Next Article in Journal
A Novel Clustering Method Based on Adjacent Grids Searching
Next Article in Special Issue
Jeffreys Divergence and Generalized Fisher Information Measures on Fokker–Planck Space–Time Random Field
Previous Article in Journal
Evolution of Robustness in Growing Random Networks
Previous Article in Special Issue
Construction of Optimal Frequency Hopping Sequence Set with Low-Hit-Zone
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback

1
School of Information Science and Technology, Southwest Jiaotong University, Chengdu 611756, China
2
Peng Cheng Laboratory, Shenzhen 518055, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Entropy 2023, 25(9), 1339; https://doi.org/10.3390/e25091339
Submission received: 14 August 2023 / Revised: 13 September 2023 / Accepted: 14 September 2023 / Published: 15 September 2023
(This article belongs to the Special Issue Coding and Entropy)

Abstract

:
For the point-to-point additive white Gaussian noise (AWGN) channel with an eavesdropper and feedback, it has already been shown that the secrecy capacity can be achieved by a secret key-based feedback scheme, where the channel feedback is used for secret sharing, and then encrypting the transmitted message by the shared key. By secret sharing, any capacity-achieving coding scheme for the AWGN channel without feedback can be secure by itself, which indicates that the capacity of the same model without the secrecy constraint also affords an achievable secrecy rate to the AWGN channel with an eavesdropper and feedback. Then it is natural to ask: is the secret key-based feedback scheme still the optimal scheme for the AWGN multiple-access channel (MAC) with an external eavesdropper and channel feedback (AWGN-MAC-E-CF), namely, achieving the secrecy capacity region of the AWGN-MAC-E-CF? In this paper, we show that the answer to the aforementioned question is no, and propose the optimal feedback coding scheme for the AWGN-MAC-E-CF, which combines an existing linear feedback scheme for the AWGN MAC with feedback and the secret key scheme in the literature. This paper provides a way to find optimal coding schemes for AWGN multi-user channels in the presence of an external eavesdropper and channel feedback.

1. Introduction

The model of the wiretap channel lays the foundation of physical layer security (PLS). In references [1,2], it has been shown that the secrecy capacity of the additive white Gaussian noise (AWGN) wiretap channel model, which is the maximum transmission rate under the perfect weak secrecy (PWS) constraint, is equal to the difference between the channel capacities of the legal receiver and the eavesdropper, and this indicates that to achieve secrecy, the loss of transmission rate is inevitable.
Though channel feedback does not increase the capacity of a point-to-point memoryless channel [3], references [4,5] found that the feedback channel can be used to generate a secret key shared between the legal parties. Then, the transmitter encrypting via the transmitted message by this key, the secrecy capacity of the wiretap channel can be enhanced. Subsequently, references [6,7] further showed that for modulo-additive and AWGN cases, the secret key schemes in references [4,5] are optimal and achieve the capacities of the same models without feedback and the secrecy constraint. Then it is natural to ask: is the secret key-based feedback scheme still the optimal scheme for the AWGN multiple-access channel (MAC) with an external eavesdropper and channel feedback (AWGN-MAC-E-CF), namely, achieving the secrecy capacity region of the AWGN-MAC-E-CF? The answer to the aforementioned question is no, and this is due to the fact that feedback increases the capacity region of the AWGN MAC [8], and the secret key scheme only achieves the capacity region of the AWGN MAC without feedback. Then another question is: what is the optimal feedback scheme for the AWGN-MAC-E-CF, and is the secrecy capacity region of the AWGN-MAC-E-CF equal to the capacity region of the AWGN MAC with feedback, which is in parallel to the fact that the secrecy capacity of the point-to-point AWGN channel with an eavesdropper and feedback equals the capacity of the same model without the secrecy constraint [6,7].
In [9], it has been shown that the classical Schalkwijk-Kailath (SK) scheme [10], which is a capacity-achieving scheme for the point-to-point AWGN channel with feedback, also achieves the secrecy capacity of the point-to-point AWGN channel with an eavesdropper and feedback. Motivated by [9], in this paper, we combine Ozarow’s SK-type scheme for the AWGN MAC with feedback [8] and the secret key scheme in the literature to show that the secrecy capacity region of the AWGN-MAC-E-CF is equal to the capacity region of the AWGN MAC with feedback. The basic intuition behind this scheme is explained below. In [9], it has been shown that the SK scheme satisfies the PWS by itself and achieves the capacity of the point-to-point AWGN channel with feedback. In a similar way, we show that Ozarow’s extended SK scheme [8] satisfies the PWS by itself, however, we find that this SK-type scheme does not achieve the entire capacity region of the AWGN MAC with feedback. To show that every point in the capacity region of the AWGN MAC with feedback satisfies PWS, we split the transmitted message of one transmitter into two parts, where one part together with the message of the other transmitter are encoded by Ozarow’s SK-type scheme, and the other part is encrypted by a key which is generated by the channel noise at the first time instant and this key is only known by the legal parties. Following the security property of the SK-type scheme and the secret key, we show that every point in the capacity region of the AWGN MAC with feedback satisfies PWS, which indicates that the secrecy capacity region of the AWGN-MAC-E-CF is equal to the capacity region of the AWGN MAC with feedback.

