A New Outer Bound for the Secrecy Capacity Region of the Gaussian Two-Way Wiretap Channel

被引:0
|
作者
He, Xiang [1 ]
Yener, Aylin [1 ]
机构
[1] Penn State Univ, Wireless Commun & Networking Lab, Dept Elect Engn, University Pk, PA 16802 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We investigate the fundamental communication limits when messages are sent via a Gaussian two-way channel, which must at the same time be kept secret from an external eavesdropper. In this two-way wiretap channel that models two legitimate transceivers and an eavesdropping receiver, there are two techniques to provide confidentiality for the messages: one entails the legitimate nodes to jam the eavesdropper, i.e., cooperative jamming, while the other entails generating keys from the feedback signals received by the two legitimate nodes and using them to encrypt the messages. Previous work has shown that both methods can be used concurrently to improve the secrecy rates of a channel with a degradedness condition. In this work, we consider the general case, and derive a new outer bound for the secrecy capacity region of this channel. A case is identified where the loss in secrecy rate, due to ignoring the backward (feedback) link at each legitimate transmitter from the other, is bounded by a constant which only depends on the channel gains. This is the case when the power of the two legitimate nodes increases proportionally. In all other cases, we show that ignoring feedback signals causes unbounded loss in the secrecy rate. The loss is measured as the gap between the achievable rate when the feedback signals are taken into account, and the upper bound when the feedback is not used, and hence is not affected by the choice of the achievable scheme. This result therefore establishes that, for the Gaussian two-way channel with an external eavesdropper, the encoders need to be designed with memory. This is in contrast to the result for this channel in the absence of an eavesdropper.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] On the Secrecy Capacity of Cooperative Wiretap Channel
    Mirzaee, Meysam
    Akhlaghi, Soroush
    2013 IRAN WORKSHOP ON COMMUNICATION AND INFORMATION THEORY (IWCIT), 2013,
  • [32] The Secrecy Capacity of the MIMO Wiretap Channel
    Oggier, Frederique
    Hassibi, Babak
    2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 524 - 528
  • [33] Capacity Analysis for the Gaussian Two-Pair Two-Way Relay Channel
    Li, Yong
    Xin, Haiyang
    Liew, Soung-Chang
    Yuan, Xiaojun
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [34] The Gaussian Two-way Diamond Channel
    Prathyusha, V
    Bhashyam, Srikrishna
    Thangaraj, Andrew
    2013 51ST ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2013, : 1292 - 1299
  • [35] Feedback Enlarges Capacity Region of Two-Way Relay Channel
    Fong, Silas L.
    Yeung, Raymond W.
    2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2011,
  • [36] A New Wiretap Channel Model and its Strong Secrecy Capacity
    Nafea, Mohamed
    Yener, Aylin
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 2804 - 2808
  • [37] A New Wiretap Channel Model and Its Strong Secrecy Capacity
    Nafea, Mohamed
    Yener, Aylin
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (03) : 2077 - 2092
  • [38] The Capacity-Equivocation Region of the MIMO Gaussian Wiretap Channel
    Liu, Ruoheng
    Liu, Tie
    Poor, H. Vincent
    Shamai , Shlomo
    2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 2568 - 2572
  • [39] Capacity-Equivocation Region of the Gaussian MIMO Wiretap Channel
    Ekrem, Ersen
    Ulukus, Sennur
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (09) : 5699 - 5710
  • [40] Strongly Secure Communications Over the Two-Way Wiretap Channel
    Pierrot, Alexandre J.
    Bloch, Matthieu R.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 595 - 605