TY - GEN
T1 - Fading cognitive multiple-access channels with confidential messages
AU - Liu, Ruoheng
AU - Liang, Yingbin
AU - Poor, H. Vincent
PY - 2009
Y1 - 2009
N2 - The fading cognitive multiple-access channel with confidential messages (MAC-CM) is investigated, in which two users attempt to transmit common information to a destination and user 1 also has confidential information intended for the destination. User 1 views user 2 as an eavesdropper and wishes to keep its confidential information as secret as possible from user 2. The multiple-access channel (both the user-to-user channel and the user-to-destination channel) is corrupted by multiplicative fading gain coefficients in addition to additive white Gaussian noise. The channel state information (CSI) is assumed to be known at both the users and the destination. A parallel MACCM with independent subchannels is first studied. The secrecy capacity region of the parallel MAC-CM is established, which gives the secrecy capacity region of the parallel MAC-CM with degraded subchannels. Next, the secrecy capacity region is established for the parallel Gaussian MAC-CM, which is used to study the fading MAC-CM. By assuming both users know the CSI, users can dynamically change their transmission power with the channel realization to achieve the best performance.
AB - The fading cognitive multiple-access channel with confidential messages (MAC-CM) is investigated, in which two users attempt to transmit common information to a destination and user 1 also has confidential information intended for the destination. User 1 views user 2 as an eavesdropper and wishes to keep its confidential information as secret as possible from user 2. The multiple-access channel (both the user-to-user channel and the user-to-destination channel) is corrupted by multiplicative fading gain coefficients in addition to additive white Gaussian noise. The channel state information (CSI) is assumed to be known at both the users and the destination. A parallel MACCM with independent subchannels is first studied. The secrecy capacity region of the parallel MAC-CM is established, which gives the secrecy capacity region of the parallel MAC-CM with degraded subchannels. Next, the secrecy capacity region is established for the parallel Gaussian MAC-CM, which is used to study the fading MAC-CM. By assuming both users know the CSI, users can dynamically change their transmission power with the channel realization to achieve the best performance.
KW - Equivocation
KW - Fading channel
KW - Multiple-access channel
KW - Secrecy capacity
KW - Secure communication
UR - http://www.scopus.com/inward/record.url?scp=77949583584&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77949583584&partnerID=8YFLogxK
U2 - 10.1109/ALLERTON.2009.5394789
DO - 10.1109/ALLERTON.2009.5394789
M3 - Conference contribution
AN - SCOPUS:77949583584
SN - 9781424458714
T3 - 2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009
SP - 371
EP - 377
BT - 2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009
T2 - 2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009
Y2 - 30 September 2009 through 2 October 2009
ER -