2. Model Formulation and Main Result

2.1. Model Formulation

For the AWGN-MAC-E-CF (see Figure 1), the i-th ( i { 1 , 2 , , N } ) channel inputs and outputs are given by
Y i = X 1 , i + X 2 , i + η i , Z i = X 1 , i + X 2 , i + η e , i , i { 1 , 2 , , N } Z ˜ i 1 = Y i 1 + η d , i 1 , i { 1 , 2 , , N 1 }
where X k , i ( k { 1 , 2 } ) is the channel codeword subject to an average power constraint P k , namely, 1 N i = 1 N E [ X k , i 2 ] P k , Y i is the legal receiver’s channel output. Here, note that the eavesdropper eavesdrops the codewords X 1 , i and X 2 , i by an eavesdropping channel with output Z i , and eavesdrops the feedback signal Y i 1 by another eavesdropping channel with output Z ˜ i 1 . In addition, η i N ( 0 , σ 2 ) , η e , i N ( 0 , σ e 2 ) , η d , i N ( 0 , σ d 2 ) are AWGNs, and they are independent of one another.
The transmitted message W k ( k { 1 , 2 } ) is uniformly drawn in W k = { 1 , 2 , , | W k | } ), and at time i { 1 , 2 , , N } , the codeword X k , i ( k { 1 , 2 } ) is a (stochastic) function of the message W k and the feedback Y i 1 = ( Y 1 , , Y i 1 ) . At time N, the legal receiver obtains ( W ^ 1 , W ^ 2 ) = ψ ( Y N ) , where ψ is the decoding function and the average decoding error probability is denoted by
P e = P r [ ( W ^ 1 , W ^ 2 ) ( W 1 , W 2 ) ] = w 1 , w 2 W 1 , W 2 P r { ψ ( Y N ) ( w 1 , w 2 ) | ( W 1 , W 2 ) = ( w 1 , w 2 ) } | W 1 | | W 2 | .
The eavesdropper’s equivocation rate of W 1 and W 2 is denoted by
Δ = 1 N H ( W 1 , W 2 | Z N , Z ˜ N 1 ) .
A rate pair ( R 1 , R 2 ) is achievable with PWS if for any ϵ > 0 and sufficiently large N, there exist channel encoders-decoders such that
log | W k | N R k ϵ , Δ R 1 + R 2 ϵ , P e ϵ .
The secrecy capacity region C s , m a c f of the AWGN-MAC-E-CF is composed of all achievable secrecy rate pairs defined above.

2.2. Main Result

The following Theorem 1 shows that C s , m a c f equals the capacity of AWGN MAC with feedback.
Theorem 1. 
C s , m a c f = C m a c f , where C m a c f is the capacity region of the AWGN MAC with feedback [8] (the model of Figure 1 without the secrecy constraint), and it is given by C m a c f = 0 ρ 1 R ( ρ ) , and
R ( ρ ) = ( R 1 , R 2 ) : R 1 1 2 log 1 + P 1 σ 2 ( 1 ρ 2 ) , R 2 1 2 log 1 + P 2 σ 2 ( 1 ρ 2 ) , R 1 + R 2 1 2 log 1 + P 1 + P 2 + 2 ρ P 1 P 2 σ 2 .
Proof. 
See Section 3. □
Remark 1. 
Applying the secret key feedback schemes in [6,7] to AWGN MAC with feedback, it is easy to see that any capacity-achieving coding scheme for the AWGN MAC without feedback is secure by itself, which indicates that the secret key inner bound C s , m a c f i n 1 on C s , m a c f is in fact the capacity region C m a c of the AWGN MAC without feedback, i.e.,
C s , m a c f i n 1 = C m a c = ( R 1 , R 2 ) : R 1 1 2 log 1 + P 1 σ 2 , R 2 1 2 log 1 + P 2 σ 2 , R 1 + R 2 1 2 log 1 + P 1 + P 2 σ 2 .
Comparing (5) and (6), we conclude that the secret key scheme is not optimal for the AWGN-MAC-E-CF. In the next section, we propose a new feedback scheme that achieves C s , m a c f in Theorem 1.

2.3. Numerical Example

The following Figure 2 plots C s , m a c f and C s , m a c f i n 1 for P 1 = 5 , P 2 = 5 , σ 2 = 5 , σ e 2 = 5 . It is easy to see that the gap is obvious and the secret key feedback scheme is not optimal for the AWGN-MAC-E-CF.

3. Proof of the Theorem 1

First, note that C s , m a c f cannot exceed the capacity region of the same model without the secrecy constraint, i.e., C s , m a c f C m a c f . Then, it remains to be proven that any rate pair ( R 1 , R 2 ) C m a c f is achievable with PWS defined in (4), which is equivalent to show that for any 0 ρ 1 , R ( ρ ) in (5) is achievable with PWS. In Figure 3, we plot R ( ρ ) for all 0 ρ 1 , where ρ * is the ρ satisfying the sum of the right hand side (RHS) of the first two inequalities in (5), which equals the RHS of the third inequality, which is equivalent to ρ * (the solution in ( 0 , 1 ) ), of
σ 2 ( σ 2 + P 1 + P 2 + 2 P 1 P 2 ρ ) = [ σ 2 + P 1 ( 1 ρ 2 ) ] [ σ 2 + P 2 ( 1 ρ 2 ) ] .
From Figure 3, we see that when ρ * < ρ 1 , R ( ρ ) is included in R ( ρ * ) , hence we only need to prove that for any 0 ρ ρ * , R ( ρ ) is achievable with PWS. In the remainder of this section, the proof is given by two cases, i.e., ρ = ρ * and 0 ρ < ρ * . The details are given below.

