[ieee 2014 iran workshop on communication and information theory (iwcit) - tehran, iran...

5
Maximizing the Minimum Achievable Secrecy Rate in a Two-User Gaussian Interference Channel Meysam Mirzaee, Soroush Akhlaghi Shahed University, Tehran, Iran Emails: me.mirzaee,[email protected] Abstract—This paper studies a two-user Gaussian interference channel in which two single-antenna sources aim at sending their confidential messages to the legitimate destinations such that each message should be kept confidential from non-intended receiver. Also, it is assumed that the direct channel gains are stronger than the interference channel gains and the noise variances at two destinations are equal. In this regard, under Gaussian code book assumption, the problem of secrecy rate balancing which aims at exploring the optimal power allocation policy at the sources in an attempt to maximize the minimum achievable secrecy rate is investigated, assuming each source is subject to a transmit power constraint. To this end, it is shown that at the optimal point, two secrecy rates are equal, hence, the problem is abstracted to maximizing the secrecy rate associated with one of destinations while the other destination is restricted to have the same secrecy rate. Accordingly, the optimum secrecy rate associated with the investigated max-min problem is analytically derived leading to the solution of secrecy rate balancing problem. Index Terms—Achievable secrecy rate, Gaussian interference channel, Max-Min problem. I. I NTRODUCTION Security is regarded as one of the main fundamental issues in wireless networks due to the broadcast nature of wireless medium. Using physical layer characteristics to secure the data transmission was first proposed by Wyner in his landmark paper in 1975 [1]. He investigated the discrete-memoryless wiretap channel and showed that if the eavesdropper’s signal is a degraded version of the destination signal, there exist a positive rate in which transmission is accomplished with perfect secrecy. This problem is further studied by Cheong and Hellman for the Gaussian wiretap channel, where the corresponding secrecy capacity is analytically derived [2]. This motivated researchers to seek for physical layer se- curity for a variety of network topologies. For instance, the secrecy rate of Interference channel is studied in [3] where an inner and outer bound on the secrecy capacity region is de- rived. Moreover, under Gaussian code book assumption, some achievable secrecy rates for Gaussian interference channel are derived. Following the work done in [3], some researchers studied a variation of the interference channel from the signal processing viewpoint [4]–[6]. For instance, [4] explores the Multi-Input Single-Output (MISO) two-user interference channel in which the stronger transmitter attempts to maximize the difference between its secrecy rate and the secrecy rate of the weaker transmitter relying on transmit beamforming, while the weaker transmitter attempts to minimize this discrepancy, all using a game theoretic approach. Moreover, it is shown the studied problem has a Nash Equilibrium point, where the optimal transmit beamforming vectors associated with this point are derived. In [5], a Single-Input Single-Output (SISO) symmet- ric interference channel is considered where it is assumed both links have the same direct and cross channel gains. Also, each user sends a data signal as well as an artificial noise, simultaneously. Accordingly, in an attempt to maximize the minimum secrecy rate, i.e., the secrecy rate balancing, a closed-form solution for the signal power as well as the artificial noise power is derived. In [6], the secrecy rate balancing problem is studied for MISO interference channel. It is assumed the transmit beamforming vectors are linear combinations of two Maximum Ratio Combining and Zero- Forcing vectors, where the optimization problem is tackled relying on search method. In this paper, we investigate a single-antenna two-user Gaussian interference channel where the channel coefficients of two sources are not necessarily similar. We also suppose that the direct channels have stronger gains than cross channels and the variances of noise at two destinations are equal. It is assumed that each user is subject to a maximum transmit power constraint, where the objective is to find the best power allocation strategy leading to the secrecy rate balancing. To this end, having the idea in mind that at the optimal point one link acts as bottleneck, the corresponding max-min problem is divided into two separated maximization problems. First, we assume the first link has the worst case secrecy rate, thus attempting to maximize its corresponding secrecy rate when the secrecy rate associated with the second link is restricted to be higher than that of the first link and this problem is repeated in a similar fashion for the second link. Accordingly, it is proved that at the optimal point, two secrecy rates are equal, so it is adequate to merely solve one of the above mentioned problems. In this paper, the notation |x| refers to absolute value of complex variable x, and x CN (μ, σ 2 ) denotes the variable x is complex Gaussian random variable with mean μ and variance σ 2 . Also, the function x + is equivalent to max{0,x}. II. SYSTEM MODEL We consider two-user Gaussian interference channel with single antenna nodes (Fig. 1). It is assumed, each transmitter aims at sending confidential message to its legitimate des- tination such that the information is kept private from the 2014 Iran Workshop on Communication and Information Theory (IWCIT) 978-1-4799-4877-2/14/$31.00 ©2014 IEEE

