On the Optimality of Secure Communication Without Using Cooperative Jamming
نویسنده
چکیده
We consider secure communication over a two-user Gaussian interference channel, where each transmitter sends a confidential message to its legitimate receiver. For this setting, we identify a regime where the simple scheme of using Gaussian wiretap codebook at each transmitter (without cooperative jamming) and treating interference as noise at each intended receiver (in short, GWC-TIN scheme) achieves the optimal secure sum capacity to within a constant gap. The results are proved by first considering the deterministic interference channel model and identifying a regime in which a simple scheme without using cooperative jamming is optimal in terms of secure sum capacity. For the symmetric case of the deterministic model, this simple scheme is optimal if and only if the interference-to-signal ratio (in channel strengths) is no more than 2/3.
منابع مشابه
Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer
Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...
متن کاملOn the Secrecy Capacity Region of the 2-user Z Interference Channel with Unidirectional Transmitter Cooperation
In this work, the role of unidirectional limited rate transmitter cooperation is studied in the case of the 2user Z interference channel (Z-IC) with secrecy constraints at the receivers, on achieving two conflicting goals simultaneously: mitigating interference and ensuring secrecy. First, the problem is studied under the linear deterministic model. The achievable schemes for the deterministic ...
متن کاملFriendship-based Cooperative Jamming for Secure Communication in Poisson Networks
Wireless networks with the consideration of social relationships among network nodes are highly appealing for lots of important data communication services. Ensuring the security of such networks is of great importance to facilitate their applications in supporting future social-based services with strong security guarantee. This paper explores the physical layer security-based secure communica...
متن کاملTwo-hop Secure Communication Using an Untrusted Relay
We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted rel...
متن کاملWireless Transmission of Big Data Using Novel Secure Algorithm
This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmis...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1706.06220 شماره
صفحات -
تاریخ انتشار 2017