching broadcast problem in a joint source-chan...
research
01/02/2018

Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels

This paper derives upper and lower bounds on the secrecy capacity-memory...
research
09/18/2018

Device-to-Device Secure Coded Caching

This paper studies device to device (D2D) coded-caching with information...
research
06/19/2018

Rate-Memory Trade-Off for Caching and Delivery of Correlated Sources

This paper studies the fundamental limits of content delivery in a cache...
research
03/11/2018

Delivery Time Minimization in Cache-Assisted Broadcast-Relay Wireless Networks with Imperfect CSI

An emerging trend of next generation communication systems is to provide...
research
06/26/2018

On the Capacity Region of a Cache-Aided Gaussian Broadcast Channel with Multi-Layer Messages

A cache-aided K-user Gaussian broadcast channel (BC) is studied. The tra...
research
12/09/2017

Caching and Coded Delivery over Gaussian Broadcast Channels for Energy Efficiency

A cache-aided K-user Gaussian broadcast channel (BC) is considered. The ...

Please sign up or login with your details

Forgot password? Click here to reset