MIMO multiple access channel with an arbitrarily varying eavesdropper

Xiang He, Ashish Khisti, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations

    Abstract

    We investigate a two-transmitter Gaussian multiple access wiretap channel with multiple antennas at each of the nodes. The channel transfer matrices at the legitimate terminals are fixed and revealed to all the terminals, whereas the channel transfer matrix of the eavesdropper is arbitrarily varying and only revealed to the eavesdropper. We characterize the secrecy degrees of freedom (s.d.o.f.) region under a strong secrecy constraint. A transmission scheme that orthogonalizes the transmit signals of the two users at the intended receiver and uses a single-user wiretap code is sufficient to achieve the s.d.o.f. region. The converse involves establishing an upper bound on a weighted-sum-rate expression. This is accomplished by using an induction procedure, where at each step we combine the secrecy and multiple-access constraints associated with an adversary eavesdropping a carefully selected group of sub-channels.

    Original languageEnglish (US)
    Title of host publication2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011
    Pages1182-1189
    Number of pages8
    DOIs
    StatePublished - 2011
    Event2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011 - Monticello, IL, United States
    Duration: Sep 28 2011Sep 30 2011

    Publication series

    Name2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011

    Other

    Other2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011
    Country/TerritoryUnited States
    CityMonticello, IL
    Period9/28/119/30/11

    All Science Journal Classification (ASJC) codes

    • Computer Networks and Communications
    • Control and Systems Engineering

    Fingerprint

    Dive into the research topics of 'MIMO multiple access channel with an arbitrarily varying eavesdropper'. Together they form a unique fingerprint.

    Cite this