Topological Interference Management With Confidential Messages
نویسندگان
چکیده
The topological interference management (TIM) problem refers to the study of $K$ -user partially connected networks with no channel state information at transmitters (CSIT), except for knowledge network topology. In this paper, we TIM confidential messages (TIM-CM), where message confidentiality must be satisfied in addition reliability constraints. particular, each transmitted decodable its intended receiver and remain remaining notation="LaTeX">$(K-1)$ receivers. Our main contribution is present a comprehensive set results TIM-CM by studying symmetric secure degrees freedom (SDoF). To end, first characterize necessary sufficient conditions feasibility positive SDoF any arbitrary We next two achievable schemes problem: For scheme, use concept partition and, second one, independent sets. also outer bounds on Using these bounds, optimal all notation="LaTeX">$K=2$ notation="LaTeX">$K=3$ topologies.
منابع مشابه
Cognitive Interference Channels with Confidential Messages
The cognitive interference channel with confidential messages is studied. Similarly to the classical two-user interference channel, the cognitive interference channel consists of two transmitters whose signals interfere at the two receivers. It is assumed that there is a common message source (message 1) known to both transmitters, and an additional independent message source (message 2) known ...
متن کاملThe Gaussian Many-to-1 Interference Channel with Confidential Messages
The many-to-one interference channel has received interest by virtue of embodying the essence of an interference network while being more tractable than the general K-user interference channel. In this paper, we introduce information theoretic secrecy to this model and consider the many-to-one interference channel with confidential messages, in which each receiver, in particular, the one subjec...
متن کاملPolar Coding for the Cognitive Interference Channel with Confidential Messages
In this paper, we propose a low-complexity, secrecy capacity achieving polar coding scheme for the cognitive interference channel with confidential messages (CICC) under the strong secrecy criterion. Existing polar coding schemes for interference channels rely on the use of polar codes for the multiple access channel, the code construction problem of which can be complicated. We show that the w...
متن کاملDiscrete Memoryless Interference and Broadcast Channels with Confidential Messages
Discrete memoryless interference and broadcast channels in which independent confidential messages are sent to two receivers are considered. Confidential messages are transmitted to each receiver with perfect secrecy, as measured by the equivocation at the other receiver. In this paper, we derive inner and outer bounds for the achievable rate regions for these two communication systems.
متن کاملSecure Multiplex Coding Over Interference Channel with Confidential Messages
In this paper, inner and outer bounds on the capacity region of two-user interference channels with two confidential messages have been proposed. By adding secure multiplex coding to the error correction method in [15] which achieves the best achievable capacity region for interference channel up to now, we have shown that the improved secure capacity region compared with [2] now is the whole H...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2022
ISSN: ['0018-9448', '1557-9654']
DOI: https://doi.org/10.1109/tit.2022.3186238