Title :
Fading Cognitive Multiple-Access Channels With Confidential Messages
Author :
Liu, Ruoheng ; Liang, Yingbin ; Poor, H. Vincent
Author_Institution :
Alcatel-Lucent, Murray Hill, NJ, USA
Abstract :
The fading cognitive multiple-access channel with confidential messages (CMAC-CM) is investigated, in which two users (users 1 and 2) wish to transmit a common message to a destination and user 1 also has a confidential message intended for the destination. The two users transmit to the destination via a multiple access channel, and user 2 also receives noisy channel outputs. Such channel outputs potentially help user 2 to learn user 1´s confidential information (although they are not exploited by user 2 for channel transmission). Hence, user 1 views user 2 as an eavesdropper and wishes to keep its confidential message as secret as possible from user 2. A parallel CMAC-CM with independent subchannels is first studied. The secrecy capacity region of the parallel CMAC-CM is established, which yields the secrecy capacity regions of the parallel CMAC-CM with degraded subchannels and the parallel Gaussian CMAC-CM. These results are then applied to study the fading CMAC-CM, in which both the user-to-user channel and the user-to-destination channel are corrupted by multiplicative fading gain coefficients in addition to additive white Gaussian noise. The channel state information (CSI) is assumed to be known at both the users and the destination. With the CSI, users can dynamically change their transmission powers with the channel realization to achieve the optimal performance. The closed-form power allocation function that achieves every boundary point of the secrecy capacity region is derived.
Keywords :
Gaussian channels; fading channels; multi-access systems; telecommunication security; CSI; channel state information; closed-form power allocation function; confidential messages; fading CMAC-CM; fading cognitive multiple-access channels; parallel Gaussian CMAC-CM; user-to-destination channel; user-to-user channel; Communication system security; Encoding; Fading; Random variables; Resource management; Security; Wireless communication; Equivocation; fading channel; multiple-access channel; parallel channel; power allocation; secrecy capacity; secure communication;
Journal_Title :
Information Theory, IEEE Transactions on
DOI :
10.1109/TIT.2011.2158471