Achievable Secrecy Rates for Relay-Eavesdropper Channel Based on the Application of Noisy Network Coding

被引:6
|
作者
Xu, Peng [1 ]
Ding, Zhiguo [2 ]
Dai, Xuchu [3 ]
机构
[1] Chongqing Univ Posts & Telecommun, Key Lab Mobile Commun Technol, Chongqing 400065, Peoples R China
[2] Univ Lancaster, Sch Comp & Commun, Lancaster LA1 4WA, England
[3] Univ Sci & Technol China, Sch Informat Sci & Technol, Chinese Acad Sci, Key Lab Wireless Opt Commun, Hefei 230026, Anhui, Peoples R China
基金
欧盟地平线“2020”; 英国工程与自然科学研究理事会; 中国国家自然科学基金;
关键词
Information theoretic secrecy; interference; noisy network coding; relay-eavesdropper channel; OPTIMAL POWER ALLOCATION; CONFIDENTIAL MESSAGES; BROADCAST CHANNELS; MULTIPLE-ACCESS; WIRETAP CHANNELS; RATE REGIONS; AF RELAY; INTERFERENCE; CAPACITY; COMMUNICATION;
D O I
10.1109/TIFS.2018.2805601
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we consider the design of a new secure transmission scheme for a four-node relay-eavesdropper channel, where user cooperation is used to facilitate secure communications. The key idea of the proposed achievable scheme is to apply the compression relaying concept of noisy network coding (NNC) to the secrecy communication scenario. But different from the original non-secrecy NNC, the compression rate at the relay is adaptively chosen according to the eavesdropping channel. Particularly, helping interference information is injected into the compression codebook at the relay by simply enlarging the compression rate, which is to effectively suppress the eavesdropping channel. Closed-form expressions of the secrecy rates achieved by the proposed NNC-based secure scheme are characterized for both the discrete memoryless and Gaussian relay-eavesdropper channels, where the optimal compression rate and the optimal transmit power at the relay are also determined. The proposed secure scheme can be viewed as a general framework, which naturally combines the NNC compression relaying scheme with the interference-assisted scheme. Analytical and numerical results demonstrate that the proposed secure scheme offers constant performance gains over typical existing cooperative secure schemes.
引用
收藏
页码:1736 / 1751
页数:16
相关论文
共 50 条
  • [1] An Improved Achievable Secrecy Rate for the Relay-Eavesdropper Channel
    Xu, Peng
    Ding, Zhiguo
    Dai, Xuchu
    Leung, Kin K.
    [J]. 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 2440 - 2445
  • [2] Cooperative secrecy: The relay-eavesdropper channel
    Lai, Lifeng
    El Gamal, Hesham
    [J]. 2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 931 - 935
  • [3] The relay-eavesdropper channel: Cooperation for secrecy
    Lai, Lifeng
    El Gamal, Hesham
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (09) : 4005 - 4019
  • [4] Secrecy on a Gaussian Relay-Eavesdropper Channel with a Trusted Relay
    Hu, Keke
    Zhang, Xiaohui
    Wang, Yongming
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 108 - 125
  • [5] A Hybrid Cooperative Coding Scheme for the Relay-Eavesdropper Channel
    Xu, Peng
    Ding, Zhiguo
    Dai, Xuchu
    [J]. ENTROPY, 2014, 16 (03): : 1819 - 1841
  • [6] Secrecy Rate Optimization for Wireless Relay-Eavesdropper Channel with Energy Harvesting Constraints
    Jiang, Xue
    Lei, Wei-jia
    Zuo, Li-jie
    Xie, Xian-zhong
    [J]. INTERNATIONAL ACADEMIC CONFERENCE ON THE INFORMATION SCIENCE AND COMMUNICATION ENGINEERING (ISCE 2014), 2014, : 524 - 529
  • [7] Optimal Resource Allocation of Orthogonal Relay-eavesdropper Channel
    Chen Ying
    Deng Zhixiang
    Wang Bao-yun
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [8] Secure Transmission for Relay-Eavesdropper Channels Using Polar Coding
    Duo, Bin
    Wang, Peng
    Li, Yonghui
    Vucetic, Branka
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 2197 - 2202
  • [9] Piecewise Linear AF in Relay-Eavesdropper Channel with Orthogonal Components
    Wang, Baoyun
    Deng, Zhixiang
    Chen, Chiyang
    [J]. 2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2013, : 917 - 921
  • [10] Research on the Secrecy Achievable Rate Region for the Broadcast channel with eavesdropper
    Zhu, Yan
    Chen, Xiao
    Zhou, Yongkai
    Li, Fangbiao
    Pang, Liang
    Yin, Xinxing
    Xue, Zhi
    [J]. PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 77 - 80