-
Arbitrarily Varying Wiretap Channels with Non-Causal Side Information at the Jammer
Authors:
Carsten Rudolf Janda,
Moritz Wiese,
Eduard A. Jorswieck,
Holger Boche
Abstract:
Secure communication in a potentially malicious environment becomes more and more important. The arbitrarily varying wiretap channel (AVWC) provides information theoretical bounds on how much information can be exchanged even in the presence of an active attacker. If the active attacker has non-causal side information, situations in which a legitimate communication system has been hacked, can be m…
▽ More
Secure communication in a potentially malicious environment becomes more and more important. The arbitrarily varying wiretap channel (AVWC) provides information theoretical bounds on how much information can be exchanged even in the presence of an active attacker. If the active attacker has non-causal side information, situations in which a legitimate communication system has been hacked, can be modeled. We investigate the AVWC with non-causal side information at the jammer for the case that there exists a best channel to the eavesdropper. Non-causal side information means that the transmitted codeword is known to an active adversary before it is transmitted. By considering the maximum error criterion, we allow also messages to be known at the jammer before the corresponding codeword is transmitted. A single letter formula for the common randomness secrecy capacity is derived. Additionally, we provide a single letter formula for the common randomness secrecy capacity, for the cases that the channel to the eavesdropper is strongly degraded, strongly noisier, or strongly less capable with respect to the main channel. Furthermore, we compare our results to the random code secrecy capacity for the cases of maximum error criterion but without non-causal side information at the jammer, maximum error criterion with non-causal side information of the messages at the jammer, and the case of average error criterion without non-causal side information at the jammer.
△ Less
Submitted 14 April, 2022; v1 submitted 9 January, 2020;
originally announced January 2020.
-
On Stochastic Orders and Fast Fading Multiuser Channels with Statistical CSIT
Authors:
Pin-Hsun Lin,
Eduard A. Jorswieck,
Rafael F. Schaefer,
Martin Mittelbach,
Carsten R. Janda
Abstract:
In this paper, fading Gaussian multiuser channels are considered. If the channel is perfectly known to the transmitter, capacity has been established for many cases in which the channels may satisfy certain information theoretic orders such as degradedness or strong/very strong interference. Here, we study the case when only the statistics of the channels are known at the transmitter which is an o…
▽ More
In this paper, fading Gaussian multiuser channels are considered. If the channel is perfectly known to the transmitter, capacity has been established for many cases in which the channels may satisfy certain information theoretic orders such as degradedness or strong/very strong interference. Here, we study the case when only the statistics of the channels are known at the transmitter which is an open problem in general. The main contribution of this paper is the following: First, we introduce a framework to classify random fading channels based on their joint distributions by leveraging three schemes: maximal coupling, coupling, and copulas. The underlying spirit of all scheme is, we obtain an equivalent channel by changing the joint distribution in such a way that it now satisfies a certain information theoretic order while ensuring that the marginal distributions of the channels to the different users are not changed. The construction of this equivalent multi-user channel allows us to directly make use of existing capacity results, which includes Gaussian interference channels, Gaussian broadcast channels, and Gaussian wiretap channels. We also extend the framework to channels with a specific memory structure, namely, channels with finite-state, wherein the Markov fading broadcast channel is discussed as a special case. Several practical examples such as Rayleigh fading and Nakagami-\textit{m} fading illustrate the applicability of the derived results.
△ Less
Submitted 3 October, 2018; v1 submitted 11 December, 2017;
originally announced December 2017.
-
Stealthy Secret Key Generation
Authors:
Pin-Hsun Lin,
Carsten Rudolf Janda,
Eduard Axel Jorswieck
Abstract:
In this work, we consider a complete covert communication system, which includes the source-model of a stealthy secret key generation (SSKG) as the first phase. The generated key will be used for the covert communication in the second phase of the current round and also in the first phase of the next round. We investigate the stealthy SK rate performance of the first phase. The derived results sho…
▽ More
In this work, we consider a complete covert communication system, which includes the source-model of a stealthy secret key generation (SSKG) as the first phase. The generated key will be used for the covert communication in the second phase of the current round and also in the first phase of the next round. We investigate the stealthy SK rate performance of the first phase. The derived results show that the SK capacity lower and upper bounds of the source-model SKG are not affected by the additional stealth constraint. This result implies that we can attain the SSKG capacity for free when the sequences observed by the three terminals Alice ($X^n$), Bob ($Y^n$) and Willie ($Z^n$) follow a Markov chain relationship, i.e., $X^n-Y^n-Z^n$. We then prove that the sufficient condition to attain both, the SK capacity as well as the SSK capacity, can be relaxed from physical to stochastic degradedness. In order to underline the practical relevance, we also derive a sufficient condition to attain the degradedness by the usual stochastic order for Maurer's fast fading Gaussian (satellite) model for the source of common randomness.
△ Less
Submitted 28 February, 2017; v1 submitted 13 February, 2017;
originally announced February 2017.