Next Article in Journal
A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology
Next Article in Special Issue
Beamforming and Antenna Grouping Design for the Multi-Antenna Relay with Energy Harvesting to Improve Secrecy Rate
Previous Article in Journal
Using Proven Reference Monitor Patterns for Security Evaluation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Super-Activation as a Unique Feature of Secure Communication in Malicious Environments

by
Rafael F. Schaefer
1,*,†,
Holger Boche
2,† and
H. Vincent Poor
3,†
1
Information Theory and Applications Chair, Technische Universität Berlin, 10587 Berlin, Germany
2
Institute of Theoretical Information Technology, Technische Universität München, 80333 Munich, Germany
3
Department of Electrical Engineering, Princeton University, Princeton, NJ 08544, USA
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Information 2016, 7(2), 24; https://doi.org/10.3390/info7020024
Submission received: 28 January 2016 / Revised: 25 April 2016 / Accepted: 27 April 2016 / Published: 12 May 2016
(This article belongs to the Special Issue Physical Layer Security in Wireless Networks)

Abstract

:
The wiretap channel models secure communication between two users in the presence of an eavesdropper who must be kept ignorant of transmitted messages. This communication scenario is studied for arbitrarily varying channels (AVCs), in which the legitimate users know only that the true channel realization comes from a pre-specified uncertainty set and that it varies from channel use to channel use in an arbitrary and unknown manner. This concept not only captures the case of channel uncertainty, but also models scenarios in which malevolent adversaries influence or jam the transmission of the legitimate users. For secure communication over orthogonal arbitrarily varying wiretap channels (AVWCs) it has been shown that the phenomenon of super-activation occurs; that is, there are orthogonal AVWCs, each having zero secrecy capacity, which allow for transmission with positive rate if they are used together. It is shown that for such orthogonal AVWCs super-activation is generic in the sense that whenever super-activation is possible, it is possible for all AVWCs in a certain neighborhood as well. As a consequence, a super-activated AVWC is robust and continuous in the uncertainty set, although a single AVWC might not be. Moreover, it is shown that the question of super-activation and the continuity of the secrecy capacity solely depends on the legitimate link. Accordingly, the single-user AVC is subsequently studied and it is shown that in this case, super-activation for non-secure message transmission is not possible making it a unique feature of secure communication over AVWCs. However, the capacity for message transmission of the single-user AVC is shown to be super-additive including a complete characterization. Such knowledge is important for medium access control and in particular resource allocation as it determines the overall performance of a system.

1. Introduction

The architecture of today’s communication systems is designed such that data encryption and error correction are clearly separated. Data encryption is based on cryptographic principles and usually implemented at higher layers which abstracts out the underlying communication channel as an ideal bit pipe. The error correction is performed at the physical layer by adding redundancy into the message bits in order to combat the noisy channel. Such separation based approaches have been the typical solution in current communication systems.
In recent years there has been a growing interest in complementary approaches that realize security directly at the physical layer. Such information theoretic approaches to security establish data confidentiality and reliable communication jointly at the physical layer by exploiting the noisy and imperfect nature of the communication channel. This line of thinking goes back to Wyner, who introduced the so-called wiretap channel in [1]. This area of research provides a promising approach to achieve secrecy and to embed secure communication into wireless networks. Not surprisingly, it has drawn considerable attention recently [2,3,4,5,6,7] and has also been identified by operators of communication systems and national agencies as a key technique to secure future communication systems [8,9,10].
These studies are in particular relevant for wireless communication systems as the open nature of the wireless medium makes such systems inherently vulnerable for eavesdropping: Transmitted signals are received not only by intended users, but also easily eavesdropped upon by non-legitimate receivers. A common assumption of many studies is that all channels to the intended receivers and also to the non-legitimate eavesdroppers are known perfectly to all users. However, practical systems will always be limited in the availability of channel state information (CSI) due to nature of the wireless medium but also due to practical limitations such as estimation/feedback inaccuracy. In addition to that, the assumption of knowing the eavesdropper’s channel is often hard to justify in practice since malevolent eavesdroppers will not share any information about their channels to make eavesdropping even harder. Accordingly, such approaches to security must incorporate imperfect CSI assumptions to yield practically meaningful insights. A recent survey on secure communication under channel uncertainty and adversarial attacks can be found in [11].
In this paper, we model the uncertainty in CSI by assuming arbitrarily varying channels (AVCs) [12,13,14]. This concept assumes that the actual channel realization is unknown; rather, it is only known that this realization is from a known uncertainty set and that it may vary in an arbitrary and unknown manner from channel use to channel use. The concept of AVCs provides a very general and powerful framework as it not only models the case of channel uncertainty, but also captures scenarios with malevolent adversaries who maliciously influence or jam the legitimate transmission.
Secure communication over AVCs is then modeled by the arbitrarily varying wiretap channel (AVWC) which has been studied in [15,16,17,18,19,20,21,22]. It has been shown that it makes a substantial difference whether unassisted or common randomness (CR) assisted codes are used by the transmitter and the legitimate receiver. Specifically, if the AVC to the legitimate receiver possesses the so-called symmetrizability property, then the unassisted secrecy capacity is zero, while the CR-assisted secrecy capacity may be positive. A complete characterization of how unassisted and CR-assisted secrecy capacity relate to each other is given in [16,21]. However, a single-letter characterization of the secrecy capacity itself remains open. Only a multi-letter description of the CR-assisted secrecy capacity has been recently established in [20].
Wireless communication systems are usually composed of orthogonal sub-systems such as those that arise via orthogonal frequency division multiplexing (OFDM) or time division multiplexing (TDM). And the important issue in such systems is how the available resources should be allocated to these orthogonal sub-systems. Common sense tells us that the overall capacity of such a system is given by the sum of the capacities of all orthogonal sub-systems. The inherent world view of the additivity of classical resources is also reflected by Shannon who conjectured in [23] the additivity of the zero error capacity for orthogonal discrete memoryless channels (DMCs). This was later restated by Lovász in ([24], Problem 2) and recently further highlighted in [25].
To this end, let us consider a system consisting of two orthogonal ordinary DMCs W 1 and W 2 . If both channels are accessed in an orthogonal way by using independent encoders and decoders, we obtain C ( W 1 ) + C ( W 2 ) as an achievable transmission rate, where C ( · ) denotes the capacity of the corresponding channel.
An interesting question is: Are there gains in capacity to be had by bonding the orthogonal channels and jointly accessing the resulting system W 1 W 2 by using a joint encoder and decoder? From the operational definition of the capacity it is clear that we have
C ( W 1 W 2 ) C ( W 1 ) + C ( W 2 )
since a joint use of both channels can only increase the capacity. However, it is known that the capacity of ordinary DMCs is additive under the average error criterion so that Equation (1) is actually satisfied with equality, i.e.,
C ( W 1 W 2 ) = C ( W 1 ) + C ( W 2 ) .
This means that joint encoding and decoding over orthogonal channels does not provide any gains in capacity and the overall capacity of an OFDM system is indeed given by the sum of the capacities of all orthogonal sub-channels.
Although this verifies what one usually would expect for the capacity of orthogonal channels, the question of additivity of the capacity function is in general by no means obvious or trivial to answer. As already mentioned, Shannon for example asked this question in 1956 for the zero error capacity [23]. He conjectured that the zero error capacity C 0 is additive, thus possessing the same behavior as ordinary DMCs: C 0 ( W 1 W 2 ) = C 0 ( W 1 ) + C 0 ( W 2 ) ; similar to Equation (2). This problem was subsequently studied by Haemers [26] and later by Alon [27] who explicitly constructed counter-examples. Thus, there exist channels for which the zero error capacity is strictly greater when encoding and decoding are done jointly instead of independently. This means that the zero error capacity is super-additive and there exist channels for which “≥” in Equation (1) can actually be replaced by “>” so that
C 0 ( W 1 W 2 ) > C 0 ( W 1 ) + C 0 ( W 2 )
holds. To date, only certain explicit examples are known that possess this property of super-additivity. A general characterization of which channels are super-additive or what further properties such channels possess remains open. In 1970 it was Ahlswede who showed that the capacity of the AVC under the maximum error criterion includes the characterization of the zero error capacity as a special case [28]. This is only one example demonstrating that Shannon’s question of additivity of the zero error capacity considerably influenced the research in discrete mathematics and graph theory, cf. for example ([29], Chapter 41). Thus, Shannon’s zero error capacity is closely related to AVCs, making it worth studying this question also from an AVC perspective.
The extreme case of non-additivity in Equation (1) occurs when for a system consisting of two orthogonal “useless” channels, i.e., having zero capacity C ( W 1 ) = C ( W 2 ) = 0 , it holds that C ( W 1 W 2 ) > 0 . This phenomenon is called super-activation: Two channels each with zero capacity can be used together to super-activate the whole system giving it a positive capacity. This phenomenon has been observed and studied in particular in the area of quantum information theory [30,31].
Very recently the phenomenon of super-activation has been observed for classical communication as well. Super-activation can occur for secure communication over AVCs and there exist orthogonal “useless” AVWCs, i.e., having zero secrecy capacity, whose overall secrecy capacity is strictly positive [17]. This phenomenon of super-activation and its resulting secrecy capacity have then been completely characterized in [21].
In this paper we further explore the phenomenon of super-activation for AVWCs and its contributions are as follows. After introducing the system model in Section 2, we show that super-activation is not an isolated phenomenon in the sense that whenever two AVWCs can be super-activated, this is also true for all AVWCs in a certain neighborhood. As a consequence, we show that the secrecy capacity of a super-activated AVWC is continuous in the underlying uncertainty set, although this might not be the case for one of the AVWCs itself. Furthermore, we show that the question of whether super-activation is possible or not depends only on the legitimate channel, making it independent of the eavesdropper channel. This is the content of Section 3.
From a super-activation and continuity perspective, the legitimate AVC is more important than the eavesdropper AVC. Accordingly, we subsequently study these issues for the single-user AVC in detail in Section 4. Surprisingly, this has not been done so far to the best of our knowledge and we show that super-activation is not possible for public message transmission, making this a unique phenomenon of secure communication over AVWCs. However, we show that the single-user AVC indeed possesses the property of super-additivity which means that a joint use of orthogonal AVCs can provide gains in capacity. With this we provide a complete characterization of super-additivity and super-activation for the capacity of a single-user AVC. Finally, a discussion is given in Section 5.

Notation

Discrete random variables are denoted by capital letters and their realizations and ranges by lower case and script letters, respectively; all logarithms and information quantities are taken to the base 2; X - Y - Z denotes a Markov chain of random variables X, Y, and Z in this order; P ( X ) is the set of all probability distributions on X ; the mutual information between the input random variable X and the output random variable Y of a channel W is denoted by I ( X ; Y ) = I ( P X , W ) , where the latter notation is interchangeably used to emphasize the dependence on the input distribution P X and the channel.

2. Arbitrarily Varying Wiretap Channels

In this section we introduce the problem of secure communication over arbitrarily varying channels [12,13,14]. Such channel conditions appear for example in fast fading environments but also, more importantly, in scenarios in which malevolent adversaries actively influence or jam the legitimate transmission. This is the AVWC [15,16,17,18,19,20,21,22] which is depicted in Figure 1.

2.1. System Model

The channel state may vary in an unknown and arbitrary manner from channel use to channel use and this uncertainty in CSI is modeled with the help of a finite state set S . Then the communication links to the legitimate receiver and the eavesdropper are given by stochastic matrices W : X × S P ( Y ) and V : X × S P ( Z ) with X the finite input alphabet and Y and Z the finite output alphabets at the legitimate receiver and eavesdropper respectively. We interchangeably also write W s : X P ( Y ) and V s : X P ( Z ) with s S .
For a fixed state sequence s n = ( s 1 , s 2 , . . . , s n ) S n of length n, the discrete memoryless channel to the legitimate receiver is given by W s n n ( y n | x n ) = W n ( y n | x n , s n ) = i = 1 n W ( y i | x i , s i ) for all input and output sequences x n X n and y n Y n .
Definition 1. 
The arbitrarily varying channel (AVC) W to the legitimate receiver is defined as the family of channels for all state sequences s n S n as
W = W s n n : s n S n .
We further need the definition of an averaged channel which is defined for any probability distribution q P ( S ) as
W ¯ q ( y | x ) = s S W ( y | x , s ) q ( s )
for all x X and y Y . An important property of an AVC is the so-called concept of symmetrizability as introduced next.
Definition 2. 
An AVC W is called symmetrizable if there exists a channel (stochastic matrix) σ : X P ( S ) such that
s S W ( y | x , s ) σ ( s | x ) = s S W ( y | x , s ) σ ( s | x )
holds for all x , x X and y Y .
Roughly speaking, symmetrizability means that the AVC can “simulate” a valid channel input which makes it impossible for the receiver to decide on the correct codeword sent by the transmitter. This can be seen by writing the left hand side of Equation (4) as W ˜ ( y | x , x ) = s S W ( y | x , s ) σ ( s | x ) . Now symmetrizability means that this channel is symmetric in both inputs x and x , i.e., W ˜ ( y | x , x ) = W ˜ ( y | x , x ) .
In a similar way we can define the channel to the eavesdropper. For fixed s n S n the discrete memoryless channel is given by V s n n ( z n | x n ) = V n ( z n | x n , s n ) = i = 1 n V ( z i | x i , s i ) . We also set V = { V s n n : s n S n } and V ¯ q ( z | x ) = s S V ( z | x , s ) q ( s ) for q P ( S ) .
Definition 3. 
The arbitrarily varying wiretap channel (AVWC) ( W , V ) is given by its marginal AVCs W and V with common input as
( W , V ) = { W s n n : s n S n } , { V s n n : s n S n } .
Finally, we need a concept to measure the distance between two channels. As in [22] we define the distance between two channels W 1 , W 2 : X P ( Y ) based on the total variation distance as
d ( W 1 , W 2 ) = max x X y Y | W 1 ( y | x ) - W 2 ( y | x ) | .
Now, this generalizes to a distance between two AVCs as follows. For two AVWCs W 1 and W 2 with finite state sets S 1 and S 2 we define uncertainty sets W 1 = { W s 1 : s 1 S 1 } and W 2 = { W s 2 : s 2 S 2 } . Then the distance between these two sets of channels is
d 1 ( W 1 , W 2 ) = max s 2 S 2 min s 1 S 1 d ( W s 1 , W s 2 ) d 2 ( W 1 , W 2 ) = max s 1 S 1 min s 2 S 2 d ( W s 1 , W s 2 )
so that the distance between the AVCs W 1 and W 2 is given as
D ( W 1 , W 2 ) = max d 1 ( W 1 , W 2 ) , d 2 ( W 1 , W 2 ) .
Roughly speaking, the distance D ( W 1 , W 2 ) between two AVCs W 1 and W 2 is given by the largest distance in Equation (5) between all possible channel realizations in the corresponding state sets.
The distance D ( V 1 , V 2 ) between two eavesdropper AVCs is defined accordingly so that the distance between two AVWCs ( W 1 , V 1 ) and ( W 2 , V 2 ) is finally given by
D ( ( W 1 , V 1 ) , ( W 2 , V 2 ) ) = max D ( W 1 , W 2 ) , D ( V 1 , V 2 ) .

2.2. Code Concepts

For communication over AVCs it makes a substantial difference whether unassisted (deterministic) or more sophisticated code concepts based on common randomness (CR) are used. Indeed, the unassisted capacity of an AVC can be zero, while the corresponding CR-assisted capacity is positive [12,13,14].

2.2.1. Unassisted Codes

Unassisted codes refer to codes whose encoder and decoder are pre-specified and fixed prior to the transmission as shown in Figure 1.
Definition 4. 
An unassisted ( n , M n ) -code C consists of a stochastic encoder at the transmitter
E : M P ( X n )
with a set of messages M = { 1 , . . . , M n } and a deterministic decoder at the legitimate receiver
φ : Y n M .
Remark 1. 
Since the encoder in Equation (6) and the decoder in Equation (7) are fixed prior to the transmission of the message, they must be universally valid for all possible state sequences s n S n simultaneously.
The average probability of error of such a code for a given state sequence s n S n is given by
e ¯ n ( s n ) = 1 | M | m M x n X n y n : φ ( y n ) m W n ( y n | x n , s n ) E ( x n | m ) .
The confidentiality of the message is ensured by requiring max s n S n I ( M ; Z s n n ) δ n for some δ n > 0 with M the random variable uniformly distributed over the set of messages M and Z s n n = ( Z s 1 , Z s 2 , . . . , Z s n ) the output at the eavesdropper for state sequence s n S n . This criterion is termed strong secrecy [32,33] and the reasoning is to control the total amount of information leaked to the eavesdropper. This yields the following definition.
Definition 5. 
A rate R S > 0 is an achievable secrecy rate for the AVWC ( W , V ) if for all τ > 0 there exists an n ( τ ) N , positive null sequences { λ n } n N , { δ n } n N , and a sequence of ( n , M n ) -codes { C n } n N such that for all n n ( τ ) we have 1 n log M n R S - τ ,
max s n S n e ¯ n ( s n ) λ n ,
and
max s n S n I ( M ; Z s n n ) δ n .
The unassisted secrecy capacity C S ( W , V ) of the AVWC ( W , V ) is given by the maximum of all achievable rates R S .
Unfortunately, it has been shown that unassisted codes with a pre-specified encoder and decoder will not work for symmetrizable channels, cf. Definition 2. Thus the unassisted capacity will be zero [14] and more sophisticated code concepts based on CR are needed.

2.2.2. CR-Assisted Codes

CR is a powerful coordination resource and can be realized for example based on a common synchronization procedure or a satellite signal. It is modeled by a random variable Γ which takes values in a finite set G n according to a distribution P Γ P ( G n ) . This enables the transmitter and the receiver to choose their encoder in Equation (6) and decoder in Equation (7) according to the actual realization γ G n as shown in Figure 2.
Definition 6. 
A CR-assisted ( n , M n , G n , P Γ ) -code C CR is given by a family of unassisted codes
C ( γ ) : γ G n
together with a random variable Γ taking values in G n with | G n | < according to P Γ P ( G n ) .
The reliability and secrecy constraints extend to CR-assisted codes in a natural way: The mean average probability of error is
e ¯ CR = max s n S n 1 | M | m M γ G n x n X n y n : φ γ ( y n ) m W n ( y n | x n , s n ) E γ ( x n | m ) P Γ ( γ )
where E γ and φ γ indicate that the encoder and decoder are chosen according to the CR realization γ G n . Accordingly, the secrecy criterion becomes
max s n S n γ G n I ( M ; Z s n , γ n ) P Γ ( γ ) δ n
where Z s n , γ n indicates that the observed output at the eavesdropper depends on the chosen encoder E γ , γ G n .
Remark 2. 
Note that the secrecy criterion Equation (8) can further be strengthened by requiring
max s n S n max γ G n I ( M ; Z s n , γ n ) δ n ,
i.e., the average over all CR in Equation (8) is replaced by the maximum. Surprisingly, this strengthening comes at no cost and does not decrease the secrecy capacity, cf. [20]. The stronger criterion has the advantage that it protects the message even in the scenario in which the eavesdropper is aware of the CR realization γ G n , cf. Figure 2.
Then the definitions of a CR-assisted achievable secrecy rate and the CR-assisted secrecy capacity C S , CR ( W , V ) of the AVWC ( W , V ) follow accordingly.

2.3. Capacity Results

There has been some work done in order to understand the secrecy capacity of the AVWC [15,16,17,18,19,20,21,22] which is briefly reviewed in the following. If CR is available, the transmitter and the legitimate receiver can coordinate their choice of encoder and decoder. This scenario has been studied in [15,16,17,18,20,22], but despite these efforts a single-letter characterization remains unknown to date (if it exists at all). Only a multi-letter description has been found in [20].
Theorem 1 
([20]). A multi-letter description of the CR-assisted secrecy capacity C S , CR ( W , V ) of the AVWC ( W , V ) is
C S , CR ( W , V ) = lim n 1 n max U - X n - ( Y ¯ q n , Z s n n ) min q P ( S ) I ( U ; Y ¯ q n ) - max s n S n I ( U ; Z s n n )
with Y ¯ q n the random variable associated with the output of the averaged channel W ¯ q n = s n S n q n ( s n ) W s n , q P ( S ) .
If CR is not available to the transmitter and legitimate receiver, unassisted codes must be used and the corresponding unassisted secrecy capacity has been completely characterized in terms of its CR-assisted secrecy capacity [16,21].
Theorem 2 
([16,21]). The unassisted secrecy capacity C S ( W , V ) of the AVWC ( W , V ) possesses the following symmetrizability properties:
  • If W is symmetrizable, then C S ( W , V ) = 0 .
  • If W is non-symmetrizable, then C S ( W , V ) = C S , CR ( W , V ) .
The unassisted secrecy capacity displays a dichotomous behavior similar to the capacity of the single-user AVC: The unassisted secrecy capacity C S ( W , V ) either equals its CR-assisted secrecy capacity C S , CR ( W , V ) or else is zero.
From Theorem 2 we see that it is only the symmetrizability of the legitimate AVC W that controls whether the unassisted secrecy capacity is zero or positive. However, it does not specify the sensitivity, meaning how rapidly the AVC W can change from symmetrizable to non-symmetrizable. This is addressed by the next result.
Theorem 3 
([21]). If the unassisted secrecy capacity C S ( W , V ) of the AVWC ( W , V ) satisfies C S ( W , V ) > 0 , then there is an ϵ > 0 such that for all AVWCs ( W , V ) satisfying D ( ( W , V ) , ( W , V ) ) ϵ we have C S ( W , V ) > 0 .
This result shows the stability of positivity of the unassisted secrecy capacity: Wherever it is positive, i.e., C S ( W , V ) > 0 , it remains positive in a certain neighborhood, i.e., C S ( W , V ) > 0 for D ( ( W , V ) , ( W , V ) ) ϵ . Thus, if the AVC W is non-symmetrizable, small changes in the uncertainty set will not make it symmetrizable.
To further explore the question of continuity for the AVWC, we need the function
F ( W ) = min σ : X P ( S ) max x x y Y | s S W ( y | x , s ) σ ( s | x ) - s S W ( y | x , s ) σ ( s | x ) | .
This function generalizes ideas from the concept of symmetrizability, cf. Definition 2. It is a continuous function of the legitimate AVC W and the AVC W is symmetrizable if and only if F ( W ) = 0 . This yields a characterization of when the unassisted secrecy capacity C S ( W , V ) is discontinuous: The AVC W changes from non-symmetrizable to symmetrizable and the capacity breaks down to zero.
That the unassisted secrecy capacity is indeed discontinuous has been observed in [22] for the first time by constructing a simple example of dimensions | X | = 2 , | Y | = 3 , and | S | = 2 . It is noteworthy that a state set consisting of two different states only is already sufficient to get a discontinuous behavior. From an adversarial point of view this means that two different strategies for the adversary suffice to break down the system. On the other hand, reducing the state set to have only one element, i.e., | S | = 1 , the AVWC becomes a compound wiretap channel [34,35,36] (as the state remains constant for the entire duration of transmission) and the corresponding secrecy capacity becomes continuous [22]. Subsequently, the discontinuous behavior was then completely characterized in [21].
Theorem 4 
([21]). The unassisted secrecy capacity C S ( W , V ) of the AVWC ( W , V ) possesses the following discontinuity properties:
  • The AVWC ( W , V ) is a discontinuity point of C S ( W , V ) if and only if the following holds: First, C S , CR ( W , V ) > 0 , and second, F ( W ) = 0 but for every ϵ > 0 there is a finite W with D ( W , W ) ϵ and F ( W ) > 0 .
  • If C S ( W , V ) is discontinuous in the point ( W , V ) then it is discontinuous for all V for which C S , CR ( W , V ) > 0 .
This result has the following important consequence: Since the second condition relates the question of discontinuity to the function F ( W ) and therewith solely to the symmetrizability of the legitimate AVC W , the unassisted secrecy capacity C S ( W , V ) is always a continuous function of the eavesdropper AVC V , while the discontinuity comes from the legitimate AVC W only.

3. Super-Activation and Robustness

Medium access control and in particular resource allocation is one of the most important issues for wireless communication systems as it determines the overall performance of a system. For example, the overall capacity of an OFDM system is given by the sum of the capacities of all orthogonal sub-channels. To this end, a system consisting of two orthogonal ordinary DMCs, where both are “useless” in the sense of having zero capacity, the capacity of the whole system is zero as well. This reflects the world view of classical additivity of resources in the sense that “ 0 + 0 = 0 .”
Recently, it was shown in [17] that the additivity of basic resources does not hold anymore for secure communication over AVCs. Specifically, it was demonstrated that two orthogonal AVWCs which are themselves useless can be used jointly to allow for secure transmission with positive rate, i.e., “ 0 + 0 > 0 .” This phenomenon of super-activation was then further studied in [21], which in particular provides a characterization of when super-activation is possible.

