1st International ICST Workshop on Secure Wireless Networks

Research Article

MAC with Partially Cooperating Encoders and Security Constraints

  • @INPROCEEDINGS{10.4108/icst.valuetools.2011.245784,
        author={Zohaib Awan and Abdellatif  Zaidi and Luc Vandendorpe},
        title={MAC with Partially Cooperating Encoders and Security Constraints},
        proceedings={1st International ICST Workshop on Secure Wireless Networks},
        publisher={ACM},
        proceedings_a={SECURENETS},
        year={2012},
        month={6},
        keywords={Multiple access channel conferencing security.},
        doi={10.4108/icst.valuetools.2011.245784}
    }
    
  • Zohaib Awan
    Abdellatif Zaidi
    Luc Vandendorpe
    Year: 2012
    MAC with Partially Cooperating Encoders and Security Constraints
    SECURENETS
    ICST
    DOI: 10.4108/icst.valuetools.2011.245784
Zohaib Awan1,*, Abdellatif Zaidi2, Luc Vandendorpe1
  • 1: Universite Catholique de Louvain
  • 2: Universite Paris-Est Marne-la-Vallee
*Contact email: zohaib.awan@uclouvain.be

Abstract

We study a special case of Willems's two-user multiaccess channel with partially cooperating encoders from security perspective. This model differs from Willems's setup in that only one encoder, Encoder 1, is allowed to conference, Encoder 2 does not transmit any message, and there is an additional passive eavesdropper from whom the communication should be kept secret. For the discrete memoryless case, we establish inner and outer bounds on the rate-equivocation region. Furthermore, we show that these bounds coincide in the case of perfect secrecy, and so we characterize fully the secrecy capacity. For the Gaussian model, we establish lower and upper bounds on the perfect secrecy rate. We also show that these bounds agree in some extreme cases of cooperation between encoders. We illustrate our results through some numerical examples.