
The secrecy rate region of wiretap interference channels with a multiantenna
passive eavesdropper is studied under receiver energy harvesting constraints.
To stay operational in the network, the legitimate receivers demand energy
alongside information, which is fulfilled by power transmission and exploiting
a power splitting (PS) receiver. By simultaneous wireless information and power
transfer (SWIPT), the amount of leakage to the eavesdropper increases, which in
turn reduces the secrecy rates. For this setup, lowerbounds for secure
communication rate are derived without imposing any limitation at the
eavesdropper processing. These lowerbounds are then compared with the rates
achieved by assuming the worstcase linear eavesdropper processing. We show
that in certain special cases the worstcase eavesdropper does not enlarge the
achievable secure rate region in comparison to the unconstrained eavesdropper
case. It turns out that in order to achieve the Pareto boundary of the secrecy
rate region, smart tuning of the transmit power and receiver PS coefficient is
required. Hence, we propose an efficient algorithm to optimize these parameters
jointly in polynomialtime. The secrecy rate region characterization is
formulated as a weighted maxmin optimization problem. This problem turns out
to be a nonconvex problem due to the nonconvex constrained set. This set is
replaced by a convex subset that in consequence leads to an achievable
suboptimal solution which is improved iteratively. By solving the problem
efficiently, we obtain the amount of rate loss for providing secrecy, meanwhile
satisfying the energy demands.

We investigate Gaussian widely linear precoding wellknown as improper
Gaussian signaling for the cellular uplink with intercell interference (known
as interference multiple access channel (IMAC)). This transmission scheme
provides extra degrees of freedom by treating the real and imaginary components
of the complex Gaussian signal differently. Since current standards mainly
utilize proper Gaussian signaling, we highlight the benefits of joint improper
Gaussian signaling and precoding over multiple temporal dimensions (symbol
extension in time) in IMAC. This scheme achieves significantly high information
rates at the expense of extra complexity at the transmission phase. We study
the sumpower minimization problem under rate constraints. This problem is a
difference of convex (DC) program, hence a nonconvex problem. We derive a
convex subset of the original nonconvex set that belongs to its interior. The
convex subset expands and approaches the original nonconvex set from its
interior iteratively. By numerical simulations, we observe the benefits of
improper Gaussian signaling alongside symbol extension in power consumption for
both singleantenna and multiantenna base stations. Interestingly, we observe
that at high interference scenarios, the efficiency of improper Gaussian
signaling outperforms conventional proper Gaussian signaling at low rate
demands. Moreover, in such scenarios the sumpower required for achieving
particular rate demands is significantly reduced.

An emerging trend of next generation communication systems is to provide
network edges with additional capabilities such as storage resources in the
form of caches to reduce file delivery latency. To investigate this aspect, we
study the fundamental limits of a cacheaided broadcastrelay wireless network
consisting of one central base station, $M$ cacheequipped transceivers and $K$
receivers from a latencycentric perspective. We use the normalized delivery
time (NDT) to capture the perbit latency for the worstcase file request
pattern, normalized with respect to a reference interferencefree system with
unlimited transceiver cache capabilities. The objective is to design the
schemes for cache placement and file delivery in order to minimize the NDT. To
this end, we establish a novel converse and two types of achievability schemes
applicable to both timevariant and invariant channels. The first scheme is a
general oneshot scheme for any $M$ and $K$ that synergistically exploits both
multicasting (coded) caching and distributed zeroforcing opportunities. We
show that the proposed oneshot scheme (i) attains gains attributed to both
individual and collective transceiver caches (ii) is NDToptimal for various
parameter settings, particularly at higher cache sizes. The second scheme, on
the other hand, designs beamformers to facilitate both subspace interference
alignment and zeroforcing at lower cache sizes. Exploiting both schemes, we
are able to characterize for various special cases of $M$ and $K$ which satisfy
$K+M\leq 4$ the optimal tradeoff between cache storage and latency. The
tradeoff illustrates that the NDT is the preferred choice to capture the
latency of a system rather than the commonly used sum degreesoffreedom (DoF).
In fact, our optimal tradeoff refutes the popular belief that increasing cache
sizes translates to increasing the achievable sum DoF.