Upload: soroush

Post on 27-Jan-2017

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: [IEEE 2014 Iran Workshop on Communication and Information Theory (IWCIT) - Tehran, Iran (2014.5.7-2014.5.8)] 2014 Iran Workshop on Communication and Information Theory (IWCIT) - Maximizing

Maximizing the Minimum Achievable Secrecy Rate

in a Two-User Gaussian Interference Channel

Meysam Mirzaee, Soroush Akhlaghi

Shahed University, Tehran, Iran

Emails: me.mirzaee,[email protected]

Abstract—This paper studies a two-user Gaussian interferencechannel in which two single-antenna sources aim at sending theirconfidential messages to the legitimate destinations such that eachmessage should be kept confidential from non-intended receiver.Also, it is assumed that the direct channel gains are stronger thanthe interference channel gains and the noise variances at twodestinations are equal. In this regard, under Gaussian code bookassumption, the problem of secrecy rate balancing which aims atexploring the optimal power allocation policy at the sources inan attempt to maximize the minimum achievable secrecy rate isinvestigated, assuming each source is subject to a transmit powerconstraint. To this end, it is shown that at the optimal point,two secrecy rates are equal, hence, the problem is abstracted tomaximizing the secrecy rate associated with one of destinationswhile the other destination is restricted to have the same secrecyrate. Accordingly, the optimum secrecy rate associated with theinvestigated max-min problem is analytically derived leading tothe solution of secrecy rate balancing problem.

Index Terms—Achievable secrecy rate, Gaussian interferencechannel, Max-Min problem.

I. INTRODUCTION

Security is regarded as one of the main fundamental issues

in wireless networks due to the broadcast nature of wireless

medium. Using physical layer characteristics to secure the data

transmission was first proposed by Wyner in his landmark

paper in 1975 [1]. He investigated the discrete-memoryless

wiretap channel and showed that if the eavesdropper’s signal

is a degraded version of the destination signal, there exist

a positive rate in which transmission is accomplished with

perfect secrecy. This problem is further studied by Cheong

and Hellman for the Gaussian wiretap channel, where the

corresponding secrecy capacity is analytically derived [2].

This motivated researchers to seek for physical layer se-

curity for a variety of network topologies. For instance, the

secrecy rate of Interference channel is studied in [3] where an

inner and outer bound on the secrecy capacity region is de-

rived. Moreover, under Gaussian code book assumption, some

achievable secrecy rates for Gaussian interference channel are

derived.

Following the work done in [3], some researchers studied a

variation of the interference channel from the signal processing

viewpoint [4]–[6]. For instance, [4] explores the Multi-Input

Single-Output (MISO) two-user interference channel in which

the stronger transmitter attempts to maximize the difference

between its secrecy rate and the secrecy rate of the weaker

transmitter relying on transmit beamforming, while the weaker

transmitter attempts to minimize this discrepancy, all using a

game theoretic approach. Moreover, it is shown the studied

problem has a Nash Equilibrium point, where the optimal

transmit beamforming vectors associated with this point are

derived. In [5], a Single-Input Single-Output (SISO) symmet-

ric interference channel is considered where it is assumed

both links have the same direct and cross channel gains.

