End-to-End Secure Multi-Hop Communication with Untrusted Relays

被引:41
|
作者
He, Xiang [1 ]
Yener, Aylin [1 ]
机构
[1] Penn State Univ, Dept Elect Engn, University Pk, PA 16802 USA
基金
美国国家科学基金会;
关键词
Information theoretic secrecy; nested lattice code; line network; untrusted relays; BROADCAST CHANNELS; CAPACITY; INTERFERENCE;
D O I
10.1109/TWC.2012.120412.101358
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A multi-hop line network is considered, where each node can receive signals transmitted by its two neighbors. As such, the model embodies both the interference and broadcast aspects of wireless networks. The leftmost node wishes to send messages to the rightmost node, while keeping these messages confidential from all the intermediate relay nodes. In this setting where any or all of the relay nodes can be eavesdroppers, it is shown that end-to-end secure and reliable communication is possible. Notably, it is shown that an end-to-end secrecy rate that is independent of the number of hops, i.e., intermediate eavesdroppers, is achievable by means of a carefully designed transmission schedule, compute-and-forward relaying and coding strategy utilizing nested lattice codes. The achievable rate obtained indicates that imposing secrecy constraints penalizes the capacity by at most 1 bit per channel use. Therefore, it is concluded that information theoretic secrecy can be guaranteed for this model irrespective of eavesdropping relays and a fixed modest cost for the end-to-end rate.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 50 条
  • [1] End-to-end Secure Multi-hop Communication with Untrusted Relays is Possible
    He, Xiang
    Yener, Aylin
    [J]. 2008 42ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-4, 2008, : 681 - 685
  • [2] A Secure Communicating While Jamming Approach for End-to-End Multi-Hop Wireless Communication Network
    Ma, Xiao
    Li, Dan
    Wang, Liang
    Han, Weijia
    Zhao, Nan
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (03) : 833 - 846
  • [3] On End-to-End Delay of Multi-hop Wireless Networks
    Jiao, Wanguo
    Sheng, Min
    Zhang, Yan
    Lui, King-Shan
    [J]. 2013 IEEE 77TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2013,
  • [4] Multi-Hop Relaying: An End-to-End Delay Analysis
    Chaaban, Anas
    Sezgin, Aydin
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (04) : 2552 - 2561
  • [5] Convolutional End-to-End Memory Networks for Multi-Hop Reasoning
    Yang, Xiaoqing
    Fan, Pingzhi
    [J]. IEEE ACCESS, 2019, 7 : 135268 - 135276
  • [6] End-to-end performance characterization of sensornet multi-hop routing
    Mohan, A
    Hong, W
    Gay, D
    Buonadonna, P
    Mainwaring, A
    [J]. INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES 2005, PROCEEDINGS, 2005, : 27 - 36
  • [7] Performance Analysis for End-to-End Channel System with Lossy Communication of Multi-hop Wireless Networks
    Yan, Guofeng
    Wang, Jianxin
    Zhang, Xi
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [8] End-to-End Antenna Selection Strategies for Multi-Hop Relay Channels
    Vaze, Rahul
    Heath, Robert W., Jr.
    [J]. 2008 42ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-4, 2008, : 1506 - 1510
  • [9] Complexity Reduction for Multi-hop Network End-to-End Delay Minimization
    Gurcan, Mustafa
    Ma, Irina
    Ab Ghani, Hadhrami
    He, Zhenfeng
    [J]. COMPUTER AND INFORMATION SCIENCES II, 2012, : 231 - 237
  • [10] Composable end-to-end security of Gaussian quantum networks with untrusted relays
    Ghalaii, Masoud
    Papanastasiou, Panagiotis
    Pirandola, Stefano
    [J]. NPJ QUANTUM INFORMATION, 2022, 8 (01)