On the secrecy rate region for the interference channel

Onur Ozan Koyluoglu, Hesham El Gamal

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)

Abstract

This paper studies interference channels with security constraints. The existence of an external eavesdropper in a two-user interference channel is assumed, where the network users would like to secure their messages from the external eavesdropper. The cooperative binning and channel prefixing scheme is proposed for this system model which allows users to cooperatively add randomness to the channel in order to degrade the observations of the external eavesdropper. This scheme allows users to add randomness to the channel in two ways: 1) Users cooperate in their design of the binning codebooks, and 2) Users cooperatively exploit the channel prefixing technique. As an example, the channel prefixing technique is exploited in the Gaussian case to transmit a superposition signal consisting of binning codewords and independently generated noise samples. Gains obtained form the cooperative binning and channel prefixing scheme compared to the single user scenario reveals the positive effect of interference in increasing the network security. Remarkably, interference can be exploited to cooperatively add randomness into the network in order to enhance the security.

Original languageEnglish (US)
Title of host publicationIEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC
DOIs
StatePublished - 2008
Externally publishedYes
Event2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008 - Poznan, Poland
Duration: Sep 15 2008Sep 18 2008

Other

Other2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008
CountryPoland
CityPoznan
Period9/15/089/18/08

Fingerprint

Network security

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

Koyluoglu, O. O., & Gamal, H. E. (2008). On the secrecy rate region for the interference channel. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC [4699954] https://doi.org/10.1109/PIMRC.2008.4699954

On the secrecy rate region for the interference channel. / Koyluoglu, Onur Ozan; Gamal, Hesham El.

IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC. 2008. 4699954.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Koyluoglu, OO & Gamal, HE 2008, On the secrecy rate region for the interference channel. in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC., 4699954, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, Poznan, Poland, 9/15/08. https://doi.org/10.1109/PIMRC.2008.4699954
Koyluoglu OO, Gamal HE. On the secrecy rate region for the interference channel. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC. 2008. 4699954 https://doi.org/10.1109/PIMRC.2008.4699954
Koyluoglu, Onur Ozan ; Gamal, Hesham El. / On the secrecy rate region for the interference channel. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC. 2008.
@inproceedings{2188a8b60b9448b0ab8f490bd9051e21,
title = "On the secrecy rate region for the interference channel",
abstract = "This paper studies interference channels with security constraints. The existence of an external eavesdropper in a two-user interference channel is assumed, where the network users would like to secure their messages from the external eavesdropper. The cooperative binning and channel prefixing scheme is proposed for this system model which allows users to cooperatively add randomness to the channel in order to degrade the observations of the external eavesdropper. This scheme allows users to add randomness to the channel in two ways: 1) Users cooperate in their design of the binning codebooks, and 2) Users cooperatively exploit the channel prefixing technique. As an example, the channel prefixing technique is exploited in the Gaussian case to transmit a superposition signal consisting of binning codewords and independently generated noise samples. Gains obtained form the cooperative binning and channel prefixing scheme compared to the single user scenario reveals the positive effect of interference in increasing the network security. Remarkably, interference can be exploited to cooperatively add randomness into the network in order to enhance the security.",
author = "Koyluoglu, {Onur Ozan} and Gamal, {Hesham El}",
year = "2008",
doi = "10.1109/PIMRC.2008.4699954",
language = "English (US)",
isbn = "9781424426447",
booktitle = "IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC",

}

TY - GEN

T1 - On the secrecy rate region for the interference channel

AU - Koyluoglu, Onur Ozan

AU - Gamal, Hesham El

PY - 2008

Y1 - 2008

N2 - This paper studies interference channels with security constraints. The existence of an external eavesdropper in a two-user interference channel is assumed, where the network users would like to secure their messages from the external eavesdropper. The cooperative binning and channel prefixing scheme is proposed for this system model which allows users to cooperatively add randomness to the channel in order to degrade the observations of the external eavesdropper. This scheme allows users to add randomness to the channel in two ways: 1) Users cooperate in their design of the binning codebooks, and 2) Users cooperatively exploit the channel prefixing technique. As an example, the channel prefixing technique is exploited in the Gaussian case to transmit a superposition signal consisting of binning codewords and independently generated noise samples. Gains obtained form the cooperative binning and channel prefixing scheme compared to the single user scenario reveals the positive effect of interference in increasing the network security. Remarkably, interference can be exploited to cooperatively add randomness into the network in order to enhance the security.

AB - This paper studies interference channels with security constraints. The existence of an external eavesdropper in a two-user interference channel is assumed, where the network users would like to secure their messages from the external eavesdropper. The cooperative binning and channel prefixing scheme is proposed for this system model which allows users to cooperatively add randomness to the channel in order to degrade the observations of the external eavesdropper. This scheme allows users to add randomness to the channel in two ways: 1) Users cooperate in their design of the binning codebooks, and 2) Users cooperatively exploit the channel prefixing technique. As an example, the channel prefixing technique is exploited in the Gaussian case to transmit a superposition signal consisting of binning codewords and independently generated noise samples. Gains obtained form the cooperative binning and channel prefixing scheme compared to the single user scenario reveals the positive effect of interference in increasing the network security. Remarkably, interference can be exploited to cooperatively add randomness into the network in order to enhance the security.

UR - http://www.scopus.com/inward/record.url?scp=69949124879&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=69949124879&partnerID=8YFLogxK

U2 - 10.1109/PIMRC.2008.4699954

DO - 10.1109/PIMRC.2008.4699954

M3 - Conference contribution

SN - 9781424426447

BT - IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC

ER -