The Gaussian Multiple Access Wiretap Channel When The Eavesdropper Can Arbitrarily Jam

2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT)(2017)

引用 4|浏览12
暂无评分
摘要
We study the Gaussian multiple access channel in presence of an adversary, who is simultaneously able to eavesdrop and jam, i.e., an active wiretapper. We assume that the adversary has a power constraint, which she can utilize to have any arbitrary jamming strategy. The multiple access channel between the legitimate transmitters and the receiver thus becomes arbitrarily varying. We derive inner and outer bounds on the secrecy rate region of our model. In the case of a degraded channel, we characterize the optimal secrecy sum-rate, and within 0.5 bits per channel use the optimal individual rate constraints. As a special case, we obtain the secrecy capacity of the point-to-point Gaussian wiretap channel when the eavesdropper is able to arbitrarily jam.
更多
查看译文
关键词
Gaussian multiple access wiretap channel,arbitrary jamming strategy,legitimate transmitters,active wiretapper,power constraint,inner bounds,outer bounds,secrecy rate region,optimal secrecy sum-rate,optimal individual rate constraints,point-to-point Gaussian wiretap channel
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要