Some New Results on the Gaussian Wiretap Feedback Channel
Abstract
:1. Introduction
- (1) How can a positive secrecy rate be achieved if the eavesdropper’s channel is less noisy than the legitimate receiver’s channel?
- (2) If the eavesdropper’s channel is noisier than the legitimate receiver’s channel, can the secrecy rate be further enhanced beyond the secrecy capacity?
- (1) In [20], the secrecy capacity of the degraded Gaussian wiretap feedback channel was derived, and it equaled the capacity of the same model without the secrecy constraint. Does this still hold for the non-degraded Gaussian wiretap feedback channel (see Figure 2), i.e., does the secrecy capacity of the non-degraded Gaussian wiretap feedback channel equal the capacity of the same model without the secrecy constraint?
- (1) We derive the secrecy capacity of the non-degraded Gaussian wiretap feedback channel and show that it also equals the capacity of the same model without the secrecy constraint.
- (2) In [8], it was shown that the secret key-based feedback scheme was optimal for the discrete memoryless DWTC. However, this is not true for the degraded Gaussian wiretap feedback channel, i.e., in this paper, we show that the secret key-based feedback scheme only achieves a lower bound on the secrecy capacity of the degraded Gaussian wiretap feedback channel. Hence, for the degraded Gaussian wiretap feedback channel, the SK feedback scheme performs the best. In addition, in this paper, we show that for the non-degraded Gaussian wiretap feedback channel, the improved secret key-based feedback scheme performs as well as the SK scheme, and both of them perform better than the secret key-based feedback scheme.
2. The Non-Degraded Gaussian Wiretap Feedback Channel
3. Comparison of the Already Existing Feedback Schemes for the Gaussian Wiretap Feedback Channel
3.1. Comparison of the Feedback Schemes for the Degraded Gaussian Wiretap Feedback Channel
3.2. Comparison of the Feedback Schemes for the Non-Degraded Gaussian Wiretap Feedback Channel
4. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
- Csiszár, I.; Körner, J. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 1978, 24, 339–348. [Google Scholar]
- Jameel, F.; Wyne, S.; Kaddoum, G.; Duong, T.Q. A comprehensive survey on cooperative relaying and jamming strategies for physical layer security. IEEE Commun. Surv. Tuts. 2018, 1. [Google Scholar] [CrossRef]
- Atallah, M.; Kaddoum, G. Secrecy analysis in wireless network with passive eavesdroppers by using partial cooperation. IEEE Trans. Veh. Technol. 2019, 68, 7225–7230. [Google Scholar] [CrossRef]
- Atallah, M.; Kaddoum, G. Design and performance analysis of secure multicasting cooperative protocol for wireless sensor network applications. arXiv 2019, arXiv:1902.07345. [Google Scholar] [CrossRef]
- Liang, J.M.; Chen, J.J.; Cheng, H.H.; Tseng, Y.C. An energy-efficient sleep scheduling with QoS consideration in 3GPP LTE-Advanced networks for Internet of Things. IEEE J. Emerg. Sel. Top. Circuits Syst. 2013, 3, 13–22. [Google Scholar] [CrossRef]
- Mukherjee, A. Physical-layer security in the Internet of Things: sensing and communication confidentiality under resource constraints. Proc. IEEE 2015, 103, 1747–1761. [Google Scholar] [CrossRef]
- Ahlswede, R.; Cai, N. Transmission, identification and common randomness capacities for wire-tap channels with secure feedback from the decoder. In General Theory of Information Transfer and Combinatorics; Springer: Berlin, Germany, 2006; pp. 258–275. [Google Scholar]
- Ardestanizadeh, E.; Franceschetti, M.; Javidi, T.; Kim, Y. Wiretap channel with secure rate-limited feedback. IEEE Trans. Inf. Theory 2009, 55, 5353–5361. [Google Scholar] [CrossRef]
- Schaefer, R.F.; Khisti, A.; Poor, H.V. Secure broadcasting using independent secret keys. IEEE Trans. Commun. 2018, 66, 644–661. [Google Scholar] [CrossRef]
- Ekrem, E.; Ulukus, S. Secrecy capacity of a class of broadcast channels with an eavesdropper. EURASIP J. Wirel. Commun. Netw. 2009, 2009, 824235. [Google Scholar] [CrossRef]
- Cohen, A.; Cohen, A. Wiretap channel with causal state information and secure rate-limited feedback. IEEE Trans. Commun. 2016, 64, 1192–1203. [Google Scholar] [CrossRef]
- Dai, B.; Han Vinck, A.J.; Luo, Y. Wiretap channel in the presence of action-dependent states and noiseless feedback. J. Appl. Math. 2013, 2013. [Google Scholar] [CrossRef]
- Dai, B.; Ma, Z.; Fang, X. Feedback enhances the security of state-dependent degraded broadcast channels with confidential messages. IEEE Trans. Inf. Forensic. Secur. 2015, 10, 1529–1542. [Google Scholar] [CrossRef]
- Dai, B.; Ma, Z.; Luo, Y. Finite state Markov wiretap channel with delayed feedback. IEEE Trans. Inf. Forensic. Secur. 2017, 12, 746–760. [Google Scholar] [CrossRef]
- Dai, B.; Ma, Z.; Xiao, M.; Tang, X.; Fan, P. Secure communication over finite state multiple-access wiretap channel with delayed feedback. IEEE J. Sel. Areas Commun. 2018, 36, 723–736. [Google Scholar] [CrossRef]
- Dai, B.; Luo, Y. An improved feedback coding scheme for the wiretap channel. IEEE Trans. Inf. Forensic. Secur. 2019, 14, 262–271. [Google Scholar] [CrossRef]
- Zhang, H.; Yu, L.; Dai, B. Feedback schemes for the action-dependent wiretap channel with noncausal state at the transmitter. Entropy 2019, 21, 278. [Google Scholar] [CrossRef]
- Zhang, H.; Yu, L.; Wei, C.; Dai, B. A new feedback scheme for the state-dependent wiretap channel with noncausal state at the transmitter. IEEE Access 2019, 7, 45594–45604. [Google Scholar] [CrossRef]
- Gunduz, D.; Brown, D.R.; Poor, H.V. Secret communication with feedback. In Proceedings of the 2008 International Symposium on Information Theory and Its Applications, Auckland, New Zealand, 7–10 December 2008. [Google Scholar]
- Schalkwijk, J.P.M.; Kailath, T. A coding scheme for additive noise channels with feedback. part I: No bandwidth constraint. IEEE Trans. Inf. Theory 1966, 12, 172–182. [Google Scholar] [CrossRef]
- Li, C.; Liang, Y.; Poor, H.V.; Shamai, S. Secrecy capacity of colored Gaussian noise channels with feedback. IEEE Trans. Inf. Theory 2019, 65, 5771–5782. [Google Scholar] [CrossRef]
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wei, C.; Yu, L.; Dai, B. Some New Results on the Gaussian Wiretap Feedback Channel. Entropy 2019, 21, 817. https://doi.org/10.3390/e21090817
Wei C, Yu L, Dai B. Some New Results on the Gaussian Wiretap Feedback Channel. Entropy. 2019; 21(9):817. https://doi.org/10.3390/e21090817
Chicago/Turabian StyleWei, Chenxu, Linman Yu, and Bin Dai. 2019. "Some New Results on the Gaussian Wiretap Feedback Channel" Entropy 21, no. 9: 817. https://doi.org/10.3390/e21090817
APA StyleWei, C., Yu, L., & Dai, B. (2019). Some New Results on the Gaussian Wiretap Feedback Channel. Entropy, 21(9), 817. https://doi.org/10.3390/e21090817