Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
The Lossless CEO Problem with Security Constraints
KTH, School of Electrical Engineering (EES), Communication Theory. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0002-9853-2608
KTH, School of Electrical Engineering (EES), Communication Theory. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
KTH, School of Electrical Engineering (EES), Communication Theory. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0001-9307-484X
KTH, School of Electrical Engineering (EES), Communication Theory. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0002-7926-5081
2013 (English)In: Proceedings of the 10th International Symposium on Wireless Communication Systems (ISWCS), VDE Verlag GmbH, 2013, -238 p.Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we investigate the problem of transmitting a remote information source to a single destination via multiple agents in the presence of an eavesdropper. The agents observe noisy versions of the source, then, compress and transmit their observations to the destination via noiseless rate-limited links. The destination should reconstruct the remote source based on the information received from the agents. The eavesdropper, with access to side information correlated with the source, can eavesdrop one of the links from the agents to the destination to obtain as much information as possible about the source. For this problem, we determine the rates at which the agents should transmit such that the destination can recover the source while the equivocation at the eavesdropper node is maximized. We derive inner and outer bounds on the compression-equivocation region. Furthermore, we obtain the compression-equivocation region in special cases where the bounds are tight.

Place, publisher, year, edition, pages
VDE Verlag GmbH, 2013. -238 p.
Series
Proceedings of the International Symposium on Wireless Communication Systems, ISSN 2154-0225
National Category
Communication Systems Telecommunications
Identifiers
URN: urn:nbn:se:kth:diva-124528Scopus ID: 2-s2.0-84903150325ISBN: 978-3-8007-3529-7 (print)OAI: oai:DiVA.org:kth-124528DiVA: diva2:636087
Conference
10th IEEE International Symposium on Wireless Communication Systems 2013, ISWCS 2013; Ilmenau, Germany, 27-30 August, 2013
Note

QC 20140826

Available from: 2013-07-08 Created: 2013-07-08 Last updated: 2017-03-24Bibliographically approved

Open Access in DiVA

No full text

Other links

ScopusIEEE Xplore

Authority records BETA

Naghibi, FarshadThobaben, RagnarSkoglund, Mikael

Search in DiVA

By author/editor
Naghibi, FarshadSalimi, SomayehThobaben, RagnarSkoglund, Mikael
By organisation
Communication TheoryACCESS Linnaeus Centre
Communication SystemsTelecommunications

Search outside of DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 155 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf