All articles published by MDPI are made immediately available worldwide under an open access license. No special
permission is required to reuse all or part of the article published by MDPI, including figures and tables. For
articles published under an open access Creative Common CC BY license, any part of the article may be reused without
permission provided that the original article is clearly cited. For more information, please refer to
https://www.mdpi.com/openaccess.
Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature
Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for
future research directions and describes possible research applications.
Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive
positive feedback from the reviewers.
Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world.
Editors select a small number of articles recently published in the journal that they believe will be particularly
interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the
most exciting work published in the various research areas of the journal.
For the point-to-point additive white Gaussian noise (AWGN) channel with an eavesdropper and feedback, it has already been shown that the secrecy capacity can be achieved by a secret key-based feedback scheme, where the channel feedback is used for secret sharing, and then encrypting the transmitted message by the shared key. By secret sharing, any capacity-achieving coding scheme for the AWGN channel without feedback can be secure by itself, which indicates that the capacity of the same model without the secrecy constraint also affords an achievable secrecy rate to the AWGN channel with an eavesdropper and feedback. Then it is natural to ask: is the secret key-based feedback scheme still the optimal scheme for the AWGN multiple-access channel (MAC) with an external eavesdropper and channel feedback (AWGN-MAC-E-CF), namely, achieving the secrecy capacity region of the AWGN-MAC-E-CF? In this paper, we show that the answer to the aforementioned question is no, and propose the optimal feedback coding scheme for the AWGN-MAC-E-CF, which combines an existing linear feedback scheme for the AWGN MAC with feedback and the secret key scheme in the literature. This paper provides a way to find optimal coding schemes for AWGN multi-user channels in the presence of an external eavesdropper and channel feedback.
The model of the wiretap channel lays the foundation of physical layer security (PLS). In references [1,2], it has been shown that the secrecy capacity of the additive white Gaussian noise (AWGN) wiretap channel model, which is the maximum transmission rate under the perfect weak secrecy (PWS) constraint, is equal to the difference between the channel capacities of the legal receiver and the eavesdropper, and this indicates that to achieve secrecy, the loss of transmission rate is inevitable.
Though channel feedback does not increase the capacity of a point-to-point memoryless channel [3], references [4,5] found that the feedback channel can be used to generate a secret key shared between the legal parties. Then, the transmitter encrypting via the transmitted message by this key, the secrecy capacity of the wiretap channel can be enhanced. Subsequently, references [6,7] further showed that for modulo-additive and AWGN cases, the secret key schemes in references [4,5] are optimal and achieve the capacities of the same models without feedback and the secrecy constraint. Then it is natural to ask: is the secret key-based feedback scheme still the optimal scheme for the AWGN multiple-access channel (MAC) with an external eavesdropper and channel feedback (AWGN-MAC-E-CF), namely, achieving the secrecy capacity region of the AWGN-MAC-E-CF? The answer to the aforementioned question is no, and this is due to the fact that feedback increases the capacity region of the AWGN MAC [8], and the secret key scheme only achieves the capacity region of the AWGN MAC without feedback. Then another question is: what is the optimal feedback scheme for the AWGN-MAC-E-CF, and is the secrecy capacity region of the AWGN-MAC-E-CF equal to the capacity region of the AWGN MAC with feedback, which is in parallel to the fact that the secrecy capacity of the point-to-point AWGN channel with an eavesdropper and feedback equals the capacity of the same model without the secrecy constraint [6,7].
In [9], it has been shown that the classical Schalkwijk-Kailath (SK) scheme [10], which is a capacity-achieving scheme for the point-to-point AWGN channel with feedback, also achieves the secrecy capacity of the point-to-point AWGN channel with an eavesdropper and feedback. Motivated by [9], in this paper, we combine Ozarow’s SK-type scheme for the AWGN MAC with feedback [8] and the secret key scheme in the literature to show that the secrecy capacity region of the AWGN-MAC-E-CF is equal to the capacity region of the AWGN MAC with feedback. The basic intuition behind this scheme is explained below. In [9], it has been shown that the SK scheme satisfies the PWS by itself and achieves the capacity of the point-to-point AWGN channel with feedback. In a similar way, we show that Ozarow’s extended SK scheme [8] satisfies the PWS by itself, however, we find that this SK-type scheme does not achieve the entire capacity region of the AWGN MAC with feedback. To show that every point in the capacity region of the AWGN MAC with feedback satisfies PWS, we split the transmitted message of one transmitter into two parts, where one part together with the message of the other transmitter are encoded by Ozarow’s SK-type scheme, and the other part is encrypted by a key which is generated by the channel noise at the first time instant and this key is only known by the legal parties. Following the security property of the SK-type scheme and the secret key, we show that every point in the capacity region of the AWGN MAC with feedback satisfies PWS, which indicates that the secrecy capacity region of the AWGN-MAC-E-CF is equal to the capacity region of the AWGN MAC with feedback.
2. Model Formulation and Main Result
2.1. Model Formulation
For the AWGN-MAC-E-CF (see Figure 1), the i-th () channel inputs and outputs are given by
where () is the channel codeword subject to an average power constraint , namely, , is the legal receiver’s channel output. Here, note that the eavesdropper eavesdrops the codewords and by an eavesdropping channel with output , and eavesdrops the feedback signal by another eavesdropping channel with output . In addition, , , are AWGNs, and they are independent of one another.
The transmitted message () is uniformly drawn in ), and at time , the codeword () is a (stochastic) function of the message and the feedback . At time N, the legal receiver obtains , where is the decoding function and the average decoding error probability is denoted by
The eavesdropper’s equivocation rate of and is denoted by
A rate pair is achievable with PWS if for any and sufficiently large N, there exist channel encoders-decoders such that
The secrecy capacity region of the AWGN-MAC-E-CF is composed of all achievable secrecy rate pairs defined above.
2.2. Main Result
The following Theorem 1 shows that equals the capacity of AWGN MAC with feedback.
Theorem 1.
, where is the capacity region of the AWGN MAC with feedback [8] (the model of Figure 1 without the secrecy constraint), and it is given by , and
Applying the secret key feedback schemes in [6,7] to AWGN MAC with feedback, it is easy to see that any capacity-achieving coding scheme for the AWGN MAC without feedback is secure by itself, which indicates that the secret key inner bound on is in fact the capacity region of the AWGN MAC without feedback, i.e.,
Comparing (5) and (6), we conclude that the secret key scheme is not optimal for the AWGN-MAC-E-CF. In the next section, we propose a new feedback scheme that achieves in Theorem 1.
2.3. Numerical Example
The following Figure 2 plots and for , , , . It is easy to see that the gap is obvious and the secret key feedback scheme is not optimal for the AWGN-MAC-E-CF.
3. Proof of the Theorem 1
First, note that cannot exceed the capacity region of the same model without the secrecy constraint, i.e., . Then, it remains to be proven that any rate pair is achievable with PWS defined in (4), which is equivalent to show that for any , in (5) is achievable with PWS. In Figure 3, we plot for all , where is the satisfying the sum of the right hand side (RHS) of the first two inequalities in (5), which equals the RHS of the third inequality, which is equivalent to (the solution in ), of
From Figure 3, we see that when , is included in , hence we only need to prove that for any , is achievable with PWS. In the remainder of this section, the proof is given by two cases, i.e., and . The details are given below.
3.1. Case 1:
In this case, we directly show that Ozarow’s SK-type feedback scheme for AWGN MAC with feedback [8] is achievable with PWS. The basic intuition behind this scheme is described below. First, recall that for the classical point-to-point SK scheme, the receiver estimates the transmitted message by minimum mean square estimation (MMSE), and through a noiseless feedback channel, the estimation error of the receiver’s estimation is known by the transmitter since he knows the real transmitted message, and hence in the next time, the transmitter encodes this estimation error as a codeword and sends it to the receiver with the AWGN channel. By iteration, the receiver’s estimation error vanishes as the coding blocklength tends to infinity. Then, for the two-user AWGN MAC with noiseless feedback, by viewing each other’s transmitted codeword as part of the channel noise, this MAC model can be equivalent to two point-to-point AWGN channels with noiseless feedback. In addition to this, to further increase the sum rate of this MAC model, a modulation factor is applied to the second user’s encoder, which helps to enhance the mutual information between the transceiver. The detail of this scheme is given below.
For , let be the message set of , divide the interval into equally spaced sub-intervals, and each sub-interval center is mapped to a value in . The center of the sub-interval with respect to (w.r.t.) is denoted by , where its variance approximately equals .
Coding procedure:
At time instant 1, Transmitter 2 sends nothing but zero, i.e., , and Transmitter 1 sends
where is a Gaussian random variable and it is independent of the transmitted message and all signals in Figure 1. Here, S is used to obtain a steady for , and this will be explained later.
Once the legal receiver obtains , his first estimation about is given by
For continuity, define the legal receiver’s first estimation of as .
At the end of time instant 1, Transmitter 1 receives via channel feedback, and he computes the error of the legal receiver’s first estimation about by
where the variance of is given by
At time instant 2, Transmitter 1 sends nothing but zero, i.e., , and Transmitter 2 sends
Once the legal receiver obtains , his second estimation about is given by
For continuity, define the legal receiver’s second estimation of as , which indicates that , and .
At the end of time instant 2, Transmitter 2 receives via channel feedback, and computes the error of the legal receiver’s second estimation about by
where the variance of is given by
At time instant , first, define
as the correlation coefficient of and , which are the legal receiver’s estimation errors of and at the time instant . Moreover, note that () is the variance of . Next, define the symbolic function of as
which is used as a modulation factor maximizing the mutual information between the transmitters and the legal receiver. Then, Transmitters 1 and 2 send
Once receiving , the legal receiver updates his estimation of by
Now, substituting (21) and (22) into (16), we have
where
In general, , to find a steady point in , i.e., , we substitute (23) into , which is equivalent to
Here, note that the equation in (25) is exactly the same as that in (7), and is the solution to this equation. Hence, choosing an appropriate variance of S such that in (24) satisfies , we conclude that for all .
Next, following the error probability analysis in [8], we conclude that if , , as . Now it remains to show that any rate pair satisfies PWS; see the details below.
Equivocation analysis: first, note that for , the codewords and are linear combinations of , and S, which is in parallel to that of the classical SK scheme [9] for the point-to-point AWGN channel. Then the eavesdropper’s equivocation rate is bounded by
where (a) follows from the fact that () is a deterministic function of , (b) follows from the fact that and are linear combinations of , and S, (c) follows from the fact that , , , , , are independent of , ,…, , , and S, (d) follows from the fact that , , , , , are independent of one another, (e) follows from , , and the variance of () equals as N tends to infinity.
From (26), we conclude that choosing sufficiently large N, the secrecy constraint in (4) is guaranteed, which indicates that any pair in is achievable with PWS.
3.2. Case 2:
In this case, we show that the pentagon rate region in Figure 3 is achievable with PWS. We only need to show that the corner point Q is achievable with PWS, then by symmetry, is also achievable with PWS, finally, using time sharing between Q and , the line is achievable with PWS, which indicates that the entire region is achievable with PWS. The secure coding scheme that achieves Q is briefly explained below. Divide the message of Transmitter 1 into two parts, where one part together with the message of Transmitter 2 are encoded by the SK-type scheme shown in case 1, and the other part of is encrypted by a key which is generated by the channel noise at the first time instant and this key is only known by the legal parties. In case 1 we have shown that Ozarow’s SK-type scheme is achievable with PWS, and note that the other part of is also achievable with PWS since it is protected by a secret key, which indicates that the whole scheme satisfies PWS. The details of our proposed scheme are given below.