An emerging trend of next generation communication systems is to provide
network edges with additional capabilities such as storage resources in the
form of caches to reduce file delivery latency. To investigate the impact of
this technique on latency, we study the delivery time of a cacheaided
broadcastrelay wireless network consisting of one central base station, $M$
cacheequipped transceivers and $K$ receivers under finite precision channel
state information (CSI). We use the normalized delivery time (NDT) to capture
the worstcase perbit latency in a file delivery. Lower and upper bounds on
the NDT are derived to understand the influence of $K,M$, cache capacity and
channel quality on the NDT. In particular, regimes of NDToptimality are
identified and discussed.

The characterization of fundamental performance bounds of manytomany
communication systems in which participating nodes are active in an
intermittent way is one of the major challenges in communication theory. In
order to address this issue, we introduce the multipleinput multipleoutput
(MIMO) threeway channel (3WC) with an intermittent node and study its
degreesoffreedom (DoF) region and sumDoF. We devise a nonadaptive encoding
scheme based on zeroforcing, interference alignment and erasure coding, and
show its DoF region (and thus sumDoF) optimality for nonintermittent 3WCs and
its sumDoF optimality for (node)intermittent 3WCs. However, we show by
example that in general some DoF tuples in the intermittent 3WC can only be
achieved by adaptive schemes, such as decodeforward relaying. This shows that
nonadaptive encoding is sufficient for the nonintermittent 3WC and for the
sumDoF of intermittent 3WCs, but adaptive encoding is necessary for the DoF
region of intermittent 3WCs. Our work contributes to a better understanding of
the fundamental limits of multiway communication systems with intermittency
and the impact of adaptation therein.

Stringent mobile usage characteristics force wire less networks to undergo a
paradigm shift from conventional connectioncentric to contentcentric
deployment. With respect to 5G, caching and heterogeneous networks (HetNet) are
key technologies that will facilitate the evolution of highly content centric
networks by facilitating unified quality of service in terms of lowlatency
communication. In this paper, we study the impact of transceiver caching on the
latency for a HetNet consisting of a single user, a receiver and one
cacheassisted transceiver. We define an informationtheoretic metric, the
delivery time per bit (DTB), that captures the delivery latency. We establish
coinciding lower and upper bounds on the DTB as a function of cache size and
wireless channel parameters; thus, enabling a complete characterization of the
DTB optimality of the network under study. As a result, we identify cache
beneficial and nonbeneficial channel regimes.

A Fog radio access network is considered as a network architecture candidate
to meet the soaring demand in terms of reliability, spectral efficiency, and
latency in next generation wireless networks. This architecture combines the
benefits associated with centralized cloud processing and wireless edge caching
enabling primarily lowlatency transmission under moderate fronthaul capacity
requirements. The FRAN we consider in this paper is composed of a centralized
cloud server which is connected through fronthaul links to two edge nodes
serving two mobile users through a Zshaped partially connected wireless
network. We define an informationtheoretic metric, the delivery time per bit
(DTB), that captures the worstcase perbit delivery latency for conveying any
requested content to the users. For the cases when cloud and wireless
transmission occur either sequentially or in parallel, we establish coinciding
lower and upper bounds on the DTB as a function of cache size, backhaul
capacity and wireless channel parameters. Through optimized rate allocation,
our achievability scheme determines the best combination of private, common
signalling and interference neutralization that matches the converse. Our
converse bounds use subsets of wireless, fronthaul and caching resources of the
FRAN as side information that enable a single receiver to decode either one or
both users' requested files. We show the optimality on the DTB for all channel
regimes. In case of serial transmission, the functional DTBbehavior changes at
fronthaul capacity thresholds. In this context, we combine multiple channel
regimes to classes of channel regimes which share the same fronthaul capacity
thresholds and as such the same DTBfunctional. In total, our analysis
identifies four classes; in only three of those edge caching and cloud
processing can provide nontrivial synergestic and nonsynergestic performance
gains.

This letter deals with the joint information and energy processing at a
receiver of a pointtopoint communication channel. In particular, the
tradeoff between the achievable information rate and harvested energy for a
multipleantenna power splitting (PS) receiver is investigated. Here, the rate
energy region characterization is of particular interest, which is
intrinsically a nonconvex problem. In this letter, an efficient algorithm is
proposed for obtaining an approximate solution to the problem in polynomial
time. This algorithm is mainly based on the Taylor approximation in conjunction
with semidefinite relaxation (SDR) which is solved by interiorpoint methods.
Moreover, we utilize the Gaussian randomization procedure to obtain a feasible
solution for the original problem. It is shown that by proper receiver design
the rateenergy region can be significantly enlarged compared to the state of
the art, while at the same time the receiver hardware costs is reduced by
utilizing less number of energy harvesting circuitry.

