A broadcast approach for fading wiretap channels

Yingbin Liang, Lifeng Lai, H. Vincent Poor, Shlomo Shamai

Research output: Contribution to journalArticle

24 Citations (Scopus)

Abstract

A (layered) broadcast approach is studied for the fading wiretap channel without the channel state information (CSI) at the transmitter. Two broadcast schemes, based on superposition coding and embedded coding, respectively, are developed to encode information into a number of layers and use stochastic encoding to keep the corresponding information secret from an eavesdropper. The layers that can be successfully and securely transmitted are determined by the channel states to the legitimate receiver and the eavesdropper. The advantage of these broadcast approaches is that the transmitter does not need to know the CSI to the legitimate receiver and the eavesdropper, but the scheme still adapts to the channel states of the legitimate receiver and the eavesdropper. Three scenarios of block fading wiretap channels with stringent delay constraints are studied, in which either the legitimate receiver's channel, the eavesdropper's channel, or both channels are fading. For each scenario, the secrecy rate that can be achieved via the broadcast approach developed in this paper is derived, and the optimal power allocation over the layers (or the conditions on the optimal power allocation) is also characterized. A notion of probabilistic secrecy, which characterizes the probability that a certain secrecy rate of decoded messages is achieved during one block, is also introduced and studied for scenarios when the eavesdropper's channel is fading. Numerical examples are provided to demonstrate the impact of the CSI at the transmitter and the channel fluctuations of the eavesdropper on the average secrecy rate. These examples also demonstrate the advantage of the proposed broadcast approach over the compound channel approach.

Original languageEnglish (US)
Article number6687232
Pages (from-to)842-858
Number of pages17
JournalIEEE Transactions on Information Theory
Volume60
Issue number2
DOIs
StatePublished - Feb 2014

Fingerprint

broadcast
Fading channels
secrecy
Channel state information
Transmitters
recipient
scenario
coding
fluctuation

Keywords

  • Channel state information
  • fading channel
  • layered broadcast approach
  • secrecy rate
  • wiretap channel

ASJC Scopus subject areas

  • Information Systems
  • Computer Science Applications
  • Library and Information Sciences

Cite this

Liang, Y., Lai, L., Poor, H. V., & Shamai, S. (2014). A broadcast approach for fading wiretap channels. IEEE Transactions on Information Theory, 60(2), 842-858. [6687232]. https://doi.org/10.1109/TIT.2013.2293756

A broadcast approach for fading wiretap channels. / Liang, Yingbin; Lai, Lifeng; Poor, H. Vincent; Shamai, Shlomo.

In: IEEE Transactions on Information Theory, Vol. 60, No. 2, 6687232, 02.2014, p. 842-858.

Research output: Contribution to journalArticle

Liang, Y, Lai, L, Poor, HV & Shamai, S 2014, 'A broadcast approach for fading wiretap channels', IEEE Transactions on Information Theory, vol. 60, no. 2, 6687232, pp. 842-858. https://doi.org/10.1109/TIT.2013.2293756
Liang, Yingbin ; Lai, Lifeng ; Poor, H. Vincent ; Shamai, Shlomo. / A broadcast approach for fading wiretap channels. In: IEEE Transactions on Information Theory. 2014 ; Vol. 60, No. 2. pp. 842-858.
@article{453b29a6f379460783b0d45047d21602,
title = "A broadcast approach for fading wiretap channels",
abstract = "A (layered) broadcast approach is studied for the fading wiretap channel without the channel state information (CSI) at the transmitter. Two broadcast schemes, based on superposition coding and embedded coding, respectively, are developed to encode information into a number of layers and use stochastic encoding to keep the corresponding information secret from an eavesdropper. The layers that can be successfully and securely transmitted are determined by the channel states to the legitimate receiver and the eavesdropper. The advantage of these broadcast approaches is that the transmitter does not need to know the CSI to the legitimate receiver and the eavesdropper, but the scheme still adapts to the channel states of the legitimate receiver and the eavesdropper. Three scenarios of block fading wiretap channels with stringent delay constraints are studied, in which either the legitimate receiver's channel, the eavesdropper's channel, or both channels are fading. For each scenario, the secrecy rate that can be achieved via the broadcast approach developed in this paper is derived, and the optimal power allocation over the layers (or the conditions on the optimal power allocation) is also characterized. A notion of probabilistic secrecy, which characterizes the probability that a certain secrecy rate of decoded messages is achieved during one block, is also introduced and studied for scenarios when the eavesdropper's channel is fading. Numerical examples are provided to demonstrate the impact of the CSI at the transmitter and the channel fluctuations of the eavesdropper on the average secrecy rate. These examples also demonstrate the advantage of the proposed broadcast approach over the compound channel approach.",
keywords = "Channel state information, fading channel, layered broadcast approach, secrecy rate, wiretap channel",
author = "Yingbin Liang and Lifeng Lai and Poor, {H. Vincent} and Shlomo Shamai",
year = "2014",
month = "2",
doi = "10.1109/TIT.2013.2293756",
language = "English (US)",
volume = "60",
pages = "842--858",
journal = "IEEE Transactions on Information Theory",
issn = "0018-9448",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "2",

}

TY - JOUR

T1 - A broadcast approach for fading wiretap channels

AU - Liang, Yingbin

AU - Lai, Lifeng

AU - Poor, H. Vincent

AU - Shamai, Shlomo

PY - 2014/2

Y1 - 2014/2

N2 - A (layered) broadcast approach is studied for the fading wiretap channel without the channel state information (CSI) at the transmitter. Two broadcast schemes, based on superposition coding and embedded coding, respectively, are developed to encode information into a number of layers and use stochastic encoding to keep the corresponding information secret from an eavesdropper. The layers that can be successfully and securely transmitted are determined by the channel states to the legitimate receiver and the eavesdropper. The advantage of these broadcast approaches is that the transmitter does not need to know the CSI to the legitimate receiver and the eavesdropper, but the scheme still adapts to the channel states of the legitimate receiver and the eavesdropper. Three scenarios of block fading wiretap channels with stringent delay constraints are studied, in which either the legitimate receiver's channel, the eavesdropper's channel, or both channels are fading. For each scenario, the secrecy rate that can be achieved via the broadcast approach developed in this paper is derived, and the optimal power allocation over the layers (or the conditions on the optimal power allocation) is also characterized. A notion of probabilistic secrecy, which characterizes the probability that a certain secrecy rate of decoded messages is achieved during one block, is also introduced and studied for scenarios when the eavesdropper's channel is fading. Numerical examples are provided to demonstrate the impact of the CSI at the transmitter and the channel fluctuations of the eavesdropper on the average secrecy rate. These examples also demonstrate the advantage of the proposed broadcast approach over the compound channel approach.

AB - A (layered) broadcast approach is studied for the fading wiretap channel without the channel state information (CSI) at the transmitter. Two broadcast schemes, based on superposition coding and embedded coding, respectively, are developed to encode information into a number of layers and use stochastic encoding to keep the corresponding information secret from an eavesdropper. The layers that can be successfully and securely transmitted are determined by the channel states to the legitimate receiver and the eavesdropper. The advantage of these broadcast approaches is that the transmitter does not need to know the CSI to the legitimate receiver and the eavesdropper, but the scheme still adapts to the channel states of the legitimate receiver and the eavesdropper. Three scenarios of block fading wiretap channels with stringent delay constraints are studied, in which either the legitimate receiver's channel, the eavesdropper's channel, or both channels are fading. For each scenario, the secrecy rate that can be achieved via the broadcast approach developed in this paper is derived, and the optimal power allocation over the layers (or the conditions on the optimal power allocation) is also characterized. A notion of probabilistic secrecy, which characterizes the probability that a certain secrecy rate of decoded messages is achieved during one block, is also introduced and studied for scenarios when the eavesdropper's channel is fading. Numerical examples are provided to demonstrate the impact of the CSI at the transmitter and the channel fluctuations of the eavesdropper on the average secrecy rate. These examples also demonstrate the advantage of the proposed broadcast approach over the compound channel approach.

KW - Channel state information

KW - fading channel

KW - layered broadcast approach

KW - secrecy rate

KW - wiretap channel

UR - http://www.scopus.com/inward/record.url?scp=84893468086&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84893468086&partnerID=8YFLogxK

U2 - 10.1109/TIT.2013.2293756

DO - 10.1109/TIT.2013.2293756

M3 - Article

AN - SCOPUS:84893468086

VL - 60

SP - 842

EP - 858

JO - IEEE Transactions on Information Theory

JF - IEEE Transactions on Information Theory

SN - 0018-9448

IS - 2

M1 - 6687232

ER -