• DocumentCode
    169486
  • Title

    From ordinary AWGN codes to optimal MIMO wiretap schemes

  • Author

    Khina, Anatoly ; Kochman, Yuval ; Khisti, Ashish

  • Author_Institution
    EE-Syst. Dept., TAU, Tel Aviv, Israel
  • fYear
    2014
  • fDate
    2-5 Nov. 2014
  • Firstpage
    631
  • Lastpage
    635
  • Abstract
    The problem of sending a secret message over the Gaussian multiple-input multiple-output wiretap channel is studied. In a recent work, we have proposed a layered coding scheme where a scalar wiretap code is used in each layer, and successive interference cancellation (SIC) is carried at the legitimate receiver. By a proper rate allocation across the layers, we showed that this scheme satisfies the secrecy constraint at the eavesdropper and achieves the secrecy capacity. However, the existence of the scalar codes was based upon a random coding argument. In this work we take a further step and show how the scheme can be based upon any codes that are good for the ordinary (non-secrecy) additive white Gaussian noise channel. As any stage of the SIC process is equivalent to achieving a corner point of a Gaussian multiple-access channel (MAC) capacity region, the class of codes used needs to be good for the MAC under SIC. Since in the secrecy analysis of our layered scheme, it suffices at each stage to consider a genie-aided eavesdropper that performs SIC, the coding task reduces to guaranteeing secrecy for corner points of induced MACs to the eavesdropper. Structured generation of such codes from ordinary ones is discussed.
  • Keywords
    AWGN channels; Gaussian channels; Gaussian noise; MIMO communication; channel coding; interference suppression; multi-access systems; AWGN codes; Gaussian multiple-access channel; Gaussian multiple-input multiple-output wiretap channel; MAC; SIC process; eavesdropper; genie-aided eavesdropper; layered coding scheme; optimal MIMO wiretap schemes; ordinary additive white Gaussian noise channel; random coding; rate allocation; receiver; scalar codes; scalar wiretap code; secrecy analysis; secrecy capacity; secrecy constraint; secret message; successive interference cancellation; Decoding; Encoding; Error probability; MIMO; Noise; Silicon carbide; Vectors;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Theory Workshop (ITW), 2014 IEEE
  • Conference_Location
    Hobart, TAS
  • ISSN
    1662-9019
  • Type

    conf

  • DOI
    10.1109/ITW.2014.6970908
  • Filename
    6970908