3.1. Secure Communication over Orthogonal AVWCs

To continue this line of research, we now introduce the corresponding system model in detail.
For finite state sets S i , input alphabets X i , and output alphabets Y i and Z i , i = 1 , 2 , we define two AVWCs ( W 1 , V 1 ) and ( W 2 , V 2 ) exactly as in Section 2.1, cf. Definitions 1 and 3. Then the parallel use of both AVWCs ( W 1 , V 1 ) and ( W 2 , V 2 ) creates a combined AVWC
( W ˜ , V ˜ ) = ( W 1 , V 1 ) ( W 2 , V 2 ) = ( W 1 W 2 , V 1 V 2 ) ,
where the notation ⊗ indicates the orthogonal use of ( W 1 , V 1 ) and ( W 2 , V 2 ) . Now, for given state sequences s n = ( s 1 n , s 2 n ) S 1 n × S 2 n , the discrete memoryless channel to the legitimate receiver is
W ˜ n ( y n | x n , s n ) = W 1 , s 1 n n ( y 1 n | x 1 n ) W 2 , s 2 n n ( y 2 n | x 2 n ) = W 1 n ( y 1 n | x 1 n , s 1 n ) W 2 n ( y 2 n | x 2 n , s 2 n ) = i = 1 n W 1 ( y 1 , i | x 1 , i , s 1 , i ) i = 1 n W 2 ( y 2 , i | x 2 , i , s 2 , i )
with x n = ( x 1 n , x 2 n ) X 1 n × X 2 n and y n = ( y 1 n , y 2 n ) Y 1 n × Y 2 n . Accordingly, the AVC W ˜ is then given by
W ˜ = W ˜ s n n : s n S 1 n × S 2 n = W 1 , s 1 n n W 2 , s 2 n n : s 1 n S 1 n , s 2 n S 2 n
and the AVWC ( W ˜ , V ˜ ) by
( W ˜ , V ˜ ) = { W ˜ s n n : s n S 1 n × S 2 n } , { V ˜ s n n : s n S 1 n × S 2 n }
with V ˜ the AVC to the eavesdropper defined accordingly as in Equation (11).
Note that a parallel use of both AVWCs ( W 1 , V 1 ) and ( W 2 , V 2 ) means that for each ( W i , V i ) we have individual encoders E i : M i P ( X i n ) and decoders φ i : Y i n M i , i = 1 , 2 , according to Definitions 4 and 6. On the other hand, a joint use of both AVWCs results in a joint encoder E : M P ( X 1 n × X 2 n ) and a joint decoder φ : Y 1 n × Y 2 n M .

3.2. Super-Activation of Orthogonal AVWCs

For orthogonal AVWCs as described above, the phenomenon of super-activation has been completely characterized in [21].
Theorem 5 
([21]). Let ( W 1 , V 1 ) and ( W 2 , V 2 ) be two orthogonal AVWCs. Then the following properties hold:
  • If C S ( W 1 , V 1 ) = C S ( W 2 , V 2 ) = 0 , then
    C S ( W 1 W 2 , V 1 V 2 ) > 0
    if and only if W 1 W 2 is non-symmetrizable and C S , CR ( W 1 W 2 , V 1 V 2 ) > 0 . If ( W 1 , V 1 ) and ( W 2 , V 2 ) can be super-activated it holds that
    C S ( W 1 W 2 , V 1 V 2 ) = C S , CR ( W 1 W 2 , V 1 V 2 ) .
  • If C S , CR shows no super-activation for ( W 1 , V 1 ) and ( W 2 , V 2 ) , then super-activation of C S can only happen if W 1 is non-symmetrizable and W 2 is symmetrizable and C S , CR ( W 1 , V 1 ) = 0 and C S , CR ( W 2 , V 2 ) > 0 . The statement is independent of the specific labeling.
  • There exist AVWCs that exhibit the behavior described by the second property.
To give some intuition into why super-activation can happen, let us consider the following scenario: Assume there are two orthogonal AVWCs each having zero unassisted secrecy capacity. To this end, assume that one of the unassisted secrecy capacities is zero because the corresponding legitimate AVC is symmetrizable and the other capacity is zero because the eavesdropper AVC is “stronger” than the legitimate AVC. Since the latter legitimate AVC supports a positive rate (although non-secure), it can be used to transmit information to the legitimate receiver (and eavesdropper) to generate CR. Then the legitimate users can use CR-assisted codes to achieve a positive CR-assisted secrecy rate.
Theorem 5 provides a complete characterization of when super-activation can happen. In the following, we want to further explore this phenomenon. To this end, we first show that super-activation is generic in the sense that whenever two orthogonal AVWCs can be super-activated, it is possible for all AVWCs in a certain neighborhood as well.
Theorem 6. 
Let ( W 1 , V 1 ) and ( W 2 , V 2 ) be two useless AVWCs that can be super-activated, i.e., C S ( W 1 , V 1 ) = C S ( W 2 , V 2 ) = 0 and C S ( W 1 W 2 , V 1 V 2 ) > 0 . Then there exists an ϵ > 0 such that for all useless AVWCs ( W 1 , V 1 ) and ( W 2 , V 2 ) with
D ( ( W i , V i ) , ( W i , V i ) ) < ϵ , i = 1 , 2 ,
we have
C S ( W 1 W 2 , V 1 V 2 ) > 0 ,
i.e., all channels in the neighborhood of ( W 1 , V 1 ) and ( W 2 , V 2 ) can be super-activated as well.
Proof. 
Let ( W 1 , V 1 ) and ( W 2 , V 2 ) be two useless orthogonal AVWCs that can be super-activated and let ( W 1 , V 1 ) and ( W 2 , V 2 ) be two useless AVWCs with D ( ( W i , V i ) , ( W i , V i ) ) < ϵ , i = 1 , 2 . Then it holds that
y 1 Y 1 y 2 Y 2 | W 1 ( y 1 | x 1 , s 1 ) W 2 ( y 2 | x 2 , s 2 ) - W 1 ( y 1 | x 1 , s 1 ) W 2 ( y 2 | x 2 , s 2 ) | = y 1 Y 1 y 2 Y 2 | W 1 ( y 1 | x 1 , s 1 ) W 2 ( y 2 | x 2 , s 2 ) - W 1 ( y 1 | x 1 , s 1 ) W 2 ( y 2 | x 2 , s 2 ) + W 1 ( y 1 | x 1 , s 1 ) W 2 ( y 2 | x 2 , s 2 ) - W 1 ( y 1 | x 1 , s 1 ) W 2 ( y 2 | x 2 , s 2 ) | y 1 Y 1 y 2 Y 2 | W 1 ( y 1 | x 1 , s 1 ) - W 1 ( y 1 | x 1 , s 1 ) W 2 ( y 2 | x 2 , s 2 ) | + y 1 Y 1 y 2 Y 2 | W 2 ( y 2 | x 2 , s 2 ) - W 2 ( y 2 | x 2 , s 2 ) W 1 ( y 1 | x 1 , s 1 ) | = y 1 Y 1 | W 1 ( y 1 | x 1 , s 1 ) - W 1 ( y 1 | x 1 , s 1 ) | + y 2 Y 2 | W 2 ( y 2 | x 2 , s 2 ) - W 2 ( y 2 | x 2 , s 2 ) | .
Since D ( ( W i , V i ) , ( W i , V i ) ) < ϵ , i = 1 , 2 , by assumption, we have
D ( ( W 1 W 2 , V 1 V 2 ) ) , ( W 1 W 2 , V 1 V 2 ) < 2 ϵ .
Now we can apply the stability result in Theorem 3. From this we know that for all AVWCs ( W ˜ , V ˜ ) with W ˜ : X 1 × X 2 × S 1 × S 2 P ( Y 1 × Y 2 ) and V ˜ : X 1 × X 2 × S 1 × S 2 P ( Z 1 × Z 2 ) and
D ( ( W 1 W 2 , V 1 V 2 ) , ( W ˜ , V ˜ ) ) < ϵ ˜
we have
C S ( W ˜ , V ˜ ) > 0 .
Now we choose ϵ in Equation (12) small such that 2 ϵ < ϵ ˜ holds. With this we obtain the desired positivity for all AVWCs ( W 1 , V 1 ) and ( W 2 , V 2 ) for which Equation (12) is satisfied. This completes the proof. ☐
This result shows that super-activation is not an isolated phenomenon of orthogonal AVWCs. In fact, whenever super-activation is possible for two AVWCs, it occurs for all AVWCs that are sufficiently close to them.
Corollary 1. 
Let ( W 1 , V 1 ) and ( W 2 , V 2 ) be two useless orthogonal AVWCs that can be super-activated. Then ( W 2 , V 2 ) super-activates all AVWCs ( W 1 , V 1 ) that are close enough to ( W 1 , V 1 ) .
Proof. 
The result follows immediately from Theorem 6. Note that we can even choose ϵ = ϵ ˜ in this case to obtain the desired result. ☐
The previous result of Theorem 6 can even be strengthened. This formulation is more involved than the previous one, but the advantage is that it reveals the following behavior: The AVC to the legitimate receiver is much more important than the AVC to the eavesdropper in terms of super-activation. Specifically, there is no need of an explicit requirement on the distance between the eavesdropper channels. We obtain the following result.
Theorem 7. 
Let ( W 1 , V 1 ) and ( W 2 , V 2 ) be two useless orthogonal AVWCs that can be super-activated. Then there exists an ϵ > 0 such that all useless orthogonal AVWCs ( W 1 , V 1 ) and ( W 2 , V 2 ) that satisfy
D ( W 1 , W 1 ) < ϵ , D ( W 2 , W 2 ) < ϵ ,
and
C S , CR ( W 1 W 2 , V 1 V 2 ) > 0 ,
can be super-activated as well.
Proof. 
We know that the combined AVC W 1 W 2 is non-symmetrizable, since otherwise super-activation would not be possible, cf. Theorem 5. Similarly as in the proof of Theorem 6 we can then show that D ( W 1 W 2 , W 1 W 2 ) < 2 ϵ holds. Next we consider the function F ( W 1 W 2 ) , cf. Equation (9). Since W 1 W 2 is non-symmetrizable, we have F ( W 1 W 2 ) > 0 . In addition, since the function F depends in a continuous way on the channel, for all AVCs W ˜ with W ˜ : X 1 × X 2 × S 1 × S 2 P ( Y 1 × Y 2 ) and D ( W 1 W 2 , W ˜ ) < ϵ ˜ we always have F ( W ˜ ) > 0 . Here we have to choose ϵ ˜ > 0 sufficiently small depending on W 1 W 2 . Since F ( W ˜ ) > 0 , the AVC W ˜ is non-symmetrizable and from Theorem 2 it follows that
C S ( W 1 W 2 , V 1 V 2 ) = C S , CR ( W 1 W 2 , V 1 V 2 ) > 0
which proves that these AVWCs can be super-activated. This completes the proof. ☐
In the following we briefly present an example in which super-activation is possible for all orthogonal AVWCs in a certain neighborhood. This example is based on an example given in ([22], Section V-C). This constructs suitable AVWCs, whose unassisted secrecy capacities are zero in a certain neighborhood, but who all can be super-activated to allow for secure communication at a positive rate.
Example 1. 
First, we construct an AVWC ( W * , V * ) with | X | = 2 , | Y | = 3 , | Z | = 2 , and | S | = 2 for which in a set of AVWCs ( W , V ) around this channel we always have C S , CR ( W * , V * ) > 0 and C S ( W , V ) = C S ( W * , V * ) = 0 . To do so, we define the legitimate AVC as W * = { W 1 * , W 2 * } with
W 1 * = 1 2 1 2 0 1 4 0 3 4 and W 2 * = 0 0 1 0 1 0
and the eavesdropper AVC as V * = { V * , V * } with
V * = 1 2 1 2 1 2 1 2 .
With this choice, the eavesdropper channel is fixed, while the legitimate channel allows appropriate variations. In particular, it is easy to show that W * is symmetrizable so that C S ( W * , V * ) = 0 but C S , CR ( W * , V * ) > 0 , cf. ([22], Section V-C). Further, for all AVWCs ( W , V ) with D ( W * , W ) < ϵ for some ϵ > 0 it holds that C S ( W * , V * ) = 0 but C S , CR ( W * , V * ) > 0 , cf. ([22], Theorem 6), which means that all AVWCs in a certain neighborhood have zero unassisted secrecy capacity. Now we can find another orthogonal AVWC ( W ˜ , V ˜ ) that super-activates the original AVWC ( W * , V * ) , but also all other AVWCs ( W , V ) with D ( W * , W ) < ϵ , cf. Corollary 1 and Theorem 7.
Remark 3. 
The previous considerations show that bonding of orthogonal resources can increase the performance significantly. Such bonding gains do not only appear if both unassisted secrecy capacities are equal to zero (super-activation), but also if only one of these is zero while the other one is positive (super-additivity). This follows by an easy adaptation of the discussion above.
Next we want to show that bonding of orthogonal resources reveals further effects and properties that are practically relevant. This is discussed in the following result.
Theorem 8. 
Let ( W 1 , V 1 ) and ( W 2 , V 2 ) be two useless orthogonal AVWCs that can be super-activated. Then the unassisted secrecy capacity C S ( W 1 W 2 , V 1 V 2 ) depends in a continuous way on the channels ( W 1 , V 1 ) and ( W 2 , V 2 ) with D ( W i , W i ) < ϵ , i = 1 , 2 . Here, ϵ depends only on the orthogonal AVCs W 1 and W 2 .
Proof. 
Since the AVWCs ( W 1 , V 1 ) and ( W 2 , V 2 ) can be super-activated, we know that C S ( W 1 W 2 , V 1 V 2 ) > 0 . Then we know that this is also true for all AVWCs ( W ˜ , V ˜ ) with W ˜ : X 1 × X 2 × S 1 × S 2 P ( Y 1 × Y 2 ) and V ˜ : X 1 × X 2 × S 1 × S 2 P ( Z 1 × Z 2 ) that are sufficiently close to ( W 1 , V 1 ) and ( W 2 , V 2 ) , cf. Theorem 3, so that
C S ( W ˜ , V ˜ ) = C S , CR ( W ˜ , V ˜ )
holds. Since C S , CR ( W ˜ , V ˜ ) is a continuous function, cf. [20,22], the desired result follows then from Theorem 6.
Remark 4. 
The unassisted secrecy capacity C S ( W 1 W 2 , V 1 V 2 ) need not necessarily be continuous in ( W 1 , V 1 ) or ( W 2 , V 2 ) . In particular, there are examples with a discontinuous behavior as discussed above.
Remark 5. 
We see that bonding of orthogonal resources can also lead to a more robust system which is continuous. On the other hand, for a single AVC such continuous behavior cannot be guaranteed in general.
In the following we briefly present an example that demonstrates these effects. This example is based on an example in ([22], Section V-A). This constructs suitable AVWCs, whose unassisted secrecy capacity is continuous after super-activation although the unassisted secrecy capacity of one AVWC itself has a discontinuity point.
Example 2. 
First, we construct an AVWC ( W ( λ ) , V ) for 0 λ 1 with | X | = 2 , | Y | = 3 , | Z | = 2 , and | S | = 2 , whose unassisted secrecy capacity has a discontinuity point. To do so, for 0 λ 1 we define the legitimate AVC as W ( λ ) = { W 1 ( λ ) , W 2 ( λ ) } with
W 1 ( λ ) = 1 0 0 0 λ 1 - λ and W 2 ( λ ) = λ 0 1 - λ 0 1 0
and the eavesdropper AVC as V = { V * , V * } with V * the useless channel as in (13) of Example 1. It can be shown that the unassisted secrecy capacity of the AVWC ( W ( λ ) , V ) has a discontinuity point at λ = 0 , i.e., we have C S ( W ( 0 ) , V ) = 0 , but lim λ 0 C S ( W ( 0 ) , V ) > 0 , cf. ([22], Theorem 4). Now we can find another orthogonal AVWC ( W ˜ , V ˜ ) that super-activates the original AVWC ( W ( λ ) , V ) . Then we know from Theorem 8 that the unassisted secrecy capacity of this super-activated AVWC is continuous.

4. Communication over Orthogonal AVCs

The previous results and in particular Theorem 7 have shown that super-activation of AVWCs is robust in the eavesdropper AVC. Specifically, it is sufficient to require the eavesdropper AVC to be such that the CR-assisted secrecy capacity of the corresponding AVWC is positive. Then this capacity is continuous in the eavesdropper AVC. As a consequence, the phenomenon of super-activation depends particularly on the legitimate AVC. Accordingly, it is interesting to drop the eavesdropper and the security requirement for a while and study reliable message transmission over single-user AVCs in more detail.

4.1. Capacity Results

The single-user AVC is given as in Section 2.1 by considering only the legitimate AVC between the transmitter and legitimate receiver. Reliable message transmission for the single-user AVC has been well studied and its capacity has been established for both unassisted [13,14] and CR-assisted [12] codes.
Theorem 9 
([12]). The CR-assisted capacity C CR ( W ) of the AVC W is
C CR ( W ) = max P X P ( X ) inf q P ( S ) I ( X ; Y ¯ q )
where Y ¯ q denotes the random variable associated with the output of the averaged channel W ¯ q , q P ( S ) , cf. Equation (3).
The unassisted capacity is then completely characterized in terms of its CR-assisted capacity.
Theorem 10 
([13,14]). The unassisted capacity C ( W ) of the AVC W is
C ( W ) = C CR ( W ) if W is non-symmetrizable 0 if W is symmetrizable .
To the best of our knowledge, reliable message transmission over orthogonal AVCs has not been studied previously. This is surprising as this is already implicitly addressed by Shannon’s question of the additivity of the zero error capacity [23]. Specifically, Ahlswede showed in [28] that the capacity of the AVC under the maximum error criterion includes the characterization of the zero error capacity as a special case. To this end, Alon’s example in [27] for the super-additivity of the capacity of reliable message transmission over orthogonal AVCs under the maximum error criterion can be seen as the first contribution towards understanding the behavior of the capacity of orthogonal AVCs. In the following, we completely characterize the behavior of the capacity of orthogonal AVCs for the average error criterion.

4.2. Additivity of CR-Assisted Capacity

We start with the CR-assisted capacity and show that it is additive. This means that the CR-assisted capacity of two orthogonal AVCs is the sum of its CR-assisted capacities.
Theorem 11. 
Let W 1 and W 2 be two orthogonal AVCs. Then the CR-assisted capacity is additive, i.e.,
C CR ( W 1 W 2 ) = C CR ( W 1 ) + C CR ( W 2 ) .
Proof. 
From the definition of capacity it follows immediately that
C CR ( W 1 W 2 ) C CR ( W 1 ) + C CR ( W 2 )
is satisfied since joint encoding and decoding over both AVCs can only increase the capacity compared to an individual encoding and decoding for both channels. Thus, to show equality in Equation (15) it remains to prove that the reversed inequality is also true, i.e., C CR ( W 1 W 2 ) C CR ( W 1 ) + C CR ( W 2 ) .
For the following argumentation it is beneficial to write the CR-assisted capacity in Equation (14) as
C CR ( W ) = max P X P ( X ) inf q P ( S ) I ( X ; Y ¯ q ) = max P X P ( X ) min q P ( S ) I ( P X , W ¯ q )
as the mutual information term is completely determined by the input distribution P X P ( X ) and the averaged channel W ¯ q , q P ( S ) , cf. Equation (3).
With this notation, the CR-assisted capacity of the combined AVC W 1 W 2 , cf. also Equations (10) and (11), is given by
C CR ( W 1 W 2 ) = max P X 1 X 2 P ( X 1 × X 2 ) min q 12 P ( S 1 × S 2 ) I ( P X 1 X 2 , W ¯ q 12 )
where W ¯ q 12 , q 12 P ( S 1 × S 2 ) , denotes the corresponding averaged channel.
Now, this mutual information quantity in Equation (17) is continuous, concave in P X 1 X 2 , and convex in W ¯ q 12 so that the order of max and min can be exchanged to obtain
C CR ( W 1 W 2 ) = min q 12 P ( S 1 × S 2 ) max P X 1 X 2 P ( X 1 × X 2 ) I ( P X 1 X 2 , W ¯ q 12 ) max P X 1 X 2 P ( X 1 × X 2 ) I ( P X 1 X 2 , W ¯ q ^ 1 q ^ 2 )
for some arbitrary but fixed q ^ 1 P ( S 1 ) and q ^ 2 P ( S 2 ) . In addition, we have
W ¯ q ^ 1 q ^ 2 ( y 1 , y 2 | x 1 , x 2 ) = s 1 S 1 q ^ 1 ( s 1 ) W 1 , s 1 ( y 1 | x 1 ) s 2 S 2 q ^ 2 ( s 2 ) W 2 , s 2 ( y 2 | x 2 ) = W ¯ 1 , q ^ 1 ( y 1 | x 1 ) W ¯ 2 , q ^ 2 ( y 2 | x 2 )
so that
W ¯ q ^ 1 q ^ 2 = W ¯ 1 , q ^ 1 W ¯ 2 , q ^ 2 .
Since for ordinary DMCs under the average error criterion we have additivity, it holds that
max P X 1 X 2 P ( X 1 × X 2 ) I ( P X 1 X 2 , W ¯ q ^ 1 q ^ 2 ) = max P X 1 P ( X 1 ) I ( P X 1 , W ¯ 1 , q ^ 1 ) + max P X 2 P ( X 2 ) I ( P X 2 , W ¯ 2 , q ^ 2 ) .
Since q ^ 1 P ( S 1 ) and q ^ 2 P ( S 2 ) are arbitrary, we obtain
C CR ( W 1 W 2 ) min q ^ 1 P ( S 1 ) , q ^ 2 P ( S 2 ) max P X 1 P ( X 1 ) I ( P X 1 , W ¯ 1 , q ^ 1 ) + max P X 2 P ( X 2 ) I ( P X 2 , W ¯ 2 , q ^ 2 ) = min q ^ 1 P ( S 1 ) max P X 1 P ( X 1 ) I ( P X 1 , W ¯ 1 , q ^ 1 ) + min q ^ 2 P ( S 2 ) max P X 2 P ( X 2 ) I ( P X 2 , W ¯ 2 , q ^ 2 ) = C CR ( W 1 ) + C CR ( W 2 )
where the last step follows again from the fact that the mutual information is concave in the input distribution and convex in the channel which allows an exchange of min and max.
Now the inequalities in Equations (16) and (18) establish the desired additivity of the CR-assisted capacity, thereby proving the result. ☐
This result shows that the CR-assisted capacity is always additive and therewith confirms Shannon’s conviction of the additivity of the capacity. The consequence is that joint encoding and decoding for both AVCs does not yield any gains in terms of CR-assisted capacity.

4.3. Super-Additivity of Unassisted Capacity

Next, we consider the unassisted capacity of two orthogonal AVCs.
Proposition 1. 
Let W 1 and W 2 be two orthogonal AVCs. If the unassisted capacities satisfy C ( W 1 ) > 0 and C ( W 2 ) > 0 , then the unassisted capacity is additive, i.e.,
C ( W 1 W 2 ) = C ( W 1 ) + C ( W 2 ) .
Proof. 
From the additivity of the CR-assisted capacity, cf. Theorem 11, we have
C ( W 1 W 2 ) C CR ( W 1 W 2 ) = C CR ( W 1 ) + C CR ( W 2 ) = C ( W 1 ) + C ( W 2 )
where the last equality follows from Theorem 10. On the other hand we have
C ( W 1 W 2 ) C ( W 1 ) + C ( W 2 ) = C CR ( W 1 ) + C CR ( W 2 ) = C CR ( W 1 W 2 ) = C ( W 1 W 2 )
where the first equality is again due to Theorem 10 since C ( W 1 ) > 0 and C ( W 2 ) > 0 , and the second equality follows from Theorem 11. Equations (20) and (21) yield the desired equality in Equation (19), thereby proving the result. ☐
Proposition 2. 
Let W 1 and W 2 be two orthogonal AVCs. If the unassisted capacities satisfy C ( W 1 ) = C ( W 2 ) = 0 , then the unassisted capacity is additive, i.e.,
C ( W 1 W 2 ) = C ( W 1 ) + C ( W 2 ) .
Proof. 
If C ( W 1 ) = C ( W 2 ) = 0 , then both AVCs are symmetrizable according to Definition 2. This means there exist stochastic matrices σ i : X i P ( S i ) , i = 1 , 2 , such that
s i S i W i ( y i | x i , s i ) σ i ( s i | x i ) = s i S i W i ( y i | x i , s i ) σ i ( s i | x i )
holds for all x i , x i X i and y i Y i , i = 1 , 2 .
Then, the AVC W 1 W 2 is symmetrizable as well and
s 1 S 1 s 2 S 2 W 1 ( y 1 | x 1 , s 1 ) W 2 ( y 2 | x 2 , s 2 ) σ 1 ( s 1 | x 1 ) σ 2 ( s 2 | x 2 ) = s 1 S 1 W 1 ( y 1 | x 1 , s 1 ) σ 1 ( s 1 | x 1 ) s 2 S 2 W 2 ( y 2 | x 2 , s 2 ) σ 2 ( s 2 | x 2 ) = s 1 S 1 W 1 ( y 1 | x 1 , s 1 ) σ 1 ( s 1 | x 1 ) s 2 S 2 W 2 ( y 2 | x 2 , s 2 ) σ 2 ( s 2 | x 2 ) = s 1 S 1 s 2 S 2 W 1 ( y 1 | x 1 , s 1 ) W 2 ( y 2 | x 2 , s 2 ) σ 1 ( s 1 | x 1 ) σ 2 ( s 2 | x 2 )
holds for all x i , x i X i and y i Y i , i = 1 , 2 . This implies that C ( W 1 W 2 ) = 0 as well which shows the additivity for this case as well as completing the proof. ☐
These two results show that when the unassisted capacities are both positive or both zero, the overall unassisted capacity is additive. In addition, from Proposition 2 it follows immediately that super-activation is not possible for reliable message transmission over orthogonal AVCs.
Corollary 2. 
Let W 1 and W 2 be two orthogonal AVCs. If the unassisted capacities satisfy C ( W 1 ) = C ( W 2 ) = 0 , then super-activation is not possible for the combined AVC W 1 W 2 .
Finally, the following result solves the remaining case for which the unassisted capacity is actually super-additive.
Theorem 12. 
Let W 1 and W 2 be two orthogonal AVCs. The unassisted capacity C ( W 1 W 2 ) is super-additive, i.e.,
C ( W 1 W 2 ) > C ( W 1 ) + C ( W 2 ) ,
if and only if either of W 1 or W 2 is symmetrizable and has a positive CR-assisted capacity.
Without loss of generality, let W 1 be symmetrizable; then
C ( W 1 W 2 ) = C CR ( W 1 ) + C ( W 2 ) > C ( W 1 ) + C ( W 2 ) = C ( W 2 ) .
Proof. 
First we show that if W 1 is symmetrizable and C CR ( W 1 ) > 0 , then the unassisted capacity C ( W 1 W 2 ) is super-additive. To do so, we use the idea of Ahlswede’s de-randomization [13]. Although CR is not available, CR-assisted codes can still be used if the transmitter is able to inform the receiver prior to the actual message transmission about which realization of encoder and decoder has to be used. From [13] we know that the amount of information that needs to be transmitted prior to transmission for this task is polynomial in the block length and therewith negligible for increasing block length.
Since W 2 is non-symmetrizable, we have C CR ( W 2 ) > 0 and therefore also C ( W 2 ) > 0 . This allows us to use the second AVC to transmit information to the receiver to make CR available for the first AVC W 1 . Then CR-assisted codes can be used for W 1 so that
C ( W 1 W 2 ) C CR ( W 1 ) + C ( W 2 ) = C CR ( W 1 ) + C CR ( W 2 ) = C CR ( W 1 W 2 )
is achievable. Since C ( W 1 W 2 ) C CR ( W 1 W 2 ) is obviously true, we have equality which means that we actually achieve
C ( W 1 W 2 ) = C CR ( W 1 W 2 )
which shows the super-additivity of C ( W 1 W 2 ) .
Next we show the other direction: If C ( W 1 W 2 ) is super-additive, i.e.,
C ( W 1 W 2 ) > C ( W 1 ) + C ( W 2 ) ,
then either W 1 or W 2 must be symmetrizable so that C ( W 1 ) = 0 or C ( W 2 ) = 0 .
Assume both unassisted capacities are strictly positive. Then from Theorem 10 it follows that C ( W 1 ) = C CR ( W 1 ) and C ( W 2 ) = C CR ( W 2 ) so that Equation (23) becomes
C ( W 1 W 2 ) > C CR ( W 1 ) + C CR ( W 2 ) = C CR ( W 1 W 2 )
where the last step follows from the additivity of the CR-assisted capacity, cf. Theorem 11. This contradicts C ( W 1 W 2 ) C CR ( W 1 W 2 ) which always holds. Accordingly, without loss of generality, we must have C ( W 1 ) = 0 . However, C CR ( W 1 ) > 0 must be true, since otherwise we would have
C ( W 1 W 2 ) > 0 + C CR ( W 2 ) = C CR ( W 1 W 2 )
which would be a contradiction. Thus, it must hold that C CR ( W 1 ) > 0 and C ( W 1 ) = 0 so that W 1 is symmetrizable, proving the desired result. ☐
This result shows that the capacity of reliable message transmission over orthogonal AVCs is super-additive under certain circumstances. This breaks with the world view of classical additivity of resources.
Note that Example 1 discussed in Section 3.2 provides an AVC with | S | = 2 , which exactly displays the behavior characterized above. Interestingly, if the state set is reduced to | S | = 1 , such a behavior is not possible anymore.

5. Discussion

In this paper, we have studied communication under arbitrarily varying channel conditions. For the case of public message transmission over orthogonal AVCs we have completely characterized the behavior of the unassisted and CR-assisted capacity. While the CR-assisted capacity is additive, the unassisted capacity is super-additive, which means that there are orthogonal AVCs for which joint encoding and decoding results in a higher capacity than individual encoding and decoding.
If secrecy requirements are imposed on the message transmission, the capacity behavior for orthogonal AVWCs becomes even more involved. In this case, the phenomenon of super-activation occurs. A joint use of two completely useless AVWCs, i.e., with zero unassisted secrecy capacity, can result in a combined AVWC whose unassisted secrecy capacity is non-zero. From a practical point of view this has important consequences for medium access control and in particular for resource allocation.
The problem of reliable communication over AVCs is closely related to Shannon’s zero error capacity problem, as the latter turns out to be a special case of the capacity of the AVC under the maximum error criterion. Shannon conjectured in 1956 that the zero error capacity is additive. Accordingly, the phenomena of super-additivity and super-activation for AVCs and AVWCs respectively are remarkable as these properties show the non-additivity of the capacity of the AVC.
The phenomenon of super-activation has substantial consequences for jamming strategies of potential adversaries. Let us assume that there are two orthogonal AVWCs that can be super-activated. Further assume that for each AVWC an adversary has a suitable jamming strategy to drive the unassisted secrecy capacity to zero. In more detail, for each AVWC the adversary can choose a corresponding state sequence that symmetrizes the legitimate AVC, prohibiting any reliable communication between transmitter and legitimate receiver. Now, joint encoding and decoding allows super-activation of the combined AVWC to make the communication robust: They can now transmit at a positive secrecy rate. This means that for the adversary there is no suitable jamming strategy for the combined AVWC although there is one for each AVWC individually. As there are no restrictions on the strategy space of the adversary, this includes even the case of a product strategy consisting of both individually working jamming strategies.
Super-activation is not an isolated phenomenon. We have shown that whenever orthogonal AVWCs can be super-activated, this is also true for all AVWCs in a certain neighborhood. As a consequence the overall system becomes stable as well. If a super-activated AVWC allows for secure communication with a positive rate, then this is true for all AVWCs sufficiently close to this super-activated AVWC.
Finally we want to note that this also has a game-theoretic interpretation of a “game against nature” [37]. The legitimate users (player) and the adversary (nature) play a two-player zero-sum game [38,39] with the secure communication rate as the payoff function. In this game, the set of state sequences corresponds to nature’s action space, and nature’s intention is to establish the worst possible communication conditions by selecting the state sequence such that the legitimate AVC becomes symmetrizable. The set of input distributions corresponds to the action space of the player and, clearly, the aim is to maximize the secure communication rate. Within this game against nature framework, the player and nature move simultaneously without knowing the other’s choice which leads to the max min expressions in the corresponding secrecy capacity results.

Acknowledgments

Holger Boche would like to thank John F. Nash, Jr. for the discussions they had about game theory, equilibrium concepts, and the application of such concepts to communication systems. He would further like to thank Damian Dudek for the numerous discussions they had about physical layer security under practically relevant communication constraints and his insistence on elaborating the differences between public and secure message transmission. The authors would also like to thank Eduard A. Jorswieck and Carsten Janda for insightful discussions and suggestions. The work of H. Vincent Poor was supported in part by the U. S. National Science Foundation under Grant CMMI-1435778.

Author Contributions

All authors contributed equally to this work. All authors have read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  2. Liang, Y.; Poor, H.V.; Shamai, S. Information theoretic security. Found. Trends Commun. Inf. Theory 2009, 5, 355–580. [Google Scholar] [CrossRef]
  3. Liu, R.; Trappe, W. (Eds.) Securing Wireless Communications at the Physical Layer; Springer: New York, NY, USA, 2010.
  4. Jorswieck, E.A.; Wolf, A.; Gerbracht, S. Secrecy on the physical layer in wireless networks. In Trends in Telecommunications Technologies; Intech: Rijeka, Croatia, 2010; pp. 413–435. [Google Scholar]
  5. Bloch, M.; Barros, J. Physical-Layer Security: From Information Theory to Security Engineering; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
  6. Zhou, X.; Song, L.; Zhang, Y. (Eds.) Physical Layer Security in Wireless Communications; CRC Press: Boca Raton, FL, USA, 2013.
  7. Schaefer, R.F.; Boche, H. Physical layer service integration in wireless networks—Signal processing challenges. IEEE Signal Process. Mag. 2014, 31, 147–156. [Google Scholar] [CrossRef]
  8. Deutsche Telekom AG Laboratories. Next generation mobile networks: (R)evolution in mobile communications. Technology Radar Edition III/2010, Feature Paper. 2010. Available online: http://www.lti.ei.tum.de/fileadmin/w00bgd/www/pdf/2010-III_Feature_Paper_Next-Generation-Mobile-Networks_final.pdf (accessed on 28 April 2016).
  9. Helmbrecht, U.; Plaga, R. New challenges for IT-security research in ICT. In World Federation of Scientists International Seminars on Planetary Emergencies; World Scientific: Singapore, 2008; pp. 1–6. [Google Scholar]
  10. Fettweis, G.; Boche, H.; Wiegand, T.; Zielinksi, E.; Schotten, H.; Merz, P.; Hirche, S.; Festag, A.; Häffner, W.; Meyer, M.; et al. The Tactile Internet; Technology Watch Report of ITU (International Telecommunication Union): Geneva, Switzerland, 2014. [Google Scholar]
  11. Schaefer, R.F.; Boche, H.; Poor, H.V. Secure communication under channel uncertainty and adversarial attacks. Proc. IEEE 2015, 102, 1796–1813. [Google Scholar] [CrossRef]
  12. Blackwell, D.; Breiman, L.; Thomasian, A.J. The capacities of certain channel classes under random coding. Ann. Math. Stat. 1960, 31, 558–567. [Google Scholar] [CrossRef]
  13. Ahlswede, R. Elimination of correlation in random codes for arbitrarily varying channels. Z. Wahrscheinlichkeitstheorie Verw. Gebiete 1978, 44, 159–175. [Google Scholar] [CrossRef]
  14. Csiszár, I.; Narayan, P. The capacity of the arbitrarily varying channel revisited: Positivity, constraints. IEEE Trans. Inf. Theory 1988, 34, 181–193. [Google Scholar] [CrossRef]
  15. MolavianJazi, E.; Bloch, M.; Laneman, J.N. Arbitrary jamming can preclude secure communication. In Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, 30 September–2 October 2009; pp. 1069–1075.
  16. Bjelaković, I.; Boche, H.; Sommerfeld, J. Capacity results for arbitrarily varying wiretap channels. In Information Theory, Combinatorics, and Search Theory; Springer: Berlin/Heidelberg, Germany, 2013; pp. 123–144. [Google Scholar]
  17. Boche, H.; Schaefer, R.F. Capacity results and super-activation for wiretap channels with active wiretappers. IEEE Trans. Inf. Forensics Secur. 2013, 8, 1482–1496. [Google Scholar] [CrossRef]
  18. Boche, H.; Schaefer, R.F.; Poor, H.V. On arbitrarily varying wiretap channels for different classes of secrecy measures. In Proceedings of the IEEE International Symposium on Information Theory, Honolulu, HI, USA, 29 June–4 July 2014; pp. 2376–2380.
  19. Janda, C.R.; Scheunert, C.; Jorswieck, E.A. Wiretap-channels with constrained active attacks. In Proceedings of the Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, 2–5 November 2014; pp. 1984–1988.
  20. Wiese, M.; Nötzel, J.; Boche, H. A channel under simultaneous jamming and eavesdropping attack—Correlated random coding capacities under strong secrecy criteria. 2015. [Google Scholar]
  21. Nötzel, J.; Wiese, M.; Boche, H. The arbitrarily varying wiretap channel—Secret randomness, stability and super-activation. In Proceedings of 2015 IEEE International Symposium on Information Theory, Hong Kong, China, 14–19 June 2015; pp. 2151–2155.
  22. Boche, H.; Schaefer, R.F.; Poor, H.V. On the continuity of the secrecy capacity of compound and arbitrarily varying wiretap channels. IEEE Trans. Inf. Forensics Secur. 2015, 12, 2531–2546. [Google Scholar] [CrossRef]
  23. Shannon, C.E. The zero error capacity of a noisy channel. IRE Trans. Inf. Theory 1956, 2, 8–19. [Google Scholar] [CrossRef]
  24. Lovász, L. On the Shannon capacity of a graph. IEEE Trans. Inf. Theory 1979, 25, 1–7. [Google Scholar] [CrossRef]
  25. Ahlswede, A.; Althöfer, I.; Deppe, C.; Tamm, U. (Eds.) Rudolf Ahlswede’s Lectures on Information Theory 3—Hiding Data: Selected Topics; Springer: Cham, Switzerland, 2016.
  26. Haemers, W. On some problems of Lovász concerning the Shannon capacity of a graph. IEEE Trans. Inf. Theory 1979, 25, 231–232. [Google Scholar] [CrossRef]
  27. Alon, N. The Shannon capacity of a union. Combinatorica 1998, 18, 301–310. [Google Scholar] [CrossRef]
  28. Ahlswede, R. A note on the existence of the weak capacity for channels with arbitrarily varying channel probability functions and its relation to Shannon’s zero error capacity. Ann. Math. Stat. 1970, 41, 1027–1033. [Google Scholar] [CrossRef]
  29. Aigner, M.; Ziegler, G.M. Proofs from THE BOOK, 5th ed.; Springer: Berlin/Heidelberg, Germany, 2014. [Google Scholar]
  30. Smith, G.; Smolin, J.A.; Yard, J. Quantum communication with Gaussian channels of zero quantum capacity. Nat. Photonics 2011, 5, 624–627. [Google Scholar] [CrossRef]
  31. Giedke, G.; Wolf, M.M. Quantum communication: Super-activated channels. Nat. Photonics 2011, 5, 578–580. [Google Scholar] [CrossRef]
  32. Csiszár, I. Almost independence and secrecy capacity. Probl. Pered. Inform. 1996, 32, 48–57. [Google Scholar]
  33. Maurer, U.M.; Wolf, S. Information-theoretic key agreement: From weak to strong secrecy for free. In Advances in Cryptology — EUROCRYPT 2000; Springer: Berlin/Heidelberg, Germany, 2000; Volume 1807, pp. 351–368. [Google Scholar]
  34. Liang, Y.; Kramer, G.; Poor, H.V.; Shamai, S. Compound wiretap channels. EURASIP J. Wirel. Commun. Netw. 2009. [Google Scholar] [CrossRef]
  35. Bjelaković, I.; Boche, H.; Sommerfeld, J. Secrecy results for compound wiretap channels. Probl. Inf. Transm. 2013, 49, 73–98. [Google Scholar] [CrossRef]
  36. Schaefer, R.F.; Loyka, S. The secrecy capacity of compound MIMO Gaussian channels. IEEE Trans. Inf. Theory 2015, 61, 5535–5552. [Google Scholar] [CrossRef]
  37. Milnor, J. Games against Nature; RAND Corporation: Santa Monica, CA, USA, 1951; pp. 49–59. [Google Scholar]
  38. Aumann, R.J.; Hart, S. Handbook of Game Theory with Economic Applications; Elsevier: Oxford, UK, 1994; Volume 2. [Google Scholar]
  39. Basar, T.; Olsder, G.J. Dynamic Noncooperative Game Theory, 2nd ed.; SIAM: New York, NY, USA, 1999. [Google Scholar]
Figure 1. Arbitrarily varying wiretap channel. The transmitter encodes the message M into the codeword X n = E ( M ) and transmits it over the AVWC to the legitimate receiver, which has to decode its intended message M ^ = φ ( Y s n n ) for any state sequence s n S n . At the same time, the eavesdropper must be kept ignorant of M by requiring max s n S n I ( M ; Z s n n ) δ n .
Figure 1. Arbitrarily varying wiretap channel. The transmitter encodes the message M into the codeword X n = E ( M ) and transmits it over the AVWC to the legitimate receiver, which has to decode its intended message M ^ = φ ( Y s n n ) for any state sequence s n S n . At the same time, the eavesdropper must be kept ignorant of M by requiring max s n S n I ( M ; Z s n n ) δ n .
Information 07 00024 g001
Figure 2. CR is available to all users including the eavesdropper. The transmitter and receiver can adapt their encoder and decoder according to the actual CR realization γ G n .
Figure 2. CR is available to all users including the eavesdropper. The transmitter and receiver can adapt their encoder and decoder according to the actual CR realization γ G n .
Information 07 00024 g002

Share and Cite

MDPI and ACS Style

Schaefer, R.F.; Boche, H.; Poor, H.V. Super-Activation as a Unique Feature of Secure Communication in Malicious Environments. Information 2016, 7, 24. https://doi.org/10.3390/info7020024

AMA Style

Schaefer RF, Boche H, Poor HV. Super-Activation as a Unique Feature of Secure Communication in Malicious Environments. Information. 2016; 7(2):24. https://doi.org/10.3390/info7020024

Chicago/Turabian Style

Schaefer, Rafael F., Holger Boche, and H. Vincent Poor. 2016. "Super-Activation as a Unique Feature of Secure Communication in Malicious Environments" Information 7, no. 2: 24. https://doi.org/10.3390/info7020024

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop