TY - GEN
T1 - The Gaussian wiretap channel with a helping interferer
AU - Tang, Xiaojun
AU - Liu, Ruoheng
AU - Spasojević, Predrag
AU - Poor, H. Vincent
PY - 2008
Y1 - 2008
N2 - Due to the broadcast nature of the wireless medium, wireless communication is susceptible to adversarial eavesdropping. This paper describes how eavesdropping can potentially be defeated by exploiting the superposition nature of the wireless medium. A Gaussian wire-tap channel with a helping interferer (WTC-HI) is considered in which a transmitter sends confidential messages to its intended receiver in the presence of a passive eavesdropper and with the help of an interferer. The interferer, which does not know the confidential message assists the confidential message transmission by sending a signal that is independent of the transmitted message. An achievable secrecy rate and a Sato-type upper bound on the secrecy capacity are given for the Gaussian WTC-HI. Through numerical analysis, it is found that the upper bound is close to the achievable secrecy rate when the interference is weak for symmetric interference channels, and under more general conditions for asymmetric Gaussian interference channels.
AB - Due to the broadcast nature of the wireless medium, wireless communication is susceptible to adversarial eavesdropping. This paper describes how eavesdropping can potentially be defeated by exploiting the superposition nature of the wireless medium. A Gaussian wire-tap channel with a helping interferer (WTC-HI) is considered in which a transmitter sends confidential messages to its intended receiver in the presence of a passive eavesdropper and with the help of an interferer. The interferer, which does not know the confidential message assists the confidential message transmission by sending a signal that is independent of the transmitted message. An achievable secrecy rate and a Sato-type upper bound on the secrecy capacity are given for the Gaussian WTC-HI. Through numerical analysis, it is found that the upper bound is close to the achievable secrecy rate when the interference is weak for symmetric interference channels, and under more general conditions for asymmetric Gaussian interference channels.
UR - http://www.scopus.com/inward/record.url?scp=52349118726&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=52349118726&partnerID=8YFLogxK
U2 - 10.1109/ISIT.2008.4595014
DO - 10.1109/ISIT.2008.4595014
M3 - Conference contribution
AN - SCOPUS:52349118726
SN - 9781424422579
T3 - IEEE International Symposium on Information Theory - Proceedings
SP - 389
EP - 393
BT - Proceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008
T2 - 2008 IEEE International Symposium on Information Theory, ISIT 2008
Y2 - 6 July 2008 through 11 July 2008
ER -