Secrecy Capacity of Independent Parallel Channels
Ensuring the confidentiality of communications is fundamental to securing any network. This requirement becomes particularly important for wireless systems, where eavesdropping is facilitated by the broadcast nature of the wireless medium. Rather than physically guard the communication medium to provide confidentiality, the traditional approach is to employ cryptographic algorithms to ensure that only legitimate users can correctly interpret the messages, while all other entities fail to glean any useful information.
KeywordsFading Channel Power Allocation Channel Gain Optimal Power Allocation Secrecy Rate
Unable to display preview. Download preview PDF.
- 1.C. Shannon. Communication theory of secrecy systems. Bell Sys. Tech. J., 28:657–715, 1949.Google Scholar
- 4.Ueli M. Maurer and Stefan Wolf. Information-theoretic key agreement: From weak to strong secrecy for free. In EUROCRYPT, pages 351–368, 2000.Google Scholar
- 6.J. Körner and K. Marton. Comparison of two noisy channels. In I. Csiszár and P. Elias, editors, Topics In Information Theory, pages 411–423. Colloquia Mathematica Societatis Janos Bolyai, Amsterdam, The Netherlands: North Holland, 1977.Google Scholar
- 7.S. Boyd and L. Vandenberghe. Convex Optimization. Cambridge University Press, 2004.Google Scholar
- 10.D. Tse and P. Viswanath. Fundamentals of Wireless Communication. Cambridge University Press, 2005.Google Scholar
- 16.S. Verdu. Recent results on the capacity of wideband channels in the low-power regime. IEEE Wireless Communications, pages 40–45, August 2002.Google Scholar