3.1. Case 1: ρ = ρ *

In this case, we directly show that Ozarow’s SK-type feedback scheme for AWGN MAC with feedback [8] is achievable with PWS. The basic intuition behind this scheme is described below. First, recall that for the classical point-to-point SK scheme, the receiver estimates the transmitted message by minimum mean square estimation (MMSE), and through a noiseless feedback channel, the estimation error of the receiver’s estimation is known by the transmitter since he knows the real transmitted message, and hence in the next time, the transmitter encodes this estimation error as a codeword and sends it to the receiver with the AWGN channel. By iteration, the receiver’s estimation error vanishes as the coding blocklength tends to infinity. Then, for the two-user AWGN MAC with noiseless feedback, by viewing each other’s transmitted codeword as part of the channel noise, this MAC model can be equivalent to two point-to-point AWGN channels with noiseless feedback. In addition to this, to further increase the sum rate of this MAC model, a modulation factor ρ is applied to the second user’s encoder, which helps to enhance the mutual information between the transceiver. The detail of this scheme is given below.
For k { 1 , 2 } , let W k = { 1 , 2 , , 2 N R k } be the message set of W k , divide the interval [ 0.5 , 0.5 ] into 2 N R k equally spaced sub-intervals, and each sub-interval center is mapped to a value in W k . The center of the sub-interval with respect to (w.r.t.) W k is denoted by Θ k , where its variance approximately equals 1 12 .
Coding procedure:
At time instant 1, Transmitter 2 sends nothing but zero, i.e., X 2 , 1 = 0 , and Transmitter 1 sends
X 1 , 1 = 12 P 1 Θ 1 + S ,
where S N ( 0 , σ 0 2 ) is a Gaussian random variable and it is independent of the transmitted message and all signals in Figure 1. Here, S is used to obtain a steady ρ i for 2 i N , and this will be explained later.
Once the legal receiver obtains Y 1 = 12 P 1 Θ 1 + S + η 1 , his first estimation Θ ^ 1 , 1 about Θ 1 is given by
Θ ^ 1 , 1 = Y 1 12 P 1 = Θ 1 + S + η 1 12 P 1 .
For continuity, define the legal receiver’s first estimation of Θ 2 as Θ ^ 2 , 1 = 0 .
At the end of time instant 1, Transmitter 1 receives Y 1 via channel feedback, and he computes the error ϵ 1 , 1 of the legal receiver’s first estimation about Θ 1 by
ϵ 1 , 1 = Θ ^ 1 , 1 Θ 1 = S + η 1 12 P 1 ,
where the variance of ϵ 1 , 1 is given by
α 1 , 1 = V a r ( ϵ 1 , 1 ) = E S + η 1 12 P 1 2 = σ 0 2 + σ 2 12 P 1 .
At time instant 2, Transmitter 1 sends nothing but zero, i.e., X 1 , 2 = 0 , and Transmitter 2 sends
X 2 , 2 = 12 P 2 Θ 2 + S .
Once the legal receiver obtains Y 2 = 12 P 2 Θ + S + η 2 , his second estimation Θ ^ 2 , 2 about Θ 2 is given by
Θ ^ 2 , 2 = Y 2 12 P 2 = Θ 2 + S + η 2 12 P 2 .
For continuity, define the legal receiver’s second estimation of Θ 1 as Θ ^ 1 , 2 = Θ ^ 1 , 1 , which indicates that ϵ 1 , 2 = ϵ 1 , 1 , and α 1 , 2 = α 1 , 1 .
At the end of time instant 2, Transmitter 2 receives Y 2 via channel feedback, and computes the error ϵ 2 , 2 of the legal receiver’s second estimation about Θ 2 by
ϵ 2 , 2 = Θ ^ 2 , 2 Θ 2 = S + η 2 12 P 2 ,
where the variance of ϵ 2 , 2 is given by
α 2 , 2 = V a r ( ϵ 2 , 2 ) = E S + η 2 12 P 2 2 = σ 0 2 + σ 2 12 P 2 .
At time instant 3 i N , first, define
ρ i 1 = E [ ϵ 1 , i 1 ϵ 2 , i 1 ] α 1 , i 1 α 2 , i 1
as the correlation coefficient of ϵ 1 , i 1 and ϵ 2 , i 1 , which are the legal receiver’s estimation errors of Θ 1 and Θ 2 at the time instant i 1 . Moreover, note that α k , i 1 ( k { 1 , 2 } ) is the variance of ϵ k , i 1 . Next, define the symbolic function sgn ( ρ i 1 ) of ρ i 1 as
sgn ( ρ i 1 ) = 1 , ρ i 1 0 1 , ρ i 1 < 0
which is used as a modulation factor maximizing the mutual information between the transmitters and the legal receiver. Then, Transmitters 1 and 2 send
X 1 , i = P 1 α 1 , i 1 ϵ 1 , i 1 , X 2 , i = P 2 α 2 , i 1 ϵ 2 , i 1 · sgn ( ρ i 1 ) , r e s p e c t i v e l y .
Once receiving Y i = X 1 , i + X 2 , i + η i , the legal receiver updates his estimation of Θ k by
Θ ^ k , i = Θ ^ k , i 1 β k , i Y i ,
where
β k , i = E [ ϵ k , i 1 Y i ] E [ Y i 2 ] .
Since ϵ k , i = Θ ^ k , i Θ k , (19) can be rewritten as
ϵ k , i = ϵ k , i 1 β k , i Y i .
For 3 i N , the variance α k , i ( k { 1 , 2 } ) of ϵ k , i can be calculated as
α k , i = α k , i 1 σ 2 + P k ( 1 ρ i 1 2 ) P 1 + P 2 + 2 P 1 P 2 | ρ i 1 | + σ 2 .
Now, substituting (21) and (22) into (16), we have
ρ i = ρ i 1 σ 2 sgn ( ρ k 1 ) P 1 P 2 ( 1 ρ i 1 2 ) [ P 1 ( 1 ρ i 1 2 ) + σ 2 ] [ P 2 ( 1 ρ i 1 2 ) + σ 2 ] ,
where
ρ 2 = σ 0 2 σ 0 2 + σ 2 .
In general, | ρ i | | ρ i 1 | , to find a steady point in | ρ i | , i.e., | ρ i | = | ρ i 1 | , we substitute (23) into 1 ρ i 2 = 1 ρ i 1 2 , which is equivalent to
σ 2 σ 2 + P 1 + P 2 + 2 P 1 P 2 ρ i 1 = σ 2 + P 1 ( 1 ρ i 1 2 ) σ 2 + P 2 ( 1 ρ i 1 2 ) .
Here, note that the equation in (25) is exactly the same as that in (7), and ρ * is the solution to this equation. Hence, choosing an appropriate variance σ 0 2 of S such that ρ 2 in (24) satisfies ρ 2 = ρ * , we conclude that | ρ i | = ρ * for all 2 i N .
Next, following the error probability analysis in [8], we conclude that if ( R 1 , R 2 ) R ( ρ * ) , P e 0 , as N . Now it remains to show that any rate pair ( R 1 , R 2 ) R ( ρ * ) satisfies PWS; see the details below.
Equivocation analysis: first, note that for 3 i N , the codewords X 1 , i and X 2 , i are linear combinations of η 1 , , η i 1 , and S, which is in parallel to that of the classical SK scheme [9] for the point-to-point AWGN channel. Then the eavesdropper’s equivocation rate is bounded by
Δ = 1 N H ( W 1 , W 2 | Z N , Z ˜ N 1 ) = ( a ) 1 N H ( Θ 1 , Θ 2 | Z N , Z ˜ N 1 ) 1 N H ( Θ 1 , Θ 2 | Z N , Z ˜ N 1 , η 1 , , η N , S ) = 1 N H ( Θ 1 , Θ 2 | 12 P 1 Θ 1 + S + η e , 1 Z 1 , 12 P 2 Θ 2 + S + η e , 2 Z 2 , X 1 , 3 + X 2 , 3 + η e , 3 , , X 1 , N + X 2 , N + η e , N Z 3 , , Z N , η 1 , , η N , S , 12 P 1 Θ 1 + S + η 1 + η d , 1 Z ˜ 1 , 12 P 2 Θ 2 + S + η 2 + η d , 2 Z ˜ 2 , X 1 , 3 + X 2 , 3 + η 3 + η d , 3 , , X 1 , N 1 + X 2 , N 1 + η N 1 + η d , N 1 Z ˜ 3 , , Z ˜ N 1 ) = ( b ) 1 N H ( Θ 1 , Θ 2 | 12 P 1 Θ 1 + η e , 1 , 12 P 2 Θ 2 + η e , 2 , 12 P 1 Θ 1 + η d , 1 , 12 P 2 Θ 2 + η d , 2 , η e , 3 , , η e , N , η d , 3 , , η d , N 1 , η 1 , , η N , S ) = ( c ) 1 N H ( Θ 1 , Θ 2 | 12 P 1 Θ 1 + η e , 1 , 12 P 2 Θ 2 + η e , 2 , 12 P 1 Θ 1 + η d , 1 , 12 P 2 Θ 2 + η d , 2 ) ( d ) H ( Θ 1 ) + H ( Θ 2 ) + h ( η d , 1 ) + h ( η d , 2 ) + h ( η e , 1 ) + h ( η e , 2 ) N h ( 12 P 1 Θ 1 + η e , 1 ) + h ( 12 P 2 Θ 2 + η e , 2 ) N h ( 12 P 1 Θ 1 + η d , 1 ) + h ( 12 P 2 Θ 2 + η d , 2 ) N ( e ) R 1 + R 2 1 N 1 2 log 1 + P 1 σ e 2 + 1 2 log 1 + P 2 σ e 2 information leakage on the forward channel 1 N 1 2 log 1 + P 1 σ d 2 + 1 2 log 1 + P 2 σ d 2 information leakage on the feedback channel ,
where (a) follows from the fact that Θ k ( k = 1 , 2 ) is a deterministic function of W k , (b) follows from the fact that X 1 , i and X 2 , i are linear combinations of η 1 , , η i 1 , and S, (c) follows from the fact that Θ 1 , Θ 2 , η e , 1 , η e , 2 , η d , 1 , η d , 2 are independent of η e , 3 , , η e , N , η 1 ,…, η N , η d , 3 , , η d , N , and S, (d) follows from the fact that Θ 1 , Θ 2 , η e , 1 , η e , 2 , η d , 1 , η d , 2 are independent of one another, (e) follows from H ( Θ 1 ) = N R 1 , H ( Θ 2 ) = N R 2 , and the variance of Θ k ( k = 1 , 2 ) equals 1 12 as N tends to infinity.
From (26), we conclude that choosing sufficiently large N, the secrecy constraint Δ = H ( W 1 , W 2 | Z N , Z ˜ N 1 ) N R 1 + R 2 ϵ in (4) is guaranteed, which indicates that any pair ( R 1 , R 2 ) in R ( ρ * ) is achievable with PWS.

