Professional Documents
Culture Documents
Colo Quim
Colo Quim
I Introduction
I Information Theoretic security
I The Wiretap Channel
I Fading Wiretap Channel
I Fading MAC with Eve
I Alternative notion of Security
I Dual encoder scheme
I Conclusions
Introduction
I Q → U → X → (Y , Z ).
The Wiretap Channel: Coding Scheme
Theorem
For a given power control policy {Pk (h)}, k = 1, 2, the following
secrecy sum-rate
(" !#+ )
φhP1 ,P2
Eh,g log (5)
φgP1 ,P2
2.5
Secrecy Sum−Rate (bits/channel use)
1.5
1
Opt with full CSI
Opt with only Rx CSI
ON/OFF with only Rx CSI
0.5
CJ Opt with full CSI
CJ Opt with only Rx CSI
CJ ON/OFF with only Rx CSI
0
0 5 10 15 20 25 30 35
SNR (dB)
New Notion
0.8
Bob N=50
Probability of Error
Eve N=50
0.6
Bob N=100
Eve N=100
Bob N=200
0.4
Eve N=200
0
0.3 0.4 0.5 0.6 0.7
Fraction of SNR(α)
Fading Channel
I For the fading channel
Yi = hi Xi + N1i , (10)
Zi = gi Xi + N2i , (11)
,
I The capacity is ([gopala2008]):
Z ∞Z ∞
Cs = [log(1 + qP ∗ (q, r )) −
0 r
log(1 + rP ∗ (q, r ))]f (q)f (r )dqdr (12)
Proposition
All rates R < C1 are achievable such that Pen (B) → 0 and
Pen (E ) → 1 where
Z ∞Z ∞
C1 = sup [log(1 + qP(q, r ))]f (q)f (r )dqdr . (14)
P(q,r ) 0 r
.
Channel Model
Rs = max [I (X ; Y ) − I (X ; Z )] . (15)
p(x)
fs : W → X n , fd : W × K → X n , (17)
φ1 : Y 2n → W. (18)
φi : Y n × K → W j (19)
for time slot i, with j = min(i, RCs ).
I Probability of error:
(n)
Pe = Pr {W
c 6= W } (20)
where W
c is the decoded message.
Achievable Rate
Theorem
Any rate < C is achievable for all slots k ≥ λ.
Coding Scheme
I Total rate:
1 1
(Rs + (λ − 1)Rs ) = (Rs + C ) . (21)
2 2
I n is decoded via
Bob (Decoder): In slot k, (for 1 < k < λ) Yk1
n
usual wiretap decoding while Yk2 is decoded first by the
channel decoder and then XORed with W ck−1
Error Analysis
I We show
1
I (W k ; Z1n , Z22n , ..., Zk2n ) → 0 (22)
n
as n → ∞
I Slot 1: Wire-tap coding is used, hence n1 I (W 1 ; Z1n ) → 0, as
n → ∞.
I slot 2:
1
I (W 1 ; Z1n , Z22n ) → 0 (23)
n
I We use mathematical induction to show that
1 n 2n 2n
n I (W m ; Z1 , Z2 , ..., Zk+1 ) → 0 for all m ≤ k + 1, k ≥ 1
Strong Secrecy
Y = H̃X + N1 (24)
Z = G̃ X + N2 (25)
I Some notation
1 H k Pk
Ckb= log 1 + (30)
2 σ12
e 1 Gk Pk
Ck = log 1 + (31)
2 σ22
I H1 > G1 : First Slot of communication.
I Case 1: H2 < G2 , No wiretap coding. Use previous secret key
from buffer.
I secret key rate that we can get from the buffer is
1 Hk P k
Rk = Ckb = log(1 + ) (36)
2 σ12
Finite Buffer
I The queue process will evolve as
(F )
Bk+1 = min(B, B (F ) + rk − Rk ) (37)
g
min(B, C b ) if σh2 <
1 σ22
E [r (H, G )] , (39)
subject to
E [P(H, G )] ≤ P. (40)
Using Lagrange multipliers we can convert this problem to
minimize
F (P) = E [r (H, G )] + γ E [P(H, G )] − P (41)
Finite Buffer
1 1 h g
2 1+ hP(h,g ) σ12
+ γ, if σh2 ≥ σ22
,C e < B,
2 1
" σ1
#
1 1 h 1 g g
σ12
− σ22
+γ , if σh2 ≥ σ22
,C e > B,
2 1+
hP(h,g )
σ2
1+
gP(h,g )
σ2
1
1 2
1 1 h g
if σh2 < > C b.
2 1+ hP(h,g
) σ12
+γ σ22
&B
2 1
σ
1
Finite Frame: Numerical result
3.5
Infinite Buffer Case
3
Secrecy Rate
2
σ = 0.01
1
σ 2=0.04
1.5
Pavg =24dB
1 Maximum Buffer length=7
0.5
0 1 2 3 4 5 6 7 8
Buffer Length
A. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54,
pp. 1355-1387, 1974.