On Interplay Between Network Topology and Alternating CSIT for Multi-Receiver Wiretap Channel


Z. Awan, R. Mathar,


        We study the problem of secure transmission over a Gaussian multi-input single-output (MISO) two receiver channel with an external eavesdropper under the assumption that links connecting the transmitter to three receivers may have unequal strength statistically. In addition to this, the state of the channel to each receiver is conveyed either perfectly (P ) or with delay (D) to the transmitter. Let S 1 , S 2 , and S 3 be the channel state information at the transmitter (CSIT) of user 1, user 2, and eavesdropper, respectively. The overall CSIT can then alternate between eight possible states, i.e., (S 1 , S 2 , S 3 ) ? P, D 3 . We denote by ? S 1 S 2 S 3 the fraction of time during which the state S 1 S 2 S 3 occurs; and, focus on a two state topological setting of strong v.s. weak links with symmetric alternating CSIT, ? P DD = ? DP D . For this setting, we establish an inner bound on the Generalized Secure Degrees of Freedom (GSDoF) region with different topology states. The encoding scheme sheds light on the usage of both resources, i.e., alternating — topology and CSIT; and, show that as opposed to coding independently over different states, joint encoding across the CSIT and topological states, enables strictly better secure rates.

BibTEX Reference Entry 

	author = {Zohaib Awan and Rudolf Mathar},
	title = "On Interplay Between Network Topology and Alternating CSIT for Multi-Receiver Wiretap Channel",
	pages = "1-6",
	booktitle = "52nd Asilomar Conference on Signals, Systems and Computers",
	address = {Pacific Grove, California, USA},
	month = Oct,
	year = 2018,
	hsb = RWTH-2018-229635,


 Download paper  Download bibtex-file

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights there in are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.