Adding a Helper Can Totally Remove the Secrecy Constraints in a Two-User Interference Channel

You are here

Top Reasons to Join SPS Today!

1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.

Adding a Helper Can Totally Remove the Secrecy Constraints in a Two-User Interference Channel

By: 
Jinyuan Chen; Fan Li

In many communication channels, secrecy constraints usually incur a penalty in capacity, as well as generalized degrees-of-freedom (GDoF). In this paper, we show an interesting observation that adding a helper can totally remove the penalty in sum GDoF for a two-user symmetric Gaussian interference channel. For the interference channel where each transmitter sends a message to an intended receiver without secrecy constraints, the sum GDoF is a well-known “W” curve, characterized by Etkin–Tse–Wang in 2008. If the secrecy constraints are imposed on this interference channel, where the message of each transmitter must be secure from the unintended receiver (eavesdropper), then a GDoF penalty is incurred and the secure sum GDoF is reduced to a modified “W” curve, derived by Chen recently. In this paper, we show that, by adding a helper into this interference channel with secrecy constraints, the secure sum GDoF turns out to be a “W” curve, which is the same as the sum GDoF of the setting without secrecy constraints. The proposed scheme is based on the cooperative jamming and a careful signal design such that the jamming signal of the helper is aligned at a specific direction and power level with the information signals of the transmitters, which allows us to totally remove the penalty in GDoF due to the secrecy constraints. Furthermore, the estimation approaches of noise removal and signal separation due to the rational independence are used in the secure rate analysis.

Table of Contents:

TIFS Featured Articles

SPS on Facebook

SPS on Twitter

  • We are thrilled to announce the final three teams for the 2019 IEEE Video and Image Processing Cup competition! The… https://t.co/OGFZG55XXq
  • SPS WEBINAR: Join Dr. Danfeng (Daphne) Yao for “Data Breaches and Multiple Points to Stop Them” on Wednesday, 18 Se… https://t.co/QOpIO0jEec
  • Please note that the deadline to apply has been extended to Tuesday, 27 August. https://t.co/eMhaPwhnV4

SPS Videos


Signal Processing in Home Assistants

 


Multimedia Forensics


Careers in Signal Processing             

 


Under the Radar