The degreesoffreedom (DoF) of the multiantenna threeway channel (3WC)
with an intermittent node is studied. Special attention is given to the impact
of adaptation. A nonadaptive transmission scheme based on interference
alignment, zeroforcing, and erasurechannel treatment is proposed, and its
corresponding DoF region is derived. Then, it is shown that this scheme
achieves the sumDoF of the intermittent channel, in addition to the DoF region
of the nonintermittent one. Thus, adaptation is not necessary from those
perspectives. To the contrary, it is shown that adaptation is necessary for
achieving the DoF region of the intermittent case. This is shown by deriving an
outer bound for the intermittent channel with nonadaptive encoding, and giving
a counterexample of an adaptive scheme which achieves DoF tuples outside this
bound. This highlights the importance of cooperation in this intermittent
network.

Channelreciprocity based key generation (CRKG) has gained significant
importance as it has recently been proposed as a potential lightweight security
solution for IoT devices. However, the impact of the attacker's position in
close range has only rarely been evaluated in practice, posing an open research
problem about the security of realworld realizations. Furthermore, this would
further bridge the gap between theoretical channel models and their
practiceoriented realizations. For security metrics, we utilize
crosscorrelation, mutual information, and a lower bound on secretkey
capacity. We design a practical setup of three parties such that the channel
statistics, although based on joint randomness, are always reproducible. We run
experiments to obtain channel states and evaluate the aforementioned metrics
for the impact of an attacker depending on his position. It turns out the
attacker himself affects the outcome, which has not been adequately regarded
yet in standard channel models.

A basic setup of a twotier network, where two mobile users exchange messages
with a multiantenna macrocell basestation, is studied from a rate perspective
subject to beamforming and power constraints. The communication is facilitated
by two femtocell basestations which act as relays as there is no direct link
between the macrocell basestation and the mobile users. We propose a scheme
based on physicallayer network coding and computeandforward combined with a
novel approach that solves the problem of beamformer design and power
allocation. We also show that the optimal beamformers are always a convex
combination of the channels between the macro and femtocell basestations. We
then establish the cutset bound of the setup to show that the presented scheme
almost achieves the capacity of the setup numerically.

A network of 3 nodes mutually communicating with each other is studied. This
multiway network is a suitable model for 3user devicetodevice
communications. The main goal of this paper is to characterize the capacity
region of the underlying Gaussian 3way channel (3WC) within a constant gap. To
this end, a capacity outer bound is derived using cutset bounds and
genieaided bounds. For achievability, the 3WC is first transformed into an
equivalent starchannel. This latter is then decomposed into a set of
`successive' subchannels, leading to a subchannel allocation problem. Using
backward decoding, interference neutralization, and known results on the
capacity of the starchannel relying of physicallayer network coding, an
achievable rate region for the 3WC is obtained. It is then shown that the
achievable rate region is within a constant gap of the developed outer bound,
leading to the desired capacity approximation. Interestingly, in contrast to
the Gaussian twoway channel (TWC), adaptation is necessary in the 3WC.
Furthermore, message splitting is another ingredient of the developed scheme
for the 3WC which is not required in the TWC. The two setups are, however,
similar in terms of their sumcapacity prelog which is equal to 2. Finally,
some interesting networks and their approximate capacities are recovered as
special cases of the 3WC, such as the cooperative BC and MAC.

Cloud radio access networks (CRAN) are a promising technology to enable the
ambitious vision of the fifth generation (5G) communication networks. In spite
of the potential benefits of CRAN, the operational costs are still a
challenging issue, mainly due to the centralized processing scheme and the
large number of operating remote radio head (RRH) connecting to the cloud. In
this work we consider a setup in which a CRAN is powered partially with a set
of renewable energy sources (RESs), our aim is to minimize the
processing/backhauling costs at the cloud centre as well as the transmission
power at the RRHs, while satisfying some user quality of service (QoS). This
problem is first formulated as a mixed integer non linear program (MINLP) with
a large number of optimization variables. The underlying NLP is nonconvex,
though we address this issue through reformulating the problem using the mean
squared error (MSE)rate relation. To account to the largescale of the
problem, we introduce slack variables to decompose the reformulated (MINLP) and
enable the application of a distributed optimization framework by using the
alternating direction method of multipliers (ADMM) algorithm.