Message splitting: the message is divided into two independent parts , where takes values in , takes values in , and . takes values in . Divide the interval into equally spaced sub-intervals, and each sub-interval center corresponds to a value in . The center of the sub-interval w.r.t. () is denoted by (), where the variance of () approximately equals .
Secret key generation: at time instant 1, Transmitters 1 and 2 send . The legal receiver receives , and transmits back to the transmitters. Since is continuous, we can generate a secret key K with arbitrary rate from and this key is uniformly distributed in .
Encoding-decoding procedure: at time instants 2 and 3, the transmission codewords are exactly the same as those in case 1 at time instants 1 and 2, namely, , , and .
At time instant , Transmitters 1 and 2 send
respectively, where is the codeword of the encrypted sub-message with transmission power , is the codeword of the sub-message with transmission power . Here, note that the codeword is generated by Shannon’s random coding scheme [3], namely, each component of is i.i.d. generated according to the Gaussian distribution with zero mean and variance , and is one-to-one mapped to a value of . In addition, for , and (codewords for and ) are generated in the same way as the SK-type scheme of case 1, where is viewed as the “channel noise” for the codewords and . Note that , , , , , and are defined in the same way as those in Section 3.1 by replacing by .
Decoding procedure: successive cancellation decoding is employed, specifically, first, viewing as the equivalent channel noise and using the SK-type decoding scheme in case 1, for sufficiently large N, and can be decoded by the legal receiver with arbitrary small decoding error probability if
where is the solution in of
Here, note that and are actual transmission rates of and , respectively. For sufficiently large N, and tend to and , respectively.
After decoding and , the legal receiver subtracts and from his received signal , which indicates that the channel noise of the equivalent channel for the transmission of is , then based on the channel coding theorem [3], we conclude that for sufficiently large N, can be decoded by the legal receiver with arbitrary small decoding error probability if
Here, note that is the actual transmission rate of , and for sufficiently large N, tends to .
From (28) and (30), , and letting , we conclude that any pair in is achievable. Now it remains to be shown that any rate pair satisfies PWS; see the details below.
Equivocation analysis: the eavesdropper’s equivocation rate is bounded by
where (a) follows from the Markov chain , (b) follows from is a deterministic function of , and (c) follows from K is independent of and , and K is uniformly drawn from .
For the second term in (31), along the lines of the equivocation analysis in case 1, we conclude that
Substituting (32) and (33) into (31), choosing sufficiently large N, is guaranteed, which completes the proof.
4. Discussion
In this section, we show that Ozarow’s scheme is in fact a secure finite blocklength (FBL) coding scheme, and characterize its sum rate under fixed coding blocklength, decoding error probability and the eavesdropper’s uncertainty about the transmitted messages. Then, we further explain the results via numerical examples.
4.1. The Definition of the Secure FBL Scheme for the AWGN-MAC-E-CF
For the AWGN-MAC-E-CF, the channel’s input and output relationship is given in Section 2.1.
A -code under average power constraints consists of:
Message , uniformly drawn in .
Encoder k with outputs satisfies the average power constraints
where is a (stochastic) function.
The decoder with outputs
where is the decoding function of the Receiver.
The average decoding error probability is defined as
In addition, define the eavesdropper’s normalized equivocation (also called the secrecy level) as
where . The -rate pair is achievable with a secrecy level of if for given blocklength N, error probability and secrecy level , there exists a -code described above such that
For the AWGN-MAC-E-CF, the achievable sum-rate is denoted by
and the maximal sum-rate is the maximum sum-rate defined in (39).
4.2. Main Result
Theorem 2.