3.2. Case 2: 0 ρ < ρ *

In this case, we show that the pentagon rate region R ( 0 ρ < ρ * ) in Figure 3 is achievable with PWS. We only need to show that the corner point Q is achievable with PWS, then by symmetry, Q is also achievable with PWS, finally, using time sharing between Q and Q , the line Q Q is achievable with PWS, which indicates that the entire region R ( 0 ρ < ρ * ) is achievable with PWS. The secure coding scheme that achieves Q is briefly explained below. Divide the message W 1 of Transmitter 1 into two parts, where one part together with the message W 2 of Transmitter 2 are encoded by the SK-type scheme shown in case 1, and the other part of W 1 is encrypted by a key which is generated by the channel noise at the first time instant and this key is only known by the legal parties. In case 1 we have shown that Ozarow’s SK-type scheme is achievable with PWS, and note that the other part of W 1 is also achievable with PWS since it is protected by a secret key, which indicates that the whole scheme satisfies PWS. The details of our proposed scheme are given below.
Message splitting: the message W 1 is divided into two independent parts ( W a , W b ) , where W a takes values in W a = { 1 , 2 , , 2 N R a } , W b takes values in W b = { 1 , 2 , , 2 N R b } , and R a + R b = R 1 . W 2 takes values in W 2 = { 1 , 2 , , 2 N R 2 } . Divide the interval [ 0.5 , 0.5 ] into 2 N R l ( l { b , 2 } ) equally spaced sub-intervals, and each sub-interval center corresponds to a value in W l . The center of the sub-interval w.r.t. W b ( W 2 ) is denoted by Θ 1 ( Θ 2 ), where the variance of Θ k ( k { 1 , 2 } ) approximately equals 1 12 .
Secret key generation: at time instant 1, Transmitters 1 and 2 send X 1 , 1 = X 2 , 1 = 0 . The legal receiver receives Y 1 = X 1 , 1 + X 2 , 1 + η 1 = η 1 , and transmits Y 1 back to the transmitters. Since Y 1 is continuous, we can generate a secret key K with arbitrary rate from Y 1 and this key is uniformly distributed in W a = { 1 , 2 , , 2 N R a } .
Encoding-decoding procedure: at time instants 2 and 3, the transmission codewords are exactly the same as those in case 1 at time instants 1 and 2, namely, X 1 , 2 = 12 P 1 Θ 1 + S , X 2 , 2 = 0 , X 1 , 3 = 0 and X 2 , 3 = 12 P 2 Θ 2 + S .
At time instant 4 i N , Transmitters 1 and 2 send
X 1 , i = U i + V i = U i + ( 1 γ ) P 1 α 1 , i 1 ϵ 1 , i 1 , X 2 , i = P 2 α 2 , i 1 ϵ 2 , i 1 sgn ( ρ i 1 ) ,
respectively, where U i is the codeword of the encrypted sub-message W a K with transmission power γ P 1 ( 0 γ 1 ) , V i is the codeword of the sub-message W b with transmission power ( 1 γ ) P 1 . Here, note that the codeword U 4 N = ( U 4 , , U N ) is generated by Shannon’s random coding scheme [3], namely, each component of U 4 N is i.i.d. generated according to the Gaussian distribution with zero mean and variance γ P 1 , and U 4 N is one-to-one mapped to a value of W a K . In addition, for 4 i N , V i and X 2 , i (codewords for W b and W 2 ) are generated in the same way as the SK-type scheme of case 1, where U i + η i is viewed as the “channel noise” for the codewords V i and X 2 , i . Note that ϵ 1 , i , ϵ 2 , i , α 1 , i , α 2 , i , ρ i , and sgn ( ρ i ) are defined in the same way as those in Section 3.1 by replacing η i by U i + η i .
Decoding procedure: successive cancellation decoding is employed, specifically, first, viewing U i + η i as the equivalent channel noise and using the SK-type decoding scheme in case 1, for sufficiently large N, W b and W 2 can be decoded by the legal receiver with arbitrary small decoding error probability if
R b 1 2 log 1 + ( 1 γ ) P 1 σ 2 + γ P 1 ( 1 ρ * * 2 ) , R 2 1 2 log 1 + P 2 σ 2 + γ P 1 ( 1 ρ * * 2 ) ,
where ρ * * is the solution in ( 0 , 1 ) of
( σ 2 + γ P 1 ) [ σ 2 + γ P 1 + ( 1 γ ) P 1 + P 2 + 2 ( 1 γ ) P 1 P 2 ρ * * ] = σ 2 + γ P 1 + ( 1 γ ) P 1 ( 1 ρ * * 2 ) σ 2 + γ P 1 + P 2 ( 1 ρ * * 2 ) .
Here, note that N N 1 R b and N N 1 R 2 are actual transmission rates of W b and W 2 , respectively. For sufficiently large N, N N 1 R b and N N 1 R 2 tend to R b and R 2 , respectively.
After decoding W b and W 2 , the legal receiver subtracts V i and X 2 , i from his received signal Y i , which indicates that the channel noise of the equivalent channel for the transmission of U i is η i , then based on the channel coding theorem [3], we conclude that for sufficiently large N, W a can be decoded by the legal receiver with arbitrary small decoding error probability if
R a 1 2 log 1 + γ P 1 σ 2 .
Here, note that N N 3 R b is the actual transmission rate of W a , and for sufficiently large N, N N 3 R b tends to R a .
From (28) and (30), R 1 = R a + R b , and letting ρ = ( 1 γ ) ρ * * , we conclude that any pair ( R 1 , R 2 ) in R ( 0 ρ < ρ * ) is achievable. Now it remains to be shown that any rate pair ( R 1 , R 2 ) R ( 0 ρ < ρ * ) satisfies PWS; see the details below.
Equivocation analysis: the eavesdropper’s equivocation rate is bounded by
H ( W 1 , W 2 | Z N , Z ˜ N 1 ) N = H ( W a , W b , W 2 | Z N , Z ˜ N 1 ) N = H ( W a | Z N , Z ˜ N 1 ) N + H ( W b , W 2 | W a , Z N , Z ˜ N 1 ) N .
The first term in (31) can be calculated by
H ( W a | Z N , Z ˜ N 1 ) N H ( W a | Z N , Z ˜ N 1 , U 4 N ) N = ( a ) H ( W a | U 4 N ) N = ( b ) H ( W a | U 4 N , W a K ) N = H ( K | U 4 N , W a K ) N = ( c ) H ( K ) N = R a ,
where (a) follows from the Markov chain W a U 4 N ( Z N , Z ˜ N 1 ) , (b) follows from U 4 N is a deterministic function of ( W a K ) , and (c) follows from K is independent of ( W a K ) and U 4 N , and K is uniformly drawn from { 1 , 2 , , 2 N R a } .
For the second term in (31), along the lines of the equivocation analysis in case 1, we conclude that
1 N H ( W b , W 2 | Z N , Z ˜ N 1 , W a ) = 1 N H ( W b , W 2 | Z N , Z ˜ N 1 , W a , U 4 N ) R b + R 2 1 2 N log 1 + P 1 σ e 2 1 2 N log 1 + P 2 σ e 2 1 2 N log 1 + P 1 σ d 2 1 2 N log 1 + P 2 σ d 2 .
Substituting (32) and (33) into (31), choosing sufficiently large N, Δ = H ( W 1 , W 2 | Z N , Z ˜ N 1 ) N R 1 + R 2 ϵ is guaranteed, which completes the proof.

