Secrecy on a Gaussian Relay-Eavesdropper Channel with a Trusted Relay

被引:0
|
作者
Hu, Keke [1 ,2 ]
Zhang, Xiaohui [1 ,2 ]
Wang, Yongming [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
关键词
Physical layer security; Information theoretic secrecy; Shannon's cipher system; Cooperation; Relay; CAPACITY THEOREMS;
D O I
10.1007/978-3-030-37231-6_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a crucial aspect in nowadays wireless communication systems. The open nature of wireless makes the communications more vulnerable to eavesdropping, which leads to that the physical layer security (information theoretic secrecy) is becoming attractive due to its relying on the characteristics of the transmission medium. In this paper, we study the secrecy on a gaussian relay-eavesdropper channel with a trusted relay, which is assumed to be able to decode and encode wiretap codes. We discuss several cooperative strategies to guarantee the information secrecy in some cases and bound the corresponding secrecy rate. Also, we derive a cut-set-like upper bound on the secrecy capacity for our scenario. The relative proofs are also presented in this paper.
引用
收藏
页码:108 / 125
页数:18
相关论文
共 50 条
  • [1] Cooperative secrecy: The relay-eavesdropper channel
    Lai, Lifeng
    El Gamal, Hesham
    [J]. 2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 931 - 935
  • [2] The relay-eavesdropper channel: Cooperation for secrecy
    Lai, Lifeng
    El Gamal, Hesham
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (09) : 4005 - 4019
  • [3] An Improved Achievable Secrecy Rate for the Relay-Eavesdropper Channel
    Xu, Peng
    Ding, Zhiguo
    Dai, Xuchu
    Leung, Kin K.
    [J]. 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 2440 - 2445
  • [4] Secrecy Rate Optimization for Wireless Relay-Eavesdropper Channel with Energy Harvesting Constraints
    Jiang, Xue
    Lei, Wei-jia
    Zuo, Li-jie
    Xie, Xian-zhong
    [J]. INTERNATIONAL ACADEMIC CONFERENCE ON THE INFORMATION SCIENCE AND COMMUNICATION ENGINEERING (ISCE 2014), 2014, : 524 - 529
  • [5] Achievable Secrecy Rates for Relay-Eavesdropper Channel Based on the Application of Noisy Network Coding
    Xu, Peng
    Ding, Zhiguo
    Dai, Xuchu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (07) : 1736 - 1751
  • [6] A Hybrid Cooperative Coding Scheme for the Relay-Eavesdropper Channel
    Xu, Peng
    Ding, Zhiguo
    Dai, Xuchu
    [J]. ENTROPY, 2014, 16 (03): : 1819 - 1841
  • [7] Optimal Resource Allocation of Orthogonal Relay-eavesdropper Channel
    Chen Ying
    Deng Zhixiang
    Wang Bao-yun
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [8] Piecewise Linear AF in Relay-Eavesdropper Channel with Orthogonal Components
    Wang, Baoyun
    Deng, Zhixiang
    Chen, Chiyang
    [J]. 2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2013, : 917 - 921
  • [9] Secure Transmission for Relay-Eavesdropper Channels Using Polar Coding
    Duo, Bin
    Wang, Peng
    Li, Yonghui
    Vucetic, Branka
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 2197 - 2202
  • [10] Secrecy Outage of Proactive Relay Selection by Eavesdropper
    Ghose, Sarbani
    Kundu, Chinmoy
    Dobre, Octavia A.
    [J]. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,