For given decoding error probability ϵ and boding blocklength N, let be the achievable sum-rate of the SK-type scheme for the AWGN-MAC-E-CF without the consideration of secrecy. Then for a given secrecy level δ, if the coding blocklength N in satisfies
the rate also serves as a lower bound on the maximal sum-rate , i.e.,
Define the minimum blocklength N satisfying (40) as the PLS requirement blocklength threshold. Figure 4 plots the relationship between secrecy level, decoding error probability, and PLS requirement blocklength threshold for the AWGN MAC with an external eavesdropper and feedback (, ). From Figure 4, we conclude that for a fixed decoding error probability, the PLS requirement threshold is increasing while the secrecy level is increasing. Moreover, when the decoding error probability and the secrecy level , the PLS requirement blocklength threshold is about 115.
Figure 5 plots the decoding error probability of Ozarow’s SK scheme [8] and LDPC code [11] for , and the length of transmission bits is 80. From Figure 5, we conclude that compared with LDPC scheme, the average error probability of Ozarow’s SK scheme decays much faster with the increasing coding blocklength N.
4.4. Proof of the Theorem 2
Encoding-decoding procudure: in fact, Ozarow’s scheme [8] is inherently a secure FBL coding scheme. The encoding and decoding processes are exactly the same as those described in Section 3.1, so we omit the detailed explanation here.
Decoding error probability analysis: the target error probability of the whole scheme is chosen to be . Then, we let the error probability of transmitting be which at most , i.e.,
From (45) and the error probability analysis in [10], we have
Let be message ’s achievable rate of the SK-type scheme for the AWGN-MAC-E-CF without the consideration of secrecy. From (39) and (46), we have which is given in (42).
Equivocation analysis: now we show the above scheme satisfies the PLS requirement when the coding blocklength is larger than a threshold.
where (d) follows from the fact that and are linear combinations of , and S, (e) follows from the fact that , , , , , are independent of , ,…, , , and S, (f) follows from the fact that , , , , , are independent of one another and the fact that () is a deterministic function of , (g) follows from the fact that ( is defined in Theorem 2), and the maximum differential entropy lemma [3]. Substituting (47) into (38), the secrecy constraint
is guaranteed by choosing blocklength N such that
The proof of Theorem 2 is completed.
5. Conclusions and Future Work
In this paper, we show that for the AWGN-MAC-E-CF, the traditional secret key feedback scheme is not optimal, and propose an optimal scheme that achieves the secrecy capacity region of the AWGN-MAC-E-CF, which combines the linear feedback coding scheme for the same model without the secrecy constraint and the secret key scheme. Possible future work could consist of checking whether this kind of hybrid scheme is still optimal for other multi-user AWGN channel models in the presence of an external eavesdropper and channel feedback.
Author Contributions
Formal analysis, H.Y. and G.X.; Writing—original draft, H.Y.; Writing—review & editing, B.D.; Supervision, B.D. All authors have read and agreed to the published version of the manuscript.
Funding
This paper was supported by the National Key Research and Development Program of China under Grant 2022YFA1005000, the National Natural Science Foundation of China under Grants 62071392, U21A20454; in part by the Natural Science Foundation of Sichuan under Grant 2022NSFSC0484; in part by the central government to guide local scientific and technological development under Grant No. 2021ZYD0001; and in part by the 111 Project No. 111-2-14.
