Interference-assisted secret communication

Xiaojun Tang, Ruoheng Liu, Predrag Spasojević, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

46 Scopus citations

Abstract

Wireless communication is susceptible to adversarial eavesdropping due to the broadcast nature of the wireless medium. In this paper it is shown how eavesdropping can be alleviated by exploiting the superposition property of the wireless medium. A wiretap channel with a helping interferer (WT-HI), in which a transmitter sends a confidential message to its intended receiver in the presence of a passive eavesdropper, and with the help of an independent interferer, is considered. The interferer, which does not know the confidential message, helps in ensuring the secrecy of the message by sending independent signals. An achievable secrecy rate for the WT-HI is given. The results show that interference can be exploited to assist secrecy in wireless communications. An important example of the Gaussian case, in which the interferer has a better channel to the intended receiver than to the eavesdropper, is considered. In this situation, the interferer can send a (random) codeword at a rate that ensures that it can be decoded and subtracted from the received signal by the intended receiver but cannot be decoded by the eavesdropper. Hence, only the eavesdropper is interfered with and the secrecy level of the confidential message is increased.

Original languageEnglish (US)
Title of host publication2008 IEEE Information Theory Workshop, ITW
Pages164-168
Number of pages5
DOIs
StatePublished - 2008
Event2008 IEEE Information Theory Workshop, ITW - Porto, Portugal
Duration: May 5 2008May 9 2008

Publication series

Name2008 IEEE Information Theory Workshop, ITW

Other

Other2008 IEEE Information Theory Workshop, ITW
CountryPortugal
CityPorto
Period5/5/085/9/08

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Interference-assisted secret communication'. Together they form a unique fingerprint.

Cite this