The Gaussian interference wiretap channel when the eavesdropper channel is arbitrarily varying

Xiang He, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations

    Abstract

    In this work we considered the Gaussian two-user interference channel where the eavesdropper channel is arbitrarily varying, all channel matrices have rank less than or equal to 2, and the eavesdropper has 1 antenna. We identify a class of these channel models for which the secrecy degrees of freedom (s.d.o.f.) region is achieved by letting only one user transmit a time. We also provided a non-trivial example for which such a transmission strategy is sub-optimal in terms of s.d.o.f. region. The achievable scheme for this example introduces a new technique to achieve secrecy for MIMO wiretap channels, in which the transmitter-receiver pair uses linear precoding so that effectively the signals are beam-formed toward a direction that can not be attained by the eavesdropper and is at the same time orthogonal to interference from the other user.

    Original languageEnglish (US)
    Title of host publication2012 IEEE International Symposium on Information Theory Proceedings, ISIT 2012
    Pages2316-2320
    Number of pages5
    DOIs
    StatePublished - 2012
    Event2012 IEEE International Symposium on Information Theory, ISIT 2012 - Cambridge, MA, United States
    Duration: Jul 1 2012Jul 6 2012

    Publication series

    NameIEEE International Symposium on Information Theory - Proceedings

    Other

    Other2012 IEEE International Symposium on Information Theory, ISIT 2012
    CountryUnited States
    CityCambridge, MA
    Period7/1/127/6/12

    All Science Journal Classification (ASJC) codes

    • Theoretical Computer Science
    • Information Systems
    • Modeling and Simulation
    • Applied Mathematics

    Fingerprint Dive into the research topics of 'The Gaussian interference wiretap channel when the eavesdropper channel is arbitrarily varying'. Together they form a unique fingerprint.

    Cite this