TY - GEN
T1 - On the secure interference channel
AU - Somekh-Baruch, Anelia
PY - 2013
Y1 - 2013
N2 - We introduce a secure communication setup of an interference channel whose transmitted signals are fed into interleavers. The interleavers apply random permutations to the signals, and the realizations of the permutations are made known to the receivers but not the transmitters. This communication setup can also model a situation in which the encoders are ignorant of the codebooks of one another, while the decoders are cognizant of the codebooks. We study the capacity region of a two-user secure Z-interference channel, and prove that an asymptotically optimal strategy of the interfered user is to use a constant composition random code. Consequently we establish the result that the capacity region of this channel, in the weak interference regime, is obtained by the Han-Kobayashi coding scheme. Further, we present an outer bound for the secure additive doubly weak interference channel, and an outer bound on the capacity region of the secure additive interference channel with mixed interference.
AB - We introduce a secure communication setup of an interference channel whose transmitted signals are fed into interleavers. The interleavers apply random permutations to the signals, and the realizations of the permutations are made known to the receivers but not the transmitters. This communication setup can also model a situation in which the encoders are ignorant of the codebooks of one another, while the decoders are cognizant of the codebooks. We study the capacity region of a two-user secure Z-interference channel, and prove that an asymptotically optimal strategy of the interfered user is to use a constant composition random code. Consequently we establish the result that the capacity region of this channel, in the weak interference regime, is obtained by the Han-Kobayashi coding scheme. Further, we present an outer bound for the secure additive doubly weak interference channel, and an outer bound on the capacity region of the secure additive interference channel with mixed interference.
UR - http://www.scopus.com/inward/record.url?scp=84897687551&partnerID=8YFLogxK
U2 - 10.1109/allerton.2013.6736602
DO - 10.1109/allerton.2013.6736602
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:84897687551
SN - 9781479934096
T3 - 2013 51st Annual Allerton Conference on Communication, Control, and Computing, Allerton 2013
SP - 770
EP - 773
BT - 2013 51st Annual Allerton Conference on Communication, Control, and Computing, Allerton 2013
PB - IEEE Computer Society
T2 - 51st Annual Allerton Conference on Communication, Control, and Computing, Allerton 2013
Y2 - 2 October 2013 through 4 October 2013
ER -