Abstract
Delivering confidential messages in wireless network is gaining continuous attraction as a fundamental building block for the Internet of things (IoT). This paper overviews the confidential message transmission techniques in broadcast channel (BC) where a transmitter serves multiple users by delivering confidential messages to their intended users. Each confidential message must be prevented from extracting its information by any unintended users. First, we consider a basic network consisting of two users. In the two-user BC, the secret dirty paper coding (S-DPC) achieves the secrecy capacity region. However, since the DPC requires a high computational complexity for characterizing the capacity region, two sub-optimal transmission techniques with low complexities are explained. Second, we extend our discussion to the network including more than two users. For $K$ -user BC with confidential messages, the optimal transmission scheme and the secrecy capacity region have not yet been derived. Instead of presenting the optimal scheme, we explain two sub-optimal transmission techniques and compare their features and performances. In conclusion, we discuss the open problems in the confidential message transmission for networks with more than two users.
Highlights
The developments of wireless communication devices and technologies lead to rapid increase in the number of smart objects connected to the wireless network
Every confidential message transmission suffers from different set of eavesdroppers, and this makes the transmission strategy design more complicated than the wiretap broadcast channel, which deals with common external eavesdroppers
A two-user broadcast channel (BC) has been considered as a basic channel model, and its secrecy capacity region is shown to be achieved with secret dirty paper coding (S-dirty paper coding (DPC))
Summary
The developments of wireless communication devices and technologies lead to rapid increase in the number of smart objects connected to the wireless network. Since the external eavesdroppers have no interaction with any terminal in the network, the channel state information (CSI) about the eavesdroppers is generally assumed to be unknown at the transmitter For this reason, it is impossible to always guarantee the communication security in wiretap BCs. Most works on wiretap BC have considered transmission strategies for guaranteeing security with a high probability instead of guaranteeing the security all the time [11]–[13]. For a user k, any unintended user i = k is considered as an eavesdropper, and the transmitter prevents it from extracting any information of Wk from its received signal yi For this reason, every confidential message transmission suffers from different set of eavesdroppers, and this makes the transmission strategy design more complicated than the wiretap broadcast channel, which deals with common external eavesdroppers.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.