4. Discussion

In this section, we show that Ozarow’s scheme is in fact a secure finite blocklength (FBL) coding scheme, and characterize its sum rate under fixed coding blocklength, decoding error probability and the eavesdropper’s uncertainty about the transmitted messages. Then, we further explain the results via numerical examples.

4.1. The Definition of the Secure FBL Scheme for the AWGN-MAC-E-CF

For the AWGN-MAC-E-CF, the channel’s input and output relationship is given in Section 2.1.
A ( N , | W 1 | , | W 2 | , P 1 , P 2 ) -code under average power constraints consists of:
  • Message W k ( k { 1 , 2 } ) , uniformly drawn in W k = { 1 , 2 , , | W k | } .
  • Encoder k with outputs X k , i = f k , i ( W k , Y k , 1 i 1 ) satisfies the average power constraints
    1 N i = 1 N E [ X k , i 2 ] P k ,
    where f k , i ( · ) is a (stochastic) function.
  • The decoder with outputs
    ( W ^ 1 , W ^ 2 ) = ψ ( Y N ) ,
    where ψ is the decoding function of the Receiver.
The average decoding error probability P e k is defined as
P e = P r [ ( W ^ 1 , W ^ 2 ) ( W 1 , W 2 ) ] = w 1 , w 2 W 1 , W 2 P r { ψ ( Y N ) ( w 1 , w 2 ) | ( W 1 , W 2 ) = ( w 1 , w 2 ) } | W 1 | | W 2 | .
In addition, define the eavesdropper’s normalized equivocation (also called the secrecy level) as
Δ f = H ( W 1 , W 2 | Z N , Z ˜ N 1 ) H ( W 1 , W 2 ) ,
where 0 Δ 1 . The ( N , ϵ , δ ) -rate pair ( R 1 ( N , ϵ , δ ) , R 2 ( N , ϵ , δ ) ) is achievable with a secrecy level of δ ( 0 δ 1 ) if for given blocklength N, error probability ϵ and secrecy level δ , there exists a ( N , | W 1 | , | W 2 | , P 1 , P 2 ) -code described above such that
log | W 1 | N = R 1 ( N , ϵ , δ ) , log | W 2 | N = R 2 ( N , ϵ , δ ) , P e ϵ , Δ f δ .
For the AWGN-MAC-E-CF, the achievable sum-rate is denoted by
R s u m ( N , ϵ , δ ) = R 1 ( N , ϵ , δ ) + R 2 ( N , ϵ , δ ) ,
and the maximal sum-rate R s u m * ( N , ϵ , δ ) is the maximum sum-rate R s u m ( N , ϵ , δ ) defined in (39).

4.2. Main Result

Theorem 2. 
For given decoding error probability ϵ and boding blocklength N, let R s u m ( N , ϵ ) be the achievable sum-rate of the SK-type scheme for the AWGN-MAC-E-CF without the consideration of secrecy. Then for a given secrecy level δ, if the coding blocklength N in R s u m ( N , ϵ ) satisfies
N R s u m ( N , ϵ ) 1 2 ( 1 δ ) log 1 + P 1 σ e 2 1 + P 2 σ e 2 1 + P 1 σ d 2 1 + P 2 σ d 2 ,
the rate R s u m ( N , ϵ ) also serves as a lower bound on the maximal sum-rate R s u m * ( N , ϵ , δ ) , i.e.,
R s u m * ( N , ϵ , δ ) R s u m ( N , ϵ ) ,
where
R s u m ( N , ϵ ) = 1 2 log 1 + P 1 + P 2 + 2 ρ * P 1 P 2 σ 2 1 N log 1 + P 1 + P 2 + 2 ρ * P 1 P 2 σ 2 σ 0 2 + σ 2 12 P 1 P 2 Q 1 ϵ 2 2 ,
ρ * is the largest solution in ( 0 , 1 ) of
σ 2 σ 2 + P 1 + P 2 + 2 P 1 P 2 ρ = σ 2 + P 1 ( 1 ρ 2 ) σ 2 + P 2 ( 1 ρ 2 ) ,
and σ 0 2 satisfies
σ 0 2 σ 0 2 + σ 2 = ρ * .
Proof. 
See Section 4.4. □

4.3. Numerical Results

Define the minimum blocklength N satisfying (40) as the PLS requirement blocklength threshold. Figure 4 plots the relationship between secrecy level, decoding error probability, and PLS requirement blocklength threshold for the AWGN MAC with an external eavesdropper and feedback ( P 1 = P 2 = 2 , σ 2 = 1 ). From Figure 4, we conclude that for a fixed decoding error probability, the PLS requirement threshold is increasing while the secrecy level is increasing. Moreover, when the decoding error probability ϵ = 10 7 and the secrecy level δ = 0.99 , the PLS requirement blocklength threshold is about 115.
Figure 5 plots the decoding error probability P e of Ozarow’s SK scheme [8] and LDPC code [11] for P 1 = P 2 = 2 , and the length of transmission bits is 80. From Figure 5, we conclude that compared with LDPC scheme, the average error probability P e of Ozarow’s SK scheme decays much faster with the increasing coding blocklength N.

