Abstract

We revisit a channel coding problem where the channel state information (CSI) is rate-limited (or coded) and available to the channel encoder. A wiretapper is added into this model, and the confidential message is intended only for the legal receiver and should be kept from being eavesdropped by the wiretapper. Equivocation analysis is provided to evaluate the level of information leakage to the wiretapper. We characterize an achievable rate-equivocation region as well as an outer bound for this security model. To achieve the rate-equivocation triples, we propose an efficient coding scheme, in which the coded CSI serves as the CSI for the channel encoder, based on Gel’fand and Pinsker’s coding and Wyner’s random coding. Furthermore, an example of Gaussian wiretap channel with rate-limited CSI is presented, of which a lower bound on the secrecy capacity is obtained. By simulation, we find there exists an optimal rate of the coded CSI at which the biggest secrecy transmission rate of the Gaussian case is achieved.

1. Introduction

The problem of coding for channels with CSI has been studied actively. In these models, CSI is generated by nature and provided to the transmitter and/or to the receiver in a causal or noncausal manner. Shannon first studied the discrete memoryless channel (DMC) with causal CSI only at the encoder and got its capacity [1]. It was found that the capacity was the same as the capacity of the DMC without CSI. The problem where CSI was only noncausally known to the channel encoder was solved by Gel’fand and Pinsker [2]. They showed a different capacity expression from [1] and provided a different coding strategy which was now known as Gel’fand and Pinsker’s coding. The key idea of Gel’fand and Pinsker’s coding is that the codeword chosen for the transmitted message is jointly typical with the state sequence. Actually, the capacity for the causal case in [1] can be got from [2] by letting the auxiliary random variable be independent of CSI. Some other extended channel models with CSI at both the encoder and the decoder were studied in [37]. Among them, Heegard and El Gamal first investigated a more practical channel with the unique feature that CSI at encoder and decoder was subject to a rate constraint [3]. The motivation of this unique feature, that is, rate-limited CSI, was that CSI was transmitted over way-side channels for which only limited resources (bandwidth, operation time, memory, etc.) of the system were allocated. They only gave inner bounds on the capacity region for this model. Rosenzweig et al. then revisited this model and gave the capacity region of the model with rate-limited CSI at encoder and full CSI at the decoder [4]. For the model where CSI was fully known at the encoder and rate-limited at the decoder, capacity region was obtained in [5].

It is known that secure information transmission is an essential communication requirement. The above state-dependent channel models [17] considered no secrecy constraint. Recently, the works [815] have introduced the wiretapper in channels with CSI to model a safe communication model. Chen and Vinck explored the discrete memoryless wiretap channel with noncausal CSI and presented an achievable rate-equivocation region [8]. The region was established using a combination of Gel’fand and Pinsker’s coding and Wyner’s random coding. They showed that CSI helped to get a larger secrecy capacity for the Gaussian wiretap channel. In [9], an achievable rate-equivocation region for the Gaussian wiretap with side information was given. The authors proposed a perfect-secrecy-achieving coding strategy for the model based on code-partition technique. The code-partition technique divided a random code into bins so that high rates could be achieved with asymptotic perfect secrecy. Dai and Luo improved the results of [8] by providing upper bounds on the secrecy capacity [10]. Liu and Chen got a lower bound on the secrecy capacity of the model where CSI was available noncausally at both the encoder and the decoder [11], and an upper bound was established by [12]. Action-dependent channel models involving secrecy were studied in [1315]. Dai et al. provided the inner and outer bounds on the capacity-equivocation region for the wiretap channel with action-dependent states [13]. Then, they extended the model by adding a noiseless feedback link between the transmitter and receiver [14], in which the feedback served as a secret key. We restricted the rate of the feedback by introducing a rate-limited feedback link and obtained the corresponding capacity-equivocation region. Then, we explored information embedding on the actions in wiretap channel where part of the message was embedded on the actions [15] and characterized the tradeoff between the sum secrecy rate and the information embedding rate.

We are motivated to revisit a state-dependent channel model by adding a wiretapper (shown in Figure 1), that is, discrete memoryless wiretap channel with rate-limited channel state information. The CSI is known to the encoder and not known to the decoder. In our setup, the CSI at the encoder is subject to a rate constraint , as in the work [3]. Note that the CSI in previous works considered that secrecy constraint [8, 10] was rate-unlimited, which is different from our rate-limited setup. However, we will later see that the model in [8, 10] is actually a special case of our model. In addition, the confidential message is intended only for the receiver and should be kept secret from the wiretapper as much as possible.