Meeting the challenges of 5G demands better exploitation of the available
spectrum by allowing multiple parties to share resources. For instance, a
secondary unlicensed system can share resources with the cellular uplink of a
primary licensed system for an improved spectral efficiency. This induces
interference which has to be taken into account when designing such a system. A
simple yet robust strategy is treating interference as noise (TIN), which is
widely adapted in practice. It is thus important to study the capabilities and
limitations of TIN in such scenarios. In this paper, we study this scenario
modelled as Multiple Access Channel (MAC) interfered by a PointtoPoint (P2P)
channel. Here, we focus on rate maximization and power minimization problems
separately. We use improper Gaussian signaling (instead of proper) at the
transmitters to increase the design flexibility, which offers the freedom of
optimizing the transmit signal pseudovariance in addition to its variance.
Furthermore, we allow correlation among the transmitted signals over orthogonal
resource basis (i.e., time or frequency) for the purpose of optimal signaling
design over the extended channel. We formulate the rate maximization problem as
a semidefinite program, and use semidefinite relaxation (SDR) to obtain a
nearoptimal solution. Numerical optimizations show that, by improper Gaussian
signaling the achievable rates can be improved upto three times depending on
the strength of the interfering links. Furthermore, we observe significant
benefits in power consumption by improper Gaussian signaling with symbol
extensions compared to the traditional proper Gaussian signaling.
Interestingly, by minimizing sum power given the solution of the rate
maximization problem improves the energy efficiency significantly.

We study the problem of secure transmission over a Gaussian multiinput
singleoutput (MISO) two receiver channel with an external eavesdropper, under
the assumption that the state of the channel which is available to each
receiver is conveyed either perfectly ($P$) or with delay ($D$) to the
transmitter. Denoting by $S_1$, $S_2$, and $S_3$ the channel state information
at the transmitter (CSIT) of user 1, user 2, and eavesdropper, respectively,
the overall CSIT can then alternate between eight possible states, i.e.,
$(S_1,S_2,S_3) \in \{P,D\}^3$. We denote by $\lambda_{S_1 S_2 S_3}$ the
fraction of time during which the state $S_1S_2S_3$ occurs. Under these
assumptions, we first consider the Gaussian MISO wiretap channel and
characterize the secure degrees of freedom (SDoF). Next, we consider the
general multireceiver setup and characterize the SDoF region of fixed hybrid
states $PPD$, $PDP$, and $DDP$. We then focus our attention on the symmetric
case in which $\lambda_{PDD}=\lambda_{DPD}$. For this case, we establish bounds
on SDoF region. The analysis reveals that alternating CSIT allows synergistic
gains in terms of SDoF; and shows that, by opposition to encoding separately
over different states, joint encoding across the states enables strictly better
secure rates. Furthermore, we specialize our results for the two receivers
channel with an external eavesdropper to the twouser broadcast channel. We
show that, the synergistic gains in terms of SDoF by alternating CSIT is not
restricted to multireceiver wiretap channels; and, can also be harnessed under
broadcast setting.

Wireless nodes in future communication systems are expected to overcome three
barriers when compared to their transitional counterparts, namely to support
significantly higher data rates, have longlasting energy supplies and remain
fully operational in interferencelimited heterogeneous networks. This could be
achieved by providing three promising features, which are radio frequency (RF)
energy harvesting, improper Gaussian signaling and operating in fullduplex
communication mode, i.e., transmit and receive at the same time within the same
frequency band. In this paper, we consider these aspects jointly in a
multiantenna heterogeneous twotiernetwork. Thus, the users in the femtocell
are sharing the scarce resources with the cellular users in the macrocell and
have to cope with the interference from the macrocell base station as well as
the transmitter noise and residual selfinterference (RSI) due to imperfect
fullduplex operation. Interestingly enough, while these impairments are
detrimental from the achievable rate perspective, they are beneficial from the
energy harvesting aspect as they carry RF energy. In this paper, we consider
this natural tradeoff jointly and propose appropriate optimization problems
for beamforming and optimal resource allocation. Various receiver structures
are employed for both information detection (ID) and energy harvesting (EH)
capabilities. The paper aims at characterizing the tradeoff between the
achievable rates and harvested energies. Rate and energy maximization problems
are thoroughly investigated. Finally, the numerical illustrations demonstrate
the impact of the energy harvesting on the achievable rate performance.

A cloud radio access network (CRAN) is considered as a candidate to meet the
expectations of higher data rate de mands in wireless networks. In CRAN, low
energy base stations (BSs) are deployed over a small geography and are allowed
to connect to the cloud via finite capacity backhaul links where the
information is processed. A conventional CRAN, however, requires high capacity
backhaul links, since the requested files need to be transferred first from the
cloud to the BS before conveying them to the users. One approach to overcome
the limitations of the backhaul links is to introduce local storage caches at
the BSs, in which the popular files are stored locally in order to reduce the
load of the backhaul links. Furthermore, we utilize coded caching with the goal
to minimize the total network cost, i.e., the transmit power and the cost
associated with the backhaul links. The initial formulation of the optimization
problem for this model is nonconvex. We first reformulate and then convexify
the problem through some relaxation techniques. In comparison to the uncoded
caching at the BSs, our results highlight the benefits associated with coded
caching and show that it decreases the backhaul cost.

Fullduplex (FD) communication is regarded as a key technology in future 5G
and Internet of Things (IoT) systems. In addition to high data rate
constraints, the success of these systems depends on the ability to allow for
confidentiality and security. Secretkey agreement from reciprocal wireless
channels can be regarded as a valuable supplement for security at the physical
layer. In this work, we study the role of FD communication in conjunction with
secretkey agreement. We first introduce two complementary key generation
models for FD and halfduplex (HD) settings and compare the performance by
introducing the keyreconciliation function. Furthermore, we study the impact
of the so called probingreconciliation tradeoff, the role of a strong
eavesdropper and analyze the system in the high SNR regime. We show that under
certain conditions, the FD mode enforces a deteriorating impact on the
capabilities of the eavesdropper and offers several advantages in terms of
secretkey rate over the conventional HD setups. Our analysis reveals as an
interesting insight that perfect selfinterference cancellation is not
necessary in order to obtain performance gains over the HD mode.

This paper studies the problem of secure communication over broadcast
channels under the individual secrecy constraints. That is, the transmitter
wants to send two independent messages to two legitimate receivers in the
presence of an eavesdropper, while keeping the eavesdropper ignorant of each
message (i.e., the information leakage from each message to the eavesdropper is
made vanishing). Building upon CarleialHellman's secrecy coding, Wyner's
secrecy coding, the frameworks of superposition coding and Marton's coding
together with techniques such as rate splitting and indirect decoding,
achievable rate regions are developed. The proposed regions are compared with
those satisfying joint secrecy and without secrecy constraints, and the
individual secrecy capacity regions for special cases are characterized. In
particular, capacity region for the deterministic case is established, and for
the Gaussian model, a constant gap (i.e., 0.5 bits within the individual
secrecy capacity region) result is obtained. Overall, when compared with the
joint secrecy constraint, the results allow for tradingoff secrecy level and
throughput in the system.

We study the problem of secure transmission over a Gaussian twouser
multiinput singleoutput (MISO) broadcast channel under the assumption that
links connecting the transmitter to the two receivers may have unequal strength
statistically. In addition to this, the state of the channel to each receiver
is conveyed in a strictly causal manner to the transmitter. We focus on a two
state topological setting of strong v.s. weak links. Under these assumptions,
we first consider the MISO wiretap channel and establish bounds on generalized
secure degrees of freedom (GSDoF). Next, we extend this model to the twouser
MISO broadcast channel and establish inner and outer bounds on GSDoF region
with different topology states. The encoding scheme sheds light on the usage of
both resources, i.e., topology of the model and strictly causal channel state
information at the transmitter (CSIT); and, allows digitization and
multicasting of overheard side information, while transmitting confidential
message over the stronger link. Furthermore, for a special class of channels,
we show that the established bounds agree and so we characterize the sum GSDoF.

The $K$user MIMO multiway relay channel (Ychannel) consisting of $K$ users
with $M$ antennas each and a common relay node with $N$ antennas is studied in
this paper. Each user wants to exchange messages with all the other users via
the relay. A transmission strategy is proposed for this channel. The proposed
strategy is based on two steps: channel diagonalization and cyclic
communication. The channel diagonalization is applied by using zeroforcing
beamforming. After channel diagonalization, the channel is decomposed into
parallel subchannels. Cyclic communication is then applied, where signalspace
alignment for networkcoding is used over each subchannel. The proposed
strategy achieves the optimal DoF region of the channel if $N\leq M$. To prove
this, a new degreesoffreedom outer bound is derived. As a byproduct, we
conclude that the MIMO Ychannel is not separable, i.e., independent coding on
separate subchannels is not enough, and one has to code jointly over several
subchannels.

The impact of cooperation on interference management is investigated by
studying an elemental wireless network, the so called symmetric interference
relay channel (IRC), from a generalized degrees of freedom (GDoF) perspective.
This is motivated by the fact that the deployment of relays is considered as a
remedy to overcome the bottleneck of current systems in terms of achievable
rates. The focus of this work is on the regime in which the interference link
is weaker than the sourcerelay link in the IRC. Our approach towards studying
the GDoF goes through the capacity analysis of the linear deterministic IRC
(LDIRC). New upper bounds on the sumcapacity of the LDIRC based on
genieaided approaches are established. These upper bounds together with some
existing upper bounds are achieved by using four novel transmission schemes.
Extending the upper bounds and the transmission schemes to the Gaussian case,
the GDoF of the Gaussian IRC is characterized for the aforementioned regime.
This completes the GDoF results available in the literature for the symmetric
GDoF. It is shown that in the strong interference regime, in contrast to the
IC, the GDoF is not a monotonically increasing function of the interference
level.

DevicetoDevice (D2D) communication is envisioned to be an integral
component of 5G networks, and a technique for meeting the demand for high data
rates. In a cellular network, D2D allows not only direct communication between
users, but also device relaying. In this paper, a simple instance of
devicerelaying is investigated, and the impact of D2D on fairness among users
is studied. Namely, a cellular network consisting of two D2Denabled users and
a basestation (BS) is considered. Thus, the users who want to establish
communication with the BS can act as relays for each other's signals. While
this problem is traditionally considered in the literature as a multipleaccess
channel with cooperation in the uplink, and a broadcast channel with
cooperation in the downlink, we propose a different treatment of the problem as
a multiway channel. A simple communication scheme is proposed, and is shown to
achieve significant gain in terms of fairness (measured by the symmetric rate
supported) in comparison to the aforementioned traditional treatment.

Despite the simplicity of the scheme of treating interference as noise (TIN),
it was shown to be sumcapacity optimal in the Gaussian interference channel
(IC) with veryweak (noisy) interference. In this paper, the 2user IC is
altered by introducing an additional transmitter that wants to communicate with
one of the receivers of the IC. The resulting network thus consists of a
pointtopoint channel interfering with a multiple access channel (MAC) and is
denoted PIMAC. The sumcapacity of the PIMAC is studied with main focus on the
optimality of TIN. It turns out that TIN in its naive variant, where all
transmitters are active and both receivers use TIN for decoding, is not the
best choice for the PIMAC. In fact, a scheme that combines both time division
multiple access and TIN (TDMATIN) strictly outperforms the naiveTIN scheme.
Furthermore, it is shown that in some regimes, TDMATIN achieves the
sumcapacity for the deterministic PIMAC and the sumcapacity within a constant
gap for the Gaussian PIMAC. Additionally, it is shown that, even for veryweak
interference, there are some regimes where a combination of interference
alignment with power control and treating interference as noise at the receiver
side outperforms TDMATIN. As a consequence, on the one hand treating
interference as noise in a cellular uplink is approximately optimal in certain
regimes. On the other hand those regimes cannot be simply described by the
strength of interference.

This paper studies the problem of secure communication over the broadcast
channel with receiver side information under the lens of individual secrecy
constraints. That is, the transmitter wants to send two independent messages to
two receivers which have, respectively, the desired message of the other
receiver as side information, while keeping the eavesdropper ignorant of each
message (i.e., the information leakage from each message to the eavesdropper is
made vanishing). Building upon onetime pad, secrecy coding, and broadcasting
schemes, achievable rate regions are investigated, and the capacity region for
special cases of either a weak or strong eavesdropper (compared to both
legitimate receivers) are characterized. Interestingly, the capacity region for
the former corresponds to a line and the latter corresponds to a square with
missing corners; a phenomenon occurring due to the coupling between user's
rates. Moreover, the individual secrecy capacity region is also fully
characterized for the case where the eavesdropper's channel is deterministic.
In addition to discrete memoryless setup, Gaussian scenarios are studied. For
the Gaussian model, in addition to the strong and weak eavesdropper cases, the
capacity region is characterized for the low and high SNR regimes when the
eavesdropper's channel is stronger than one receiver but weaker than the other.
Remarkably, positive secure transmission rates are always guaranteed under the
individual secrecy constraint, unlike the case of the joint secrecy constraint
(i.e., the information leakage from both messages to the eavesdropper is made
vanishing). Thus, this notion of secrecy serves as an appropriate candidate for
trading off secrecy level and transmission rate; making secrecy more affordable
but still acceptable to the end user.