2019
DOI: 10.3390/e21111092
|View full text |Cite
|
Sign up to set email alerts
|

Secure Retrospective Interference Alignment

Abstract: In this paper, the K-user interference channel with secrecy constraints is considered with delayed channel state information at transmitters (CSIT). We propose a novel secure retrospective interference alignment scheme in which the transmitters carefully mix information symbols with artificial noises to ensure confidentiality. Achieving positive secure degrees of freedom (SDoF) is challenging due to the delayed nature of CSIT, and the distributed nature of the transmitters. Our scheme works over two phases: ph… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…For the benchmark, we also present simulation results from MSE-based beamforming design, and analytical results from analysis of the AIN scheme [22], the pure IA scheme [7], and the time division multiple access (TDMA) scheme (in a KIC0R setting). The simulator has been built in Matlab, 8 and includes a fully-connected homogeneous K-user interference channel, where data transmissions experience Rayleigh fading 9 and a distancedependent path-loss, with a path-loss exponent of 2. In the legend of following figures, the suffix u denotes the upper bound on the maximum achievable DoF in the KICJR, which have been derived from analysis of (30)-(33).…”
Section: The Dof Performancementioning
confidence: 99%
See 2 more Smart Citations
“…For the benchmark, we also present simulation results from MSE-based beamforming design, and analytical results from analysis of the AIN scheme [22], the pure IA scheme [7], and the time division multiple access (TDMA) scheme (in a KIC0R setting). The simulator has been built in Matlab, 8 and includes a fully-connected homogeneous K-user interference channel, where data transmissions experience Rayleigh fading 9 and a distancedependent path-loss, with a path-loss exponent of 2. In the legend of following figures, the suffix u denotes the upper bound on the maximum achievable DoF in the KICJR, which have been derived from analysis of (30)-(33).…”
Section: The Dof Performancementioning
confidence: 99%
“…4 DoF performance of a 3ICJR network 8 The codes are available online in the supporting repository of the paper: www.github.com/AminAzari/DoF-Simulator. 9 By the homogeneous model, we mean that the communications parameters like transmit power are the same across nodes, and hence, are canceled out in DoF performance analysis in high SNR regime. match quite well the DoF upper bounds, while the DoF performance of the AIN scheme is worse than the maximum achievable DoF in this network.…”
Section: The Dof Performancementioning
confidence: 99%
See 1 more Smart Citation
“…While FL allows participants to keep their raw data local, recent works highlight and address the privacy and robustness concerns in FL. To prevent potential privacy leakage from local parameter updates [14], local differential privacy (LDP) [3] has been adopted as a strong privacy guarantee in FL [9,17,18,21] by locally adding perturbation to the updates. Local differential privacy is a state-ofart paradigm facilitating secure analysis over sensitive data because of its strong assumption on adversary's background knowledge and smart setting of the privacy budget.…”
mentioning
confidence: 99%
“…Specifically, we will show that a higher level of LDP (lower 𝜖) may not always lead to a higher level of adversarial robustness. Given the increasing attention of LDP-based FL [9,17,18,21], clarifying the interplay between LDP and adversarial robustness in FL is significant since this is the first step towards a principled design of private and robust FL systems.…”
mentioning
confidence: 99%