Multi-Terminal Two-Hop Untrusted-Relay Networks With Hierarchical Security Guarantees

被引:8
|
作者
Zewail, Ahmed A. [1 ]
Yener, Aylin [1 ]
机构
[1] Penn State Univ, Sch Elect Engn & Comp Sci, University Pk, PA 16802 USA
基金
美国国家科学基金会;
关键词
Untrusted relays; two-hop communications; cooperative jamming; levels of security clearance; SECRECY; CAPACITY; CHANNEL;
D O I
10.1109/TIFS.2017.2695163
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider a two-source two-destination two-hop relay network, where all data communication must be kept secret from the relay node. The model considered is the simplest primitive that embodies a multi-transmitter multi-receiver network that needs to communicate sharing an untrusted relay node. We focus on two scenarios. In the first scenario, each source aims to send two messages to be kept secret from the relay: a common message that should be decoded by both destinations, and a private message that should be decoded by the first destination while kept secret from the second one. We define an achievable rate region by utilizing stochastic encoding at the sources, the Gaussian noise cooperative jamming from the destinations, and compress-and-forward at the relay. In the second scenario, each source aims to send a confidential message to its intended destination, which should be kept secret from the other one as well as the relay. We define an achievable rate region using a combination of nested lattice codes and random binning at the sources, structured cooperative jamming from destinations, and scaled compute-and-forward at the relay. We also derive genie-aided outer bounds on the secrecy rate regions. We present numerical results that demonstrate the performance of the proposed achievable schemes. Overall, this paper provides insights into how to utilize an untrusted relay to communicate to destinations with different levels of security clearance, and how intentional interference is an enabler of communication.
引用
收藏
页码:2052 / 2066
页数:15
相关论文
共 50 条
  • [1] The Two-Hop Interference Untrusted-Relay Channel with Confidential Messages
    Zewail, Ahmed A.
    Yener, Aylin
    2015 IEEE INFORMATION THEORY WORKSHOP - FALL (ITW), 2015, : 322 - 326
  • [2] Multi-terminal Networks with an Untrusted Relay
    Zewail, Ahmed A.
    Nafea, Mohamed
    Yener, Aylin
    2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2014, : 895 - 902
  • [3] The Symmetric Two-Hop Channel with an Untrusted Relay
    Ghasemi-Goojani, Shahab
    Papadimitratos, Panagiotis
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 673 - 677
  • [4] Secrecy Rate of Two-Hop AF Relaying Networks with an Untrusted Relay
    Zhou, Nanrun
    Chen, Xun
    Li, Chisheng
    Xue, Zhi
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 75 (01) : 119 - 129
  • [5] Secrecy Rate of Two-Hop AF Relaying Networks with an Untrusted Relay
    Nanrun Zhou
    Xun Chen
    Chisheng Li
    Zhi Xue
    Wireless Personal Communications, 2014, 75 : 119 - 129
  • [6] Two-Hop Secure Communication Using an Untrusted Relay
    Xiang He
    Aylin Yener
    EURASIP Journal on Wireless Communications and Networking, 2009
  • [7] Two-Hop Secure Communication Using an Untrusted Relay
    He, Xiang
    Yener, Aylin
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2009,
  • [8] Multi-destination Two-Hop Untrusted AF Relay Networks with Destination-