AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (534.1 KB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Achievable Secrecy Rate Region of Two-Way Communication with Secret Key Feedback

Department of Electronic Engineering, State Key Laboratory on Microwave and Digital Communications, and National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China.
Department of Electronic Engineering and State Key Laboratory on Microwave and Digital Communications, Tsinghua University, Beijing 100084, China.
Show Author Information

Abstract

This paper investigates the achievable secrecy rate region of the Gaussian two-way wiretap channel, which describes the simultaneous secure two-way transmission of a confidential message. Through adjusting the time-sharing factor and the rate at which the random secret key is fed back, the allocation and optimization for the secrecy rates of two-way communication are achieved. Under peak and average power constraints, the achievable secrecy rate regions of the two-way communication are derived respectively.

References

[1]
Hero A., Secure space-time communication, IEEE Transactions on Information Theory, vol. 49, no 12, pp.3235-3249, 2003.
[2]
Li Z., Trappe W., and Yates R., Secret communication via multiantenna transmission, presented at 41st Annual Conference on Informance Sciences and System, Baltimore, MD, USA, 2007.
[3]
Shafiee S. and Ulukus S., Achievable rates in Gaussian MISO channels with secrecy constraints, presented at IEEE International Symposium on Information Theory, Nice, France, 2007.
[4]
Shafiee S., Liu N., and Ulukus S., Towards the secrecy capacity of the gaussian MIMO wire-tap channel: The 2-2-1 channel, IEEE Transactions on Information Theory, vol. 55, no. 9, pp. 4033-4039, 2009.
[5]
Negi R. and Goel S., Secret communication using artificial noise, presented at IEEE 62nd Vehicular Technology Conference, Dallas, TX, USA, 2005.
[6]
Goel S. and Negi R., Guaranteeing secrecy using artificial noise, IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180-2189, 2008.
[7]
Leung-Yan-Cheong S. K., Multi-user and wiretap channels including feedback, Ph D dissertation, Stanford, CA, USA: Stanford Univ., 1976.
[8]
Yang B., Wang W., Yin Q., and Fan J., Secret wireless communication with public feedback by common randomness, IEEE Wireless Communications Letters, vol. 3, no. 3, pp. 269-272, 2014.
[9]
Tekin E. and Yener A., The general gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming, IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2735-2751, 2007.
[10]
Lai L., Gamal H. E., and Poor H. V., The wiretap channel with feedback: Encryption over the channel, IEEE Transactions on Information Theory, vol. 54, no. 11, pp. 5059-5067, 2008.
[11]
L. Lai, H. E. Gamal, and H. V. Poor, Secrecy capacity of the wiretap channel with noisy feedback, arXiv preprint, arXiv: 0710.0865, 2007.
[12]
Amariucai G. T. and Wei S., Feedback-based collaborative secrecy encoding over binary symmetric channels, IEEE Transactions on Information Theory, vol. 58, no. 8, pp. 5248-5266, 2012.
[13]
Kim T. T. and Poor H. V., Secure communications with insecure feedback: Breaking the high-SNR ceiling, IEEE Transactions on Information Theory, vol. 56, no. 8, pp. 3700-3711, 2010.
[14]
He X. and Yener A., The role of feedback in two-way secure cocmmunication, IEEE Transactions on Information Theory, vol. 59, no. 12, pp. 8115–8130, 2013.
[15]
Gunduz D., Brown D. R., and Poor H. V., Secret communication with feedback, presented at IEEE International Symposium on Information Theory and Its Applications, Auckland, New Zealand, 2008.
[16]
Ardestanizadeh E., Franceschetti M., Javidi T., and Kim Y. H., Wiretap channel with secure rate-limited feedback, IEEE Transactions on Information Theory, vol. 55, no. 12, pp. 5353-5361, 2009.
[17]
Ahlswede R. and Cai N., Transmission identification and common randomness capacities for wire-tap channels with secure feedback from the decoder, in General Theory of Information Transfer and Combinatorics. Springer, 2006, pp. 258–275.
[18]
Shannon C. E., Communication theory of secrecy systems, Bell Syst.Tech. J., vol. 28, no. 4, pp. 656–715, 1949.
[19]
Cohen A. and Cohen A., Wiretap channel with causal state information and secure rate-limited feedback, IEEE Transactions on Communications, vol. 64, no. 3, pp. 1192-1203, 2016.
[20]
Via J., Time and power allocation for the gaussian wiretap channel with feedback of secret keys, presented at IEEE 16th International Workshop on Signal Processing Advances in Wireless Communication (SPAWC), Stockholm, Sweden, 2015.
[21]
Li T., Zhao J., and Zhou S., Secrecy rate region of independent parallel multiple-carrier two-way secure communications with secure feedback, presented at IEEE International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 2015.
[22]
Boyd S. and Vandenberghe L., Convex Optimization. Cambridge, UK: Cambridge University Press, 2004.
[23]
Leung-Yan-Cheong S. K. and Hellman M. E., The Gaussian wiretap channel, IEEE Transaction on Information Theory, vol. 24, no. 4, pp. 451-456, 1978.
Tsinghua Science and Technology
Pages 126-134
Cite this article:
Li T, Zhou S. Achievable Secrecy Rate Region of Two-Way Communication with Secret Key Feedback. Tsinghua Science and Technology, 2018, 23(2): 126-134. https://doi.org/10.26599/TST.2018.9010058

511

Views

22

Downloads

1

Crossref

N/A

Web of Science

0

Scopus

0

CSCD

Altmetrics

Received: 15 November 2016
Revised: 07 December 2016
Accepted: 12 December 2016
Published: 02 April 2018
© The author(s) 2018
Return