4.4. Proof of the Theorem 2

Encoding-decoding procudure: in fact, Ozarow’s scheme [8] is inherently a secure FBL coding scheme. The encoding and decoding processes are exactly the same as those described in Section 3.1, so we omit the detailed explanation here.
Decoding error probability analysis: the target error probability of the whole scheme is chosen to be ϵ . Then, we let the error probability of transmitting W k be P e , k which at most ϵ / 2 , i.e.,
P e , k ϵ 2 .
From (45) and the error probability analysis in [10], we have
R k ( N , ϵ ) = 1 2 log 1 + P k ( 1 ρ * 2 ) 1 2 N log 1 + P k ( 1 ρ * 2 ) 2 σ 0 2 + σ k 2 12 P k Q 1 ϵ 2 2 .
Let R k ( N , ϵ ) be message W k ’s achievable rate of the SK-type scheme for the AWGN-MAC-E-CF without the consideration of secrecy. From (39) and (46), we have R s u m ( N , ϵ ) which is given in (42).
Equivocation analysis: now we show the above scheme satisfies the PLS requirement when the coding blocklength is larger than a threshold.
Δ f = H ( W 1 , W 2 | Z N , Z ˜ N 1 ) H ( W 1 , W 2 ) H ( W 1 , W 2 | Z N , Z ˜ N 1 , η 1 , , η N , S ) H ( W 1 , W 2 ) 1 H ( W 1 , W 2 ) H ( W 1 , W 2 | Z N , Z ˜ N 1 , η 1 , , η N , S ) = 1 H ( W 1 , W 2 ) H ( W 1 , W 2 | 12 P 1 Θ 1 + S + η e , 1 Z 1 , 12 P 2 Θ 2 + S + η e , 2 Z 2 , X 1 , 3 + X 2 , 3 + η e , 3 , , X 1 , N + X 2 , N + η e , N Z 3 , , Z N , 12 P 1 Θ 1 + S + η 1 + η d , 1 Z ˜ 1 , 12 P 2 Θ 2 + S + η 2 + η d , 2 Z ˜ 2 , X 1 , 3 + X 2 , 3 + η 3 + η d , 3 , , X 1 , N 1 + X 2 , N 1 + η N 1 + η d , N 1 Z ˜ 3 , , Z ˜ N 1 , η 1 , , η N , S ) = ( d ) 1 H ( W 1 , W 2 ) H ( W 1 , W 2 | 12 P 1 Θ 1 + η e , 1 , 12 P 2 Θ 2 + η e , 2 , 12 P 1 Θ 1 + η d , 1 , 12 P 2 Θ 2 + η d , 2 , η e , 3 , , η e , N , η d , 3 , , η d , N 1 , η 1 , , η N , S ) = ( e ) 1 H ( W 1 , W 2 ) H ( W 1 , W 2 | 12 P 1 Θ 1 + η e , 1 , 12 P 2 Θ 2 + η e , 2 , 12 P 1 Θ 1 + η d , 1 , 12 P 2 Θ 2 + η d , 2 ) ( f ) H ( W 1 , W 2 ) + h ( η d , 1 ) + h ( η d , 2 ) + h ( η e , 1 ) + h ( η e , 2 ) H ( W 1 , W 2 ) h ( 12 P 1 Θ 1 + η e , 1 ) + h ( 12 P 2 Θ 2 + η e , 2 ) H ( W 1 , W 2 ) h ( 12 P 1 Θ 1 + η d , 1 ) + h ( 12 P 2 Θ 2 + η d , 2 ) H ( W 1 , W 2 ) ( g ) 1 log 1 + P 1 σ e 2 + log 1 + P 2 σ e 2 + log 1 + P 1 σ d 2 + log 1 + P 2 σ d 2 2 N R s u m ( N , ϵ ) ,
where (d) follows from the fact that X 1 , i and X 2 , i are linear combinations of η 1 , , η i 1 , and S, (e) follows from the fact that Θ 1 , Θ 2 , η e , 1 , η e , 2 , η d , 1 , η d , 2 are independent of η e , 3 , , η e , N , η 1 ,…, η N , η d , 3 , , η d , N , and S, (f) follows from the fact that W 1 , W 2 , η e , 1 , η e , 2 , η d , 1 , η d , 2 are independent of one another and the fact that Θ k ( k = 1 , 2 ) is a deterministic function of W k , (g) follows from the fact that H ( W 1 , W 2 ) = N R s u m ( N , ϵ ) ( R s u m ( N , ϵ ) is defined in Theorem 2), and the maximum differential entropy lemma [3]. Substituting (47) into (38), the secrecy constraint
Δ 1 log 1 + P 1 σ e 2 + log 1 + P 2 σ e 2 + log 1 + P 1 σ d 2 + log 1 + P 2 σ d 2 2 N R s u m ( N , ϵ ) δ
is guaranteed by choosing blocklength N such that
N R s u m ( N , ϵ ) 1 2 ( 1 δ ) log 1 + P 1 σ e 2 1 + P 2 σ e 2 1 + P 1 σ d 2 1 + P 2 σ d 2 .
The proof of Theorem 2 is completed.

