On the secure interference channel

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

We introduce a secure communication setup of an interference channel whose transmitted signals are fed into interleavers. The interleavers apply random permutations to the signals, and the realizations of the permutations are made known to the receivers but not the transmitters. This communication setup can also model a situation in which the encoders are ignorant of the codebooks of one another, while the decoders are cognizant of the codebooks. We study the capacity region of a two-user secure Z-interference channel, and prove that an asymptotically optimal strategy of the interfered user is to use a constant composition random code. Consequently we establish the result that the capacity region of this channel, in the weak interference regime, is obtained by the Han-Kobayashi coding scheme. Further, we present an outer bound for the secure additive doubly weak interference channel, and an outer bound on the capacity region of the secure additive interference channel with mixed interference.

Original languageEnglish
Title of host publication2013 51st Annual Allerton Conference on Communication, Control, and Computing, Allerton 2013
PublisherIEEE Computer Society
Pages770-773
Number of pages4
ISBN (Print)9781479934096
DOIs
StatePublished - 2013
Event51st Annual Allerton Conference on Communication, Control, and Computing, Allerton 2013 - Monticello, IL, United States
Duration: 2 Oct 20134 Oct 2013

Publication series

Name2013 51st Annual Allerton Conference on Communication, Control, and Computing, Allerton 2013

Conference

Conference51st Annual Allerton Conference on Communication, Control, and Computing, Allerton 2013
Country/TerritoryUnited States
CityMonticello, IL
Period2/10/134/10/13

Fingerprint

Dive into the research topics of 'On the secure interference channel'. Together they form a unique fingerprint.

Cite this