Next Article in Journal
Kappa Distributions and Isotropic Turbulence
Previous Article in Journal
Variational Autoencoder Reconstruction of Complex Many-Body Physics
Previous Article in Special Issue
Ergodic Rate for Fading Interference Channels with Proper and Improper Gaussian Signaling
Open AccessArticle

Secure Retrospective Interference Alignment

Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ 85721, USA
*
Author to whom correspondence should be addressed.
Entropy 2019, 21(11), 1092; https://doi.org/10.3390/e21111092
Received: 21 September 2019 / Revised: 16 October 2019 / Accepted: 24 October 2019 / Published: 7 November 2019
(This article belongs to the Special Issue Wireless Networks: Information Theoretic Perspectives)
In this paper, the K-user interference channel with secrecy constraints is considered with delayed channel state information at transmitters (CSIT). We propose a novel secure retrospective interference alignment scheme in which the transmitters carefully mix information symbols with artificial noises to ensure confidentiality. Achieving positive secure degrees of freedom (SDoF) is challenging due to the delayed nature of CSIT, and the distributed nature of the transmitters. Our scheme works over two phases: Phase one, in which each transmitter sends information symbols mixed with artificial noises, and repeats such transmission over multiple rounds. In the next phase, each transmitter uses the delayed CSIT of the previous phase and sends a function of the net interference and artificial noises (generated in previous phase), which is simultaneously useful for all receivers. These phases are designed to ensure the decodability of the desired messages while satisfying the secrecy constraints. We present our achievable scheme for three models, namely: (1) K-user interference channel with confidential messages (IC-CM), and we show that 1 2 ( K - 6 ) SDoF is achievable; (2) K-user interference channel with an external eavesdropper (IC-EE); and 3) K-user IC with confidential messages and an external eavesdropper (IC-CM-EE). We show that for the K-user IC-EE, 1 2 ( K - 3 ) SDoF is achievable, and for the K-user IC-CM-EE, 1 2 ( K - 6 ) is achievable. To the best of our knowledge, this is the first result on the K-user interference channel with secrecy constrained models and delayed CSIT that achieves an SDoF which scales with K , square-root of number of users.
Keywords: interference channel; secure retrospective interference alignment; secure degrees of freedom (SDoF); delayed CSIT interference channel; secure retrospective interference alignment; secure degrees of freedom (SDoF); delayed CSIT
MDPI and ACS Style

Seif, M.; Tandon, R.; Li, M. Secure Retrospective Interference Alignment. Entropy 2019, 21, 1092.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop