TY - JOUR
T1 - Interference alignment for secrecy
AU - Koyluoglu, O. Ozan
AU - El Gamal, Hesham
AU - Lai, Lifeng
AU - Poor, H. Vincent
N1 - Funding Information:
Manuscript received October 07, 2008; revised July 19, 2009; accepted August 26, 2010. Date of current version May 25, 2011. This work was supported in part by the National Science Foundation under Grants CCF-07-28762 and CNS-09-05398, in part by the Los Alamos National Laboratory, and in part by the Qatar National Research Fund. The material in this paper was presented at the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada.
PY - 2011/6
Y1 - 2011/6
N2 - This paper studies the frequency/time selective K-user Gaussian interference channel with secrecy constraints. Two distinct models, namely the interference channel with confidential messages and the interference channel with an external eavesdropper, are analyzed. The key difference between the two models is the lack of channel state information (CSI) of the external eavesdropper. Using interference alignment along with secrecy precoding, it is shown that each user can achieve non-zero secure degrees of freedom (DoF) for both cases. More precisely, the proposed coding scheme achieves K-2/2K-2 secure DoF with probability one per user in the confidential messages model. For the external eavesdropper scenario, on the other hand, it is shown that each user can achieve K-2/2K secure DoF in the ergodic setting. Remarkably, these results establish the positive impact of interference on the secrecy capacity region of wireless networks.
AB - This paper studies the frequency/time selective K-user Gaussian interference channel with secrecy constraints. Two distinct models, namely the interference channel with confidential messages and the interference channel with an external eavesdropper, are analyzed. The key difference between the two models is the lack of channel state information (CSI) of the external eavesdropper. Using interference alignment along with secrecy precoding, it is shown that each user can achieve non-zero secure degrees of freedom (DoF) for both cases. More precisely, the proposed coding scheme achieves K-2/2K-2 secure DoF with probability one per user in the confidential messages model. For the external eavesdropper scenario, on the other hand, it is shown that each user can achieve K-2/2K secure DoF in the ergodic setting. Remarkably, these results establish the positive impact of interference on the secrecy capacity region of wireless networks.
KW - Information theoretic security
KW - interference alignment
KW - interference channel
KW - secure degrees of freedom
UR - http://www.scopus.com/inward/record.url?scp=79957667257&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79957667257&partnerID=8YFLogxK
U2 - 10.1109/TIT.2011.2132430
DO - 10.1109/TIT.2011.2132430
M3 - Article
AN - SCOPUS:79957667257
SN - 0018-9448
VL - 57
SP - 3323
EP - 3332
JO - IEEE Transactions on Information Theory
JF - IEEE Transactions on Information Theory
IS - 6
M1 - 5773067
ER -