To the best of our knowledge, the model in Figure 1 involving secure information transmission has not been explored. Our goal is to characterize the inner and outer bounds on the capacity-equivocation region of the model. Particularly, we are interested in getting the corresponding bounds on the secrecy capacity for which perfect secrecy is realized. The perfect secrecy means that no information is leaked to the wiretapper. We also provide efficient coding schemes to achieve the rate-equivocation triple by means of Gel’fand and Pinsker’s coding and Wyner’s random coding. Moreover, an example of Gaussian wiretap channel with rate-limited CSI is given and its lower bound on the secrecy capacity is also calculated. The simulation results show that there exists an optimal rate of the coded CSI at which the biggest secrecy transmission rate of the Gaussian example is achieved.

The remainder of the paper is organized as follows. Section 2 describes the wiretap channel with rate-limited CSI and outlines the inner and outer bounds on the capacity-equivocation region. Section 3 calculates the corresponding bounds on the secrecy capacity and presents an example. Section 4 proposes a coding scheme to achieve the rate-equivocation triples and gives the outer bound proof. We conclude in Section 5 with a summary of the whole work and some future directions.

2. Channel Model and Main Results

In this section, the model of wiretap channel with rate-limited CSI is described. Then, we present the inner and outer bounds on the capacity-equivocation region.

2.1. Channel Model

In this paper, calligraphic letters, for example, , are used to denote the finite sets. We use to denote the cardinality of the set . We use to denote the vectors of random variables for and will always drop the subscript when . Besides, for and , the set of the typical -sequences is defined as for all , where denotes the frequency of occurrences of letter in the sequence . The set of the jointly typical sequences, for example, , follows similarly. The base of the function in this paper is 2.

The channel model is described as follows. We consider the rate-limited CSI setup where a rate-limited description of the channel states is provided to the channel encoder. This setup is motivated by the limited capacity of the channel over which the channel states are transmitted. The input of the state encoder is the channel state which is independently and identically distributed , and the output is . The channel encoder encodes the messages and into . The main channel is a DMC with discrete input alphabet and output alphabet . The channel is memoryless in the sense that , where , , and . The receiver decodes the message with the observation . The output of the decoder is . The probability of error for the decoder is defined as . The wiretap channel is also a DMC with input and output . The wiretap channel is memoryless in the sense that , where . The uncertainty of the message for the wiretapper is measured by .

A code for the model in Figure 1 includes a state encoder, channel encoder, and decoder. The state encoder maps the state sequence into , where . The stochastic channel encoder is specified by a matrix of conditional probability distributions , where . Note that and is the probability that the messages and are encoded as the channel input . The decoder maps the output sequence into decoded message . Before stating the main results, we give the definitions of “achievable” and “secrecy capacity” as follows.

Definition 1. A rate-equivocation triple is said to be achievable for the model in Figure 1 if there exists a code such thatwhere is an arbitrary small positive real number, is the rate of the message , is the rate of the coded message , and is the rate of equivocation. The capacity-equivocation region is defined as the convex closure of all achievable rate-equivocation triples .

Definition 2. The secrecy capacity is the maximum rate at which the confidential message can be sent to the receiver in perfect secrecy with the constraint on . The secrecy capacity iswhere is the capacity-equivocation region and is the constraint condition of rate .

2.2. Main Results

We first give an achievable rate-equivocation region for the wiretap channel with rate-limited CSI and then present an outer bound. Some comments on the theorems are given subsequently. Further discussion about the results and comparison with other existing models are shown in Section 3.

Theorem 3. An inner bound on the capacity-equivocation region of the wiretap channel with rate-limited CSI is the setwhere form a Markov chain.

Theorem 4. An outer bound on the capacity-equivocation region of the wiretap channel with rate-limited CSI is the setwhere , , and form Markov chains.

We have the following comments:(1)The sets and are convex; the proof is similar to the proof of Proposition  1 in [5].(2)Theorem 3 tells that any rate-equivocation triple belonging to is achievable. Theorem 4 tells that all achievable rate-equivocation triples are contained in . The capacity-equivocation region of the model in Figure 1 is between and .(3)Equivocation was introduced by Wyner [16] to measure the amount of information leaked to the wiretapper. It is always wished that as large as possible equivocation for the wiretapper can be achieved at any acceptable rate of reliable transmission to the legitimate receiver. From the formulas of , it is obvious that if is achievable, the rate-equivocation triples are also achievable for every . This reminds us that it is sufficient to show that is achievable.(4)We are considerably interested in finding the maximum secrecy rate when which implies prefect secrecy. It is explained as follows. Since and , we can get when . Since conditioning does not increase entropy, we have , which indicates that no information was leaked to the wiretapper.(5)The proof of the two theorems is given in Section 4, in which we construct a coding scheme to achieve the rate-equivocation triple in based on Gel’fand and Pinsker’s coding and Wyner’s random coding. We also give the identification of the auxiliary random variables in the outer bound proof.

Further discussion about the theorems and the comparison with other existing results are given in Section 3.

3. Discussion and Gaussian Example

In this section, we first calculate the lower and upper bounds on the secrecy capacity of the model in Figure 1. Subsequently, we compare our results with other existing state-dependent channel models. Then, we provide a (physically) degraded example of Gaussian wiretap channel with rate-limited CSI and calculate a lower bound on the secrecy capacity subject to a rate constraint on . By simulation, we find that there exists an optimal rate of the coded CSI at which the biggest secrecy transmission rate of the Gaussian example is achieved.

3.1. Discussion and Comparison

The lower and upper bounds on the secrecy capacity are presented in Corollary 5.

Corollary 5. The lower and upper bounds on the secrecy capacity of wiretap channel with rate-limited CSI arerespectively.

Proof. We first prove (8). According to the definition of formula (4), we let in and then get the upper bounds on subject to as follows. ConsiderBased on the definition of secrecy capacity, (9), we prove (8). Similarly, substituting into , we get the upper bounds on subject to asFormula (10) can be obtained from (11). Hence, according to the definition of secrecy capacity and (11), formula (7) is proved.

The comparison of the secrecy capacity between [10] and our results is given as follows. We first present Dai’s main results in [10].

Dai and Luo [10] characterized the lower and upper bounds on the secrecy capacity of wiretap channel with full and noncausal CSI at the encoder, depicted in Figure 2, asrespectively.

The comparison is listed below.(1)The lower bounds (7) and (12) share the same expression. We note that, in the rate-limited CSI setup, CSI is not directly known to the channel encoder. The CSI is encoded by the state encoder, and it is the coded version that serves as the channel states to the channel encoder. In the coding scheme (presented in Section 4), the coded CSI serves as the CSI in the jointly typical encoding. Based on this observation, it is easy to see that (7) and (12) share the same expression (without considering the constraint on rate of the coded CSI).(2)For deriving the upper bounds (8) and (13), the auxiliary random variables are different. In [10], there are three auxiliary random variables , and , while there are four auxiliary random variables , , and in our derivations. The detailed expression of these random variables is given in Section 4.(3)Besides, in Theorem 4, we have the Markov chain . Then,where (14) is from the Markov chain . If we let be independent of , the conditional mutual information . In this case, it is easy to see .

3.2. Gaussian Example

In this subsection, we look at the (physically) degraded Gaussian wiretap channel with rate-limited CSI shown in Figure 3. We treat and in Figure 3 as noise. Let and . Similarly to [8, 9], consider , where and are independent from each other and is distributed as . The parameter is to be determined. We assume that the correlation coefficient of and is . Then, using similar derivations in [8, 9], we havewhereNote that the expressions of are the same as those in [8, 9], and the difference is that here we have the rate constraint on ; that is, .

Applying Corollary 5, we get the lower bound on the secrecy capacity of the Gaussian case aswhich is subject to the constraint . The graph of as a function of for fixed , and is presented in Figure 4. It can be seen that, for the six cases in Figure 4, the lower bound on the secrecy capacity achieves the maximum value at different values of . By setting a proper value to the parameter , we can achieve the maximum value of . Besides, we see that when the noise power of the wiretap channel decreases (or the noise power of the main channel increases), is reduced. This is straightforward.

Moreover, if we let , the lower bound can be expressed as a function of when , and are fixed. When , , , , and are fixed at certain values, the graph of as a function of is depicted in Figure 5. Five different cases are considered:(1). The noise power of the main channel and wiretap is big, and variable is independent of ; that is, ;(2). The noise power of the main channel and wiretap is big, and variable is not independent of ;(3). The noise power of the main channel and wiretap is small, and variable is not independent of ;(4). Wiretap channel is less noisy than main channel, and variable is not independent of ;(5). Main channel is less noisy than wiretap channel, and variable is not independent of .

It can be seen that, in general, when is small, increases with . However, there exists an optimal value of at which is the biggest. When is bigger than the optimal value, decreases. On the one hand, we see that, for case 1 where variable is independent of , secrecy rate decreases sharply with the CSI rate (when passes the optimal value). On the other hand, when variable is not independent of (case 2–5), decreases slowly with .

Besides, comparing cases 2 and 3, we find that the smaller the noise power is, the higher the secrecy rate is. This means if information transmission happens in good channels, we can achieve higher secrecy transmission rate.

Furthermore, comparing cases 4 and 5, it can be seen that when the main channel is less noisy than the wiretap channel, higher secrecy rate is achieved. This result is straightforward since the main channel is better than the wiretap channel.

4. Proof of Theorems 3 and 4

In this section, two theorems in Section 2 are proved. To show Theorem 3, we construct a coding scheme to achieve the rate-equivocation triple in based on Gel’fand and Pinsker’s coding and Wyner’s random coding and give the equivocation analysis in Section 4.1. Then, we prove Theorem 4 and give the identification of the auxiliary random variables in Section 4.2.

4.1. Proof of Theorem 3

We show that all triples are achievable. Concretely, we need to prove that any rate-equivocation triple and decoding error probability satisfy

It is obvious that if is achievable, the rate-equivocation triples are also achievable for every . Therefore, we try to prove is achievable.

Let , where is a fixed positive number. Since , we can get . For each , an i.i.d sequence is generated according to . We find a such that . Let the message be uniformly distributed over . Then, we generate i.i.d codewords according to . These codewords are put into bins such that each bin contains codewords. The index of the bin is denoted by . The codewords in each bin are put into subbins which are indexed by . The number of the codewords in each subbin is . We use to index the codeword in the subbin. The codebook structure is presented in Figure 6.

To send , the transmitter tries to find a such that in the bin indexed by . Then, the input sequence of the main channel is generated by .

To decode the message, the decoder finds a unique codeword such that and outputs . Since the number of the codewords is , this decoding step succeeds with high probability. Moreover, the number of is , so we can find a such that with high probability. Similarly, since each bin contains codewords , the error probability of finding a such that in a given bin indexed by approaches zero.

We focus on analyzing the uncertainty of given the wiretapper’s observation . Considerwhere (19) is from the Markov chain and (20) is from the fact that the codewords are i.i.d and the channels are discrete memoryless.

Next, we bound and in (20). Since , we have .

The explanation for bounding is presented as follows. We first show that, given and , the probability of error for to decode satisfies . Here, is small for sufficiently large . Given the knowledge of and , the total number of possible codewords of iswhere (21) is from . Based on (22), we can easily show that a unique codeword exists such that with high probability. This indicates that the probability of error for to decode satisfies . Therefore, by Fano’s inequality, we obtainwhere is small for sufficiently large .

Substituting these two results into (20) and utilizing (2), we finish the proof of for the model in Figure 1 with rate-limited CSI. The proof of Theorem 3 is completed.

4.2. Proof of Theorem 4

We need to prove that all achievable rate-equivocation triples are contained in . Precisely, for any triple satisfying (1), (2), and (3), we need to showCondition (24) is proved as follows. Considerwhere (28) is from the fact that is uniformly distributed over and (29) is from Fano’s inequality. The term is calculated as follows. ConsiderIn the above derivation, formula (30) is from the fact that the message is independent of the state sequence. Therefore, we have . Formula (31) is from the fact that which is proved in (35). Considerwhere (34) is from the fact that is a function of and the fact that conditioning does not increase entropy. Formula (32) is from the sum equality in (36). One hasThe sum equality (36) can be proved using similar methods in [13, 17]. Formula (33) is from defining and .

Condition (25) is proved as follows. Considerwhere (37) is from the fact that is independent of .

Condition (26) is proved as follows. Considerwhere (39) is from (2).

To prove condition (27), we considerThe first two terms in (41) are calculated as follows.

From (32), one hasSimilarly, we can getThen, we substitute (42) and (43) into (41) and getwhere (44) is from the Markov chain and (45) from defining and .

To serve the single-letter characterization, let us introduce a time-sharing random variable independent of all other random variables and uniformly distributed over . SetThen, substituting the above new random variables into (33), (38), and (45), conditions (24), (25), and (27) are verified by standard time-sharing argument. From the definition of the auxiliary random variables, the Markov chains , , and are easily verified. We complete the proof of Theorem 4.

5. Conclusion

This paper has investigated the problem of rate-limited CSI in state-dependent channels under secrecy constraint. It is an extension of the rate-limited CSI setup without secrecy. This model is more general than the existing wiretap channel with full CSI at the transmitter. We proposed an achievable rate-equivocation region and an outer bound on the capacity-equivocation region. To achieve the rates, a proper coding scheme is constructed based on Gel’fand and Pinsker’s coding and Wyner’s random coding.

Our setup can be probably extended in the following directions.(i)In this current model as well as [17], the CSI is generated by nature. However, in some practical communication systems, the transmitter can take actions to affect the formation of the CSI. This idea called action-dependent states is from [18]. We can further explore the impact of the action-dependent states in the wiretap channel with rate-limited CSI.(ii)Only inner and outer bounds on the capacity-equivocation region are obtained at present. We can try to find some special cases where the two bounds match.(iii)In our model, the CSI is rate-limited and known to the encoder. We can study the model where the CSI is rate-limited and known to the decoder (or both the decoder and the encoder) under the secrecy constraint.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

Acknowledgment

This work was supported in part by the National Natural Science Foundation of China under Grant nos. 61332010, 61171173, and 60932003.