K-user interference channels: Achievable secrecy rate and degrees of freedom

Xiang He, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Scopus citations

    Abstract

    In this work, we consider achievable secrecy rates for symmetric K-user (K ≥ 3) interference channels with confidential messages. We find that nested lattice codes and layered coding are useful in providing secrecy for these channels. Achievable secrecy rates are derived for very strong interference. In addition, we derive the secure degrees of freedom for a range of channel parameters. As a by-product of our approach, we also demonstrate that nested lattice codes are useful for K-user symmetric interference channels without secrecy constraints in that they yield higher degrees of freedom than previous results.

    Original languageEnglish (US)
    Title of host publicationProceedings - 2009 IEEE Information Theory Workshop on Networking and Information Theory, ITW 2009
    Pages336-340
    Number of pages5
    DOIs
    StatePublished - Dec 1 2009
    Event2009 IEEE Information Theory Workshop on Networking and Information Theory, ITW 2009 - Volos, Greece
    Duration: Jun 10 2009Jun 12 2009

    Publication series

    NameProceedings - 2009 IEEE Information Theory Workshop on Networking and Information Theory, ITW 2009

    Other

    Other2009 IEEE Information Theory Workshop on Networking and Information Theory, ITW 2009
    CountryGreece
    CityVolos
    Period6/10/096/12/09

    All Science Journal Classification (ASJC) codes

    • Computer Networks and Communications
    • Information Systems
    • Communication

    Fingerprint Dive into the research topics of 'K-user interference channels: Achievable secrecy rate and degrees of freedom'. Together they form a unique fingerprint.

  • Cite this

    He, X., & Yener, A. (2009). K-user interference channels: Achievable secrecy rate and degrees of freedom. In Proceedings - 2009 IEEE Information Theory Workshop on Networking and Information Theory, ITW 2009 (pp. 336-340). [5158598] (Proceedings - 2009 IEEE Information Theory Workshop on Networking and Information Theory, ITW 2009). https://doi.org/10.1109/ITWNIT.2009.5158598