Font Size: a A A

Secure degrees of freedom of wireless networks

Posted on:2015-03-22Degree:Ph.DType:Dissertation
University:University of Maryland, College ParkCandidate:Xie, JianweiFull Text:PDF
GTID:1478390017499034Subject:Electrical engineering
Abstract/Summary:
This dissertation studies the security of wireless interference networks from an information-theoretic point of view. The central goal of this dissertation is to develop a framework based on information-theoretic principles to determine the complete solutions for the signaling schemes in different wireless interference networks with large transmit powers, and derive the corresponding fundamental limits in terms of the secure degrees of freedom (s.d.o.f.).;First, we study one-hop wireless networks by considering four fundamental wireless network structures: Gaussian wiretap channel with helpers, Gaussian broadcast channel (BC) with confidential messages, Gaussian interference channel (IC) with confidential messages, and Gaussian multiple access (MAC) wiretap channel. The secrecy capacity of the canonical Gaussian wiretap channel does not scale with the transmit power, and hence, the s.d.o.f. of the Gaussian wiretap channel with no helpers is zero.;Next, we study the sum s.d.o.f. of multi-receiver networks. In this dissertation, we determine the exact sum s.d.o.f. of the K-user Gaussian IC. We consider three different secrecy constraints: 1) K-user IC with one external eavesdropper (IC-EE), 2) K-user IC with confidential messages (IC-CM), and 3) K-user IC with confidential messages and one external eavesdropper (IC-CM-EE).;Then, we study the entire s.d.o.f. regions of multi-user network structures. In this dissertation, we determine the entire s.d.o.f. regions of the K-user MAC wiretap channel and the K-user IC with secrecy constraints. In order to prove the achievability, we use the polytope structure of the converse region. In both MAC and IC cases, we develop explicit schemes that achieve the extreme points of the polytope region given by the converse.;Then, we determine the sum s.d.o.f. of two-unicast layered wireless networks. Without any secrecy constraints, the sum d.o.f. of this class of networks was shown to take only one of three possible values: 1, 3/2 and 2, for all network configurations. We consider the setting where, in addition to being reliably transmitted, each message is required to be kept information-theoretically secure from the unintended receiver.;Next, we consider the Gaussian wiretap channel with M helpers, where no eavesdropper channel state information (CSI) is available at the legitimate entities. One of the key ingredients of our optimal achievable scheme with perfect CSI is to align cooperative jamming signals with the information symbols at the eavesdropper to limit the information leakage rate. This requires perfect eavesdropper CSI at the transmitters. We propose a new achievable scheme in which cooperative jamming signals span the entire space of the eavesdropper, but are not exactly aligned with the information symbols.;Then, we study the separability of the parallel MAC wiretap channel. Separability, when exists, is useful as it enables us to code separately over parallel channels, and still achieve the optimum overall performance. In this dissertation, we show that, while MAC is separable MAC wiretap channel is not separable in general. We prove this via a specific linear deterministic MAC wiretap channel. We then show that even the Gaussian MAC wiretap channel is inseparable in general.;Finally, we study the two-user one-sided IC with confidential messages. In this IC, in addition to the usual selfishness of the users, the relationship between the users is adversarial in the sense of both receivers' desires to eavesdrop on the communication of the other pair. We develop a game-theoretic model for this setting. We start with a model where each pair's payoff is their own secrecy rate. We then propose a refinement for the payoff function by explicitly accounting for the desire of the receiver to eavesdrop on the other party's communication. (Abstract shortened by UMI.).
Keywords/Search Tags:Wireless, Networks, MAC wiretap channel, IC with confidential messages, K-user IC, Dissertation, Secure, Information
Related items