5. Conclusions and Future Work

In this paper, we show that for the AWGN-MAC-E-CF, the traditional secret key feedback scheme is not optimal, and propose an optimal scheme that achieves the secrecy capacity region of the AWGN-MAC-E-CF, which combines the linear feedback coding scheme for the same model without the secrecy constraint and the secret key scheme. Possible future work could consist of checking whether this kind of hybrid scheme is still optimal for other multi-user AWGN channel models in the presence of an external eavesdropper and channel feedback.

Author Contributions

Formal analysis, H.Y. and G.X.; Writing—original draft, H.Y.; Writing—review & editing, B.D.; Supervision, B.D. All authors have read and agreed to the published version of the manuscript.

Funding

This paper was supported by the National Key Research and Development Program of China under Grant 2022YFA1005000, the National Natural Science Foundation of China under Grants 62071392, U21A20454; in part by the Natural Science Foundation of Sichuan under Grant 2022NSFSC0484; in part by the central government to guide local scientific and technological development under Grant No. 2021ZYD0001; and in part by the 111 Project No. 111-2-14.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
PLSPhysical layer security
AWGNAdditive white Gaussian noise
PWSPerfect weak secrecy
MACMultiple-access channel
AWGN-MAC-E-CFMultiple-access channel with an external eavesdropper and channel feedback
SKSchalkwijk-Kailath
FBLFinite blocklength

References

  1. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  2. Leung-Yan-Cheong, S.K.; Hellman, M.E. The Gaussian wire-tap channel. IEEE Trans. Inf. Theory 1978, 24, 451–456. [Google Scholar] [CrossRef]
  3. Gamal, A.E.; Kim, Y.-H. Network Information Theory; Cambridge University Press: New York, NY, USA, 2012. [Google Scholar]
  4. Ahlswede, R.; Cai, N. Transmission, identification and common randomness capacities for wire-tap channels with secure feedback from the decoder. In Identification and Other Probabilistic Models: Rudolf Ahlswede’s Lectures on Information Theory; Springer: Berlin, Germany, 2006; pp. 258–275. [Google Scholar]
  5. Ardestanizadeh, E.; Franceschetti, M.; Javidi, T.; Kim, Y. Wiretap channel with secure rate-limited feedback. IEEE Trans. Inf. Theory 2009, 55, 5353–5361. [Google Scholar] [CrossRef]
  6. Lai, L.; Gamal, H.E.; Poor, H.V. The Wiretap Channel with Feedback: Encryption Over the Channel. IEEE Trans. Inf. Theory 2008, 54, 5059–5067. [Google Scholar] [CrossRef]
  7. Wei, C.; Lin, M.; Dai, B. Some new results on the Gaussian wiretap feedback channel. Entropy 2019, 21, 817. [Google Scholar] [CrossRef]
  8. Ozarow, L. The capacity of the white Gaussian multiple access channel with feedback. IEEE Trans. Inf. Theory 1984, 30, 623–629. [Google Scholar] [CrossRef]
  9. Gunduz, D.; Brown, D.R.; Poor, H.V. Secret communication with feedback. In Proceedings of the International Symposium on Information Theory and Its Applications, (ISITA), Auckland, New Zealan, 7–10 December 2008; pp. 1–6. [Google Scholar]
  10. Schalkwijk, J.; Kailath, T. A coding scheme for additive noise channels with feedback–I: No bandwidth constraint. IEEE Trans. Inf. Theory 1966, 12, 172–182. [Google Scholar] [CrossRef]
  11. Sharifi, S.; Tanc, A.K.; Duman, T.M. LDPC code design for the two-user Gaussian multiple access channel. IEEE Trans. Wireless Commun. 2016, 15, 2833–2844. [Google Scholar] [CrossRef]
Figure 1. The AWGN MAC with an external eavesdropper and channel feedback.
Figure 1. The AWGN MAC with an external eavesdropper and channel feedback.
Entropy 25 01339 g001
Figure 2. Capacity results on the AWGN-MAC-E-CF, where P 1 = 5 , P 2 = 5 , σ 2 = 5 , σ e 2 = 5 .
Figure 2. Capacity results on the AWGN-MAC-E-CF, where P 1 = 5 , P 2 = 5 , σ 2 = 5 , σ e 2 = 5 .
Entropy 25 01339 g002
Figure 3. Illustration of R ( ρ ) for 0 ρ 1 .
Figure 3. Illustration of R ( ρ ) for 0 ρ 1 .
Entropy 25 01339 g003
Figure 4. The relationship between secrecy level, decoding error probability, and PLS requirement blocklength threshold for the AWGN MAC with an external eavesdropper and feedback ( P 1 = P 2 = 2 , σ 2 = 1 ).
Figure 4. The relationship between secrecy level, decoding error probability, and PLS requirement blocklength threshold for the AWGN MAC with an external eavesdropper and feedback ( P 1 = P 2 = 2 , σ 2 = 1 ).
Entropy 25 01339 g004
Figure 5. Comparison of the decoding error probability P e for P 1 = P 2 = 2 , σ 2 = 1 and N taking values in [ 0 , 8000 ] .
Figure 5. Comparison of the decoding error probability P e for P 1 = P 2 = 2 , σ 2 = 1 and N taking values in [ 0 , 8000 ] .
Entropy 25 01339 g005
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yuan, H.; Xie, G.; Dai, B. Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback. Entropy 2023, 25, 1339. https://doi.org/10.3390/e25091339

AMA Style

Yuan H, Xie G, Dai B. Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback. Entropy. 2023; 25(9):1339. https://doi.org/10.3390/e25091339

Chicago/Turabian Style

Yuan, Haoheng, Guangfen Xie, and Bin Dai. 2023. "Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback" Entropy 25, no. 9: 1339. https://doi.org/10.3390/e25091339

APA Style

Yuan, H., Xie, G., & Dai, B. (2023). Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback. Entropy, 25(9), 1339. https://doi.org/10.3390/e25091339

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop