...
首页> 外文期刊>IEEE Transactions on Information Theory >Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure
【24h】

Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure

机译:多路访问和干扰信道的安全自由度区域:多拓扑结构

获取原文
获取原文并翻译 | 示例
           

摘要

In this paper, we determine the entire secure degrees of freedom (s.d.o.f.) regions of the -user Gaussian multiple access (MAC) wiretap channel and the -user interference channel (IC) with secrecy constraints. For the IC, we consider three secrecy constraints: K-user IC with an external eavesdropper (IC-EE), K-user IC with confidential messages (IC-CM), and their combination Kuser IC with confidential messages and external eavesdropper (IC-CM-EE). The converse for the IC includes constraints both due to secrecy as well as due to interference. For the IC, although the portion of the region close to the optimum sum s.d.o.f. point is governed by the upper bounds due to secrecy constraints, the other portions of the region are governed by the upper bounds due to interference constraints. Different from the existing literature, in order to fully understand the characterization of the s.d.o.f. region of the IC, one has to study the four-user case, i.e., the two- or three-user cases do not illustrate the full generality of the problem. In order to prove the achievability, we use the polytope structure of the converse region. In both MAC and IC cases, we develop explicit schemes that achieve the extreme points of the polytope region given by the converse. In particular, the extreme points of the MAC region are achieved by an -user MAC wiretap channel with helpers, i.e., by setting users’ secure rates to zero and utilizing them as pure (structured) cooperative jammers. The extreme points of the IC region are achieved by a
机译:在本文中,我们确定具有保密约束的-用户高斯多址(MAC)窃听通道和-用户干扰通道(IC)的整个安全自由度(s.d.o.f.)区域。对于IC,我们考虑了三个保密约束:带有外部窃听程序的K用户IC(IC-EE),带有机密消息的K用户IC(IC-CM)以及具有机密消息和外部窃听程序(IC)的Kuser IC组合-CM-EE)。 IC的相反情况包括由于保密性和干扰引起的约束。对于IC,尽管该区域的一部分接近最佳总和s.d.o.f。由于保密约束,该点由上限控制,而由于干扰约束,该区域的其他部分由上限控制。与现有文献不同,为了充分理解s.d.o.f.的特征。在IC区域,必须研究四用户案例,即两用户或三用户案例不能说明问题的全部普遍性。为了证明可实现性,我们使用了反向区域的多表位结构。在MAC和IC情况下,我们都开发了明确的方案来实现相反给出的多表位区域的极点。尤其是,MAC区域的极限点是通过具有帮助者的用户MAC窃听通道实现的,即通过将用户的安全率设置为零并将其用作纯(结构化)协作干扰器来实现。 IC区域的极限点是通过

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号