Also, each user sends a data signal as well as an artificial

noise, simultaneously. Accordingly, in an attempt to maximize

the minimum secrecy rate, i.e., the secrecy rate balancing,

a closed-form solution for the signal power as well as the

artificial noise power is derived. In [6], the secrecy rate

balancing problem is studied for MISO interference channel.

It is assumed the transmit beamforming vectors are linear

combinations of two Maximum Ratio Combining and Zero-

Forcing vectors, where the optimization problem is tackled

relying on search method.

In this paper, we investigate a single-antenna two-user

Gaussian interference channel where the channel coefficients

of two sources are not necessarily similar. We also suppose

that the direct channels have stronger gains than cross channels

and the variances of noise at two destinations are equal. It

is assumed that each user is subject to a maximum transmit

power constraint, where the objective is to find the best power

allocation strategy leading to the secrecy rate balancing. To

this end, having the idea in mind that at the optimal point one

link acts as bottleneck, the corresponding max-min problem

is divided into two separated maximization problems. First,

we assume the first link has the worst case secrecy rate, thus

attempting to maximize its corresponding secrecy rate when

the secrecy rate associated with the second link is restricted to

be higher than that of the first link and this problem is repeated

in a similar fashion for the second link. Accordingly, it is

proved that at the optimal point, two secrecy rates are equal,

so it is adequate to merely solve one of the above mentioned

problems.

In this paper, the notation |x| refers to absolute value of

complex variable x, and x ∼ CN (μ, σ2) denotes the variable

x is complex Gaussian random variable with mean μ and

variance σ2. Also, the function x+ is equivalent to max{0, x}.

II. SYSTEM MODEL

We consider two-user Gaussian interference channel with

single antenna nodes (Fig. 1). It is assumed, each transmitter

aims at sending confidential message to its legitimate des-

tination such that the information is kept private from the

2014 Iran Workshop on Communication and Information Theory (IWCIT)

978-1-4799-4877-2/14/$31.00 ©2014 IEEE

Page 2: [IEEE 2014 Iran Workshop on Communication and Information Theory (IWCIT) - Tehran, Iran (2014.5.7-2014.5.8)] 2014 Iran Workshop on Communication and Information Theory (IWCIT) - Maximizing

����

���

���

���

Fig. 1. System Model

adversary. The received signals at the destinations can be

modeled as,

y1 = h11x1 + h21x2 + n1, (1)

y2 = h12x1 + h22x2 + n2, (2)

where xi ∼ CN (0, pi) is the transmitted signal of the ith

source, hij is the channel coefficient from source i to desti-

nation j and ni ∼ CN (0, σ2i ) is the received Additive White

Gaussian Noise (AWGN) at the ith destination. We assume

that each destination first decodes the intended message of

its respective source and then tries to decode the message of

the other source. According to [3], an achievable secrecy rate

region is the convex hull of the set of (R1, R2) satisfying,

0 ≤ R1 ≤ Rs1 and 0 ≤ R2 ≤ Rs2 (3)

where,

Rs1 = {I(X1;Y1)− I(X1;Y2|X2)}+

=

{log2

(1 +

p1|h11|2p2|h21|2 + σ2

1

)− log2

(1 +

p1|h12|2σ22

)}+

=

{log2

(p1|h11|2 + p2|h21|2 + σ2

1

p2|h21|2 + σ21

× σ22

p1|h12|2 + σ22

)}+

Rs2 = {I(X2;Y2)− I(X2;Y1|X1)}+

=

{log2

(1 +

p2|h22|2p1|h12|2 + σ2

2

)− log2

(1 +

p2|h21|2σ21

)}+

=

{log2

(p2|h22|2 + p1|h12|2 + σ2

2

p1|h12|2 + σ22

× σ21

p2|h21|2 + σ21

)}+

over all transmit powers p1 ∈ [0, P1] and p2 ∈ [0, P2]1.

