Topological Interference Management With Confidential Messages

Jean De Dieu Mutangana, Ravi Tandon

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

The topological interference management (TIM) problem refers to the study of the K-user partially connected interference networks with no channel state information at the transmitters (CSIT), except for the knowledge of network topology. In this paper, we study the TIM problem with confidential messages (TIM-CM), where message confidentiality must be satisfied in addition to reliability constraints. In particular, each transmitted message must be decodable at its intended receiver and remain confidential at the remaining (K-1) receivers. Our main contribution is to present a comprehensive set of results for the TIM-CM problem by studying the symmetric secure degrees of freedom (SDoF). To this end, we first characterize necessary and sufficient conditions for feasibility of positive symmetric SDoF for any arbitrary topology. We next present two achievable schemes for the TIM-CM problem: For the first scheme, we use the concept of secure partition and, for the second one, we use the concept of secure independent sets. We also present outer bounds on symmetric SDoF for any arbitrary network topology. Using these bounds, we characterize the optimal symmetric SDoF of all K=2 -user and K=3 -user network topologies.

Original languageEnglish (US)
Pages (from-to)7233-7253
Number of pages21
JournalIEEE Transactions on Information Theory
Volume68
Issue number11
DOIs
StatePublished - Nov 1 2022

Keywords

  • Topological interference management
  • channel state information uncertainty at transmitters
  • confidential messages
  • multi-user interference networks
  • network topology
  • partially connected networks
  • secure degrees of freedom

ASJC Scopus subject areas

  • Information Systems
  • Computer Science Applications
  • Library and Information Sciences

Fingerprint

Dive into the research topics of 'Topological Interference Management With Confidential Messages'. Together they form a unique fingerprint.

Cite this