By Topic

Ergodic Secret Alignment

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Bassily, R. ; Dept. of Electr. & Comput. Eng., Univ. of Maryland, College Park, MD, USA ; Ulukus, Sennur

In this paper, we introduce two new achievable schemes for the fading multiple access wiretap channel (MAC-WT). In the model that we consider, we assume that perfect knowledge of the state of all channels is available at all the nodes in a causal fashion. Our schemes use this knowledge together with the time-varying nature of the channel model to align the interference from different users at the eavesdropper perfectly in a one-dimensional space while creating a higher dimensionality space for the interfering signals at the legitimate receiver, hence allowing for better chance of recovery. While we achieve this alignment through signal scaling at the transmitters in our first scheme (scaling-based alignment), we let nature provide this alignment through the ergodicity of the channel coefficients in the second scheme [ergodic secret alignment (ESA)],. For each scheme, we obtain the resulting achievable secrecy rate region. We show that the secrecy rates achieved by both schemes in the two-user fading MAC-WT scale with signal-to-noise ratio (SNR) as. Hence, we show the suboptimality of the independent identically distributed (i.i.d.) Gaussian signaling-based schemes with and without cooperative jamming by showing that the secrecy rates achieved using i.i.d. Gaussian signaling with cooperative jamming do not scale with SNR. In addition, we introduce an improved version of our ESA scheme where we incorporate cooperative jamming to achieve higher secrecy rates. Moreover, we derive the necessary optimality conditions for the power control policy that maximizes the secrecy sum rate achievable by our ESA scheme when used solely and with cooperative jamming. Finally, we discuss the extension of the proposed schemes to the case where there are more than two users and show that, for the -user fading MAC-WT, each of the two schemes achieves secrecy sum rate that scales with SNR as.

Published in:

Information Theory, IEEE Transactions on  (Volume:58 ,  Issue: 3 )