III. ACHIEVABLE SECRECY RATE BALANCING

The objective here is to address the achievable secrecy

rate balancing problem. Mathematically speaking, referring to

(3), we are going to investigate the following optimization

problem,

maxp1,p2

min{Rs1, Rs2}s.t. 0 ≤ p1 ≤ P1 , 0 ≤ p2 ≤ P2, (4)

1 [3] drives more general achievable regions but we restrict to a specialinner bound on the achievable region.

where P1 and P2 are the maximum allowable transmit power

constraints associated with source1 and source2, respectively.

Noting at the optimal point of (4), either of inequalities

Rs2 ≥ Rs1 or Rs1 ≥ Rs2 should be satisfied, thus one of

the following optimization problems, gives the solution of (4),

maxp1,p2

Rs1

s.t. Rs2 ≥ Rs1, 0 ≤ p1 ≤ P1 , 0 ≤ p2 ≤ P2, (5)

and

maxp1,p2

Rs2

s.t. Rs1 ≥ Rs2, 0 ≤ p1 ≤ P1 , 0 ≤ p2 ≤ P2. (6)

In the sequel, we solve (5) and show that the first constraint

is satisfied with equality. By the same token, due to the

similarities in the mathematical forms, one can readily verify

that the first constraint of (6) is also satisfied with equality,

and therefore the optimal solutions of (5) and (6) are equal,

providing the solution of (4). To this end, using (3), (5) can

be rewritten, equivalently, as,

maxp1,p2

p1σ22 |h11|2 + p2σ

22 |h21|2 + σ2

1σ22

p1p2|h12|2|h21|2 + p1σ21 |h12|2 + p2σ2

2 |h21|2 + σ21σ

22

s.t. p1σ21 |h12|2 + p2σ

21 |h22|2 ≥ p1σ

22 |h11|2 + p2σ

22 |h21|2

and 0 ≤ p1 ≤ P1 , 0 ≤ p2 ≤ P2. (7)

Using the definitions a � σ22 |h11|2, b � σ2

1 |h22|2, c �

σ21 |h12|2, d � σ2

2 |h21|2, e � σ21σ

22 , f = |h12|2|h21|2, and

inverting the objective, (7) can be simplified to,

minp1,p2

fp1p2 + cp1 + dp2 + e

ap1 + dp2 + e

s.t. (a− c)p1 ≤ (b− d)p2

and 0 ≤ p1 ≤ P1 , 0 ≤ p2 ≤ P2. (8)

To address (8), we use the following lemma.

Lemma 1: Consider the following fractional programming

problem

minx

f(x)

g(x)

s.t. x ∈ X, (9)

where X is a polytope. Define the function,

F (x, λ) = f(x)− λg(x), (10)

and let’s define,

π(λ) = minx∈X

F (x, λ) and x(λ) = argminx∈X

F (x, λ). (11)

Then, it can be shown that π(λ) is a decreasing function of

λ and if λ∗ is the root of π(λ), then x(λ∗) is the optimum

solution of (9).

Proof : see [7].

Page 3: [IEEE 2014 Iran Workshop on Communication and Information Theory (IWCIT) - Tehran, Iran (2014.5.7-2014.5.8)] 2014 Iran Workshop on Communication and Information Theory (IWCIT) - Maximizing

Based on Lemma 1, and noting the objective of (8), we

define the function F (p1, p2, λ) as

F (p1, p2, λ) = fp1p2 + cp1 + dp2 + e− λ(ap1 + dp2 + e)

= fp1p2 + (c− λa)p1 + (1− λ)dp2 + (1− λ)e.(12)

To compute π(λ), we consider the following optimization

problem

minp1,p2

fp1p2 + (c− λa)p1 + (1− λ)dp2 + (1− λ)e

s.t. (a− c)p1 ≤ (b− d)p2,

and 0 ≤ p1 ≤ P1 , 0 ≤ p2 ≤ P2. (13)

In the sequel, we assume that the direct channels are stronger

than cross channels, i.e. |h11| ≥ |h12| and |h22| ≥ |h21|. This

assumption is reasonable for the cases in which Source1-to-

Destination1 is away from Source2-to-Destination2. Moreover,

the noise power at both destinations are assumed to be the

same, i.e. σ21 = σ2

2 = σ2. According to these assumptions, we

have a ≥ c and b ≥ d.

To solve (13), for fixed values of p2 and λ, one can readily

observe that the optimal value of p1, namely p∗1, can be

computed from the following optimization problem,

minp1

(fp2 + c− λa)p1 + (1− λ)dp2 + (1− λ)e

s.t. p1 ≤ b− d

a− cp2, 0 ≤ p1 ≤ P1. (14)

One can readily observe that for known parameters p2 and

λ, (14) is a single variable Linear Programming (LP) in

terms of p1 where depending on the coefficient of p1 and the

constraints, p∗1(p2, λ) will be either the start or the end point of

the interval [0 , min(P1,b−da−c

p2)]. Mathematically speaking,

we have,

p∗1(p2, λ) =

⎧⎪⎨⎪⎩0 p2 ≥ λa−c

f

P1 p2 < λa−cf

∧p2 ≥ a−c

b−dP1

b−da−c

p2 p2 < min(a−cb−d

P1,λa−c

f)

(15)

where substituting (15) in (12) results in,

F (p2, λ) =

⎧⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎩

(1− λ)dp2 + (1− λ)e for p2 ≥ λa−cf

(fP1 + (1− λ)d)p2 + (c− λa)P1 + (1− λ)e

for p2 < λa−cf

∧p2 ≥ a−c

b−dP1

f(b−d)a−c

p22 + (ad+bc−2cd−λ(ab−cd)a−c

)p2 + (1− λ)e

for p2 < min(a−cb−d

P1,λa−c

f)

(16)

One can readily verify that F (p2, λ) is a continuous function

of p2. Moreover, for 0 ≤ λ ≤ 1, the first and the second

terms of (16) are linear increasing functions with respect to

p2, while the third term is a convex quadratic function. Thus,

the minimum value of F (p2, λ) resides on the third term

and therefore the following optimization problem gives the

optimum value of p2, i.e., p∗2(λ),

minp2

f(b− d)

a− cp22 +

(ad+ bc− 2cd− λ(ab− cd)

a− c

)p2

+ (1− λ)e

s.t. 0 ≤ p2 ≤ min

(P2,c,

λa− c

f

), (17)

where,

P2,c = min

(P2,

a− c

b− dP1

). (18)

To find p∗2(λ), it should be noted that the objective function

of (17) has a minimum value at the point p̃2(λ), where,

p̃2(λ) =λa− c

2f− (1− λ)(a− c)d

2f(b− d). (19)

If p̃2(λ) satisfies the constraint of (17), it will be the optimum

solution of (17) as well; otherwise, either of the start or the

end point of interval[0,min

(P2,c,

λa−cf

)]yields the optimal

solution. As a result, noting p̃2(λ) in (19) is always lower thanλa−c

f, hence after some mathematics it turns out that p∗2(λ) is

given by,

p∗2(λ) =

⎧⎪⎨⎪⎩0 p̃2(λ) < 0λa−c2f − (1−λ)(a−c)d

2f(b−d) 0 ≤ p̃2(λ) ≤ P2,c

P2,c p̃2(λ) > P2,c,

(20)

or equivalently, using (19), the equation (20) can be rewritten

as,

p∗2(λ) =

⎧⎪⎪⎪⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎪⎪⎪⎩

0 λ < ad+bc−2cdab−cd

λa−c2f − (1−λ)(a−c)d

2f(b−d)ad+bc−2cd

ab−cd≤ λ and

λ ≤ 2f(b−d)P2,c+ad+bc−2cdab−cd

P2,c λ >2f(b−d)P2,c+ad+bc−2cd

ab−cd.

(21)

For notational convenience, we define,

λ1 �ad+ bc− 2cd

ab− cd,

λ2 �2f(b− d)P2,c + ad+ bc− 2cd

ab− cd,

and therefore, (21) can be replaced by,

p∗2(λ) =

⎧⎪⎨⎪⎩0 λ < λ1

λa−c2f − (1−λ)(a−c)d

2f(b−d) λ1 ≤ λ ≤ λ2

P2,c λ > λ2,

(22)

According to (11), we should substitute (22) in (16) to

compute π(λ) as follows,

π(λ) = F(p∗2(λ), λ

)=

⎧⎪⎨⎪⎩(1− λ)e λ < λ1

αλ2 + βλ+ γ λ1 ≤ λ ≤ λ2

ωλ+ ν λ > λ2,

(23)

Page 4: [IEEE 2014 Iran Workshop on Communication and Information Theory (IWCIT) - Tehran, Iran (2014.5.7-2014.5.8)] 2014 Iran Workshop on Communication and Information Theory (IWCIT) - Maximizing

where the following definitions are being used,

α �− (ab− cd)2

4f(b− d)(a− c),

β �(ab− cd)(ad+ bc− 2cd)

2f(b− d)(a− c)− e,

γ �− (ad+ bc− 2cd)2

4f(b− d)(a− c)+ e,

ω �− (ab− cd

a− cP2,c + e),

ν �f(b− d)P 2

2,c + (ad+ bc− 2cd)P2,c

a− c+ e.

We know that the objective function in (8) has positive value

and can equal to one for p1 = p2 = 0, so the optimum value of

it lies in the interval [0, 1]. Moreover, according to Lemma 1,

the root of π(λ) is the optimum value of the objective function

in (8). Thus, the root of π(λ) will be placed in [0, 1]. Also, in

the Lemma 1, it is argued that π(λ) is a decreasing function

of λ and thus it has one root in the interval λ ∈ [0, 1]. It is

easy to show that λ1 < 1 and therefore either the second or

the third term of π(λ) contain the root. Thus, one can readily

compute π(λ2) and based on its sign, one of the second or the

third term of π(λ) is set to zero to obtain the root of π(λ),i.e. λ∗. Mathematically speaking, we have,

λ∗ =

{−β−

√β2−4αγ

2α π(λ2) ≤ 0−νω

otherwise.(24)

Finally, the optimum value of achievable secrecy rate is given

by,

R∗

s1 = R∗

s2 = log2(1/λ∗) (25)

IV. NUMERICAL RESULTS

This section aims at providing some numerical results to

explore the achievable secrecy rate as well as transmit power

of each source versus the maximum allowable transmit power.

As is mentioned in the preceding section, at the optimal point,

both achievable secrecy rates are equal. Thus, it is adequate to

merely investigate one of the two secrecy rates. Throughout

the simulations, we assume that σ21 = σ2

2 = 1 and that the

direct channel gains are assumed to be complex Gaussian

random variables, i.e. hii ∼ CN (0, 1) for i = 1, 2, while

the cross channel gains are related to direct gains through

equations h12 =√α1h11 and h21 =

√α2h22. Moreover,

for a maximum allowable transmit power PT , two cases of

P1 = P2 = PT and P1 = 2P2 = PT are considered.

Accordingly, Fig. 2 is provided to illustrate the achievable

secrecy rate versus PT for P1 = P2 = PT and three

different values of α1 and α2. It is shown that increasing the

maximum allowable transmit power, the achievable secrecy

rate approaches to a constant value. Moreover, increasing the

strength of the cross channel gains decreases the achievable

secrecy rate. Fig. 3 represents the transmit power of two

sources versus PT , showing the source with stronger cross

gain consumes more power in order to have the same secrecy

−5 0 5 10 15 20 25 30 35 400

0.2

0.4

0.6

0.8

1

1.2

1.4Achievable Secrecy Rate

PT (dB)

Rs1 =

Rs2 (

bits/tra

nsm

issio

n)

α1 = 0.2 , α

2 = 0.1

α1 = 0.2 , α

2 = 0.2

α1 = 0.2 , α

2 = 0.4

Fig. 2. Achievable secrecy rate versus PT for P1 = P2 = PT and differentvalues of α1 and α2

