Fading Cognitive Multiple-Access Channels With Confidential Messages
Open Access
- 25 July 2011
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Theory
- Vol. 57 (8), 4992-5005
- https://doi.org/10.1109/tit.2011.2158471
Abstract
The fading cognitive multiple-access channel with confidential messages (CMAC-CM) is investigated, in which two users (users 1 and 2) wish to transmit a common message to a destination and user 1 also has a confidential message intended for the destination. The two users transmit to the destination via a multiple access channel, and user 2 also receives noisy channel outputs. Such channel outputs potentially help user 2 to learn user 1's confidential information (although they are not exploited by user 2 for channel transmission). Hence, user 1 views user 2 as an eavesdropper and wishes to keep its confidential message as secret as possible from user 2. A parallel CMAC-CM with independent subchannels is first studied. The secrecy capacity region of the parallel CMAC-CM is established, which yields the secrecy capacity regions of the parallel CMAC-CM with degraded subchannels and the parallel Gaussian CMAC-CM. These results are then applied to study the fading CMAC-CM, in which both the user-to-user channel and the user-to-destination channel are corrupted by multiplicative fading gain coefficients in addition to additive white Gaussian noise. The channel state information (CSI) is assumed to be known at both the users and the destination. With the CSI, users can dynamically change their transmission powers with the channel realization to achieve the optimal performance. The closed-form power allocation function that achieves every boundary point of the secrecy capacity region is derived.Keywords
Other Versions
This publication has 24 references indexed in Scilit:
- Secrecy in Cooperative Relay Broadcast ChannelsIEEE Transactions on Information Theory, 2010
- Cooperation With an Untrusted Relay: A Secrecy PerspectiveIEEE Transactions on Information Theory, 2010
- Two-Hop Secure Communication Using an Untrusted RelayEURASIP Journal on Wireless Communications and Networking, 2009
- A new achievable ergodic secrecy rate region for the fading multiple access wiretap channelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading ChannelsIEEE Transactions on Information Theory, 2009
- The Cognitive Multiple Access Wire-Tap ChannelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- On the Secrecy Capacity of Fading ChannelsIEEE Transactions on Information Theory, 2008
- Secure Communication Over Fading ChannelsIEEE Transactions on Information Theory, 2008
- An Extremal Inequality Motivated by Multiterminal Information-Theoretic ProblemsIEEE Transactions on Information Theory, 2007
- Elements of Information TheoryPublished by Wiley ,2001