Institutional Review Board Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
PLS
Physical layer security
AWGN
Additive white Gaussian noise
PWS
Perfect weak secrecy
MAC
Multiple-access channel
AWGN-MAC-E-CF
Multiple-access channel with an external eavesdropper and channel feedback
SK
Schalkwijk-Kailath
FBL
Finite blocklength
References
Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J.1975, 54, 1355–1387. [Google Scholar] [CrossRef]
Gamal, A.E.; Kim, Y.-H. Network Information Theory; Cambridge University Press: New York, NY, USA, 2012. [Google Scholar]
Ahlswede, R.; Cai, N. Transmission, identification and common randomness capacities for wire-tap channels with secure feedback from the decoder. In Identification and Other Probabilistic Models: Rudolf Ahlswede’s Lectures on Information Theory; Springer: Berlin, Germany, 2006; pp. 258–275. [Google Scholar]
Ardestanizadeh, E.; Franceschetti, M.; Javidi, T.; Kim, Y. Wiretap channel with secure rate-limited feedback. IEEE Trans. Inf. Theory2009, 55, 5353–5361. [Google Scholar] [CrossRef]
Lai, L.; Gamal, H.E.; Poor, H.V. The Wiretap Channel with Feedback: Encryption Over the Channel. IEEE Trans. Inf. Theory2008, 54, 5059–5067. [Google Scholar] [CrossRef]
Wei, C.; Lin, M.; Dai, B. Some new results on the Gaussian wiretap feedback channel. Entropy2019, 21, 817. [Google Scholar] [CrossRef]
Ozarow, L. The capacity of the white Gaussian multiple access channel with feedback. IEEE Trans. Inf. Theory1984, 30, 623–629. [Google Scholar] [CrossRef]
Gunduz, D.; Brown, D.R.; Poor, H.V. Secret communication with feedback. In Proceedings of the International Symposium on Information Theory and Its Applications, (ISITA), Auckland, New Zealan, 7–10 December 2008; pp. 1–6. [Google Scholar]
Schalkwijk, J.; Kailath, T. A coding scheme for additive noise channels with feedback–I: No bandwidth constraint. IEEE Trans. Inf. Theory1966, 12, 172–182. [Google Scholar] [CrossRef]
Figure 1.
The AWGN MAC with an external eavesdropper and channel feedback.
Figure 1.
The AWGN MAC with an external eavesdropper and channel feedback.
Figure 2.
Capacity results on the AWGN-MAC-E-CF, where , , , .
Figure 2.
Capacity results on the AWGN-MAC-E-CF, where , , , .
Figure 3.
Illustration of for .
Figure 3.
Illustration of for .
Figure 4.
The relationship between secrecy level, decoding error probability, and PLS requirement blocklength threshold for the AWGN MAC with an external eavesdropper and feedback (, ).
Figure 4.
The relationship between secrecy level, decoding error probability, and PLS requirement blocklength threshold for the AWGN MAC with an external eavesdropper and feedback (, ).
Figure 5.
Comparison of the decoding error probability for , and N taking values in .
Figure 5.
Comparison of the decoding error probability for , and N taking values in .
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Yuan, H.; Xie, G.; Dai, B.
Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback. Entropy2023, 25, 1339.
https://doi.org/10.3390/e25091339
AMA Style
Yuan H, Xie G, Dai B.
Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback. Entropy. 2023; 25(9):1339.
https://doi.org/10.3390/e25091339
Chicago/Turabian Style
Yuan, Haoheng, Guangfen Xie, and Bin Dai.
2023. "Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback" Entropy 25, no. 9: 1339.
https://doi.org/10.3390/e25091339
APA Style
Yuan, H., Xie, G., & Dai, B.
(2023). Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback. Entropy, 25(9), 1339.
https://doi.org/10.3390/e25091339
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.
Article Metrics
No
No
Article Access Statistics
For more information on the journal statistics, click here.
Multiple requests from the same IP address are counted as one view.
Yuan, H.; Xie, G.; Dai, B.
Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback. Entropy2023, 25, 1339.
https://doi.org/10.3390/e25091339
AMA Style
Yuan H, Xie G, Dai B.
Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback. Entropy. 2023; 25(9):1339.
https://doi.org/10.3390/e25091339
Chicago/Turabian Style
Yuan, Haoheng, Guangfen Xie, and Bin Dai.
2023. "Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback" Entropy 25, no. 9: 1339.
https://doi.org/10.3390/e25091339
APA Style
Yuan, H., Xie, G., & Dai, B.
(2023). Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback. Entropy, 25(9), 1339.
https://doi.org/10.3390/e25091339
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.