−5 0 5 10 15 20 25 30 35 40−10

−5

0

5

10

15

20Transmit Power

P(dB)

Tra

nsm

it P

ow

er

(dB

)

Source 1

Source 2

α1 = 0.2 , α

2 = 0.4

α1 = 0.2 , α

2 = 0.2

α1 = 0.2 , α

2 = 0.1

Fig. 3. Transmit power of sources versus PT for P1 = P2 = PT anddifferent values of α1 and α2

rate as the link with smaller cross gains. Moreover, it is evident

that as long as the cross gains are relatively low, sources make

use of more power, thus according to Fig. 2 the secrecy rate

is increased.

Figs. 4 and 5 are provided to demonstrate the impact of

transmit power imbalance for the case of P1 = 2P2 = PT ,

showing at high values of PT , both of secrecy rates as well

as transmit powers do not change that much as compared to

previous results with equal transmit powers, while for small

values of PT , the secrecy rate as well as transmit powers

are smaller than that of reported in previous results, since

the maximum allowable transmit power of source2 acts as

bottleneck.

V. CONCLUSION

This paper studies the achievable secrecy rate balancing

problem under transmit power constraint in a two-user Gaus-

Page 5: [IEEE 2014 Iran Workshop on Communication and Information Theory (IWCIT) - Tehran, Iran (2014.5.7-2014.5.8)] 2014 Iran Workshop on Communication and Information Theory (IWCIT) - Maximizing

−5 0 5 10 15 20 25 30 35 400

0.2

0.4

0.6

0.8

1

1.2

1.4Achievable Secrecy Rate

PT (dB)

Rs1 =

Rs2 (

bits/tra

nsm

issio

n)

α1 = 0.2 , α

2 = 0.1

α1 = 0.2 , α

2 = 0.2

α1 = 0.2 , α

2 = 0.4

Fig. 4. Achievable secrecy rate versus PT for P1 = 2P2 = PT and differentvalues of α1 and α2

−5 0 5 10 15 20 25 30 35 40−10

−5

0

5

10

15

20

PT (dB)

Tra

nsm

it P

ow

er

(dB

)

Source 1

Source 2

α1 = 0.2 , α

2 = 0.4

α1 = 0.2 , α

2 = 0.2

α1 = 0.2 , α

2 = 0.1

Fig. 5. Transmit power of sources versus PT for P1 = 2P2 = PT anddifferent values of α1 and α2

sian interference channel. It is shown that the corresponding

max-min problem can be simplified to a simplified maximiza-

tion problem, where a closed-form solution is derived.

REFERENCES

[1] A. D. Wyner, “The wiretap channel,” Bell Syst. Tech. J., vol. 54, no. 8,pp. 1355–1387, Oct. 1975.

[2] S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian wiretapchannel,” IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451–456, July1978.

[3] R. Liu, I. Maric, P. Spasojevic, and R. D. Yates, “Discrete memorylessinterference and broadcast channels with confidential messages: Secrecyrate regions,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493–2507,June 2008.

[4] S. A. A. Fakoorian and A. L. Swindlehurst, “Competing for secrecy inthe miso interference channel,” IEEE Trans. Signal Process., vol. 61, no.1, pp. 170–181, Jan. 2013.

[5] J. Zhu, J. Mo, and M. Tao, “Cooperative secret communication withartificial noise in symmetric interference channel,” IEEE Commun. Lett.,vol. 14, no. 10, pp. 885–887, Oct. 2010.

[6] J. Ni, K.-K. Wong, Z. Fei, C. Xing, H. Chen, K.-F. Tong, and J. Kuang,“Secrecy-rate balancing for two-user miso interference channels,” IEEE

Wireless Commun. Lett., Accepted for Publication 2013.[7] W. Dinkelbach, “On nonlinear fractional programming,” Management

Science, vol. 13, no. 7, pp. 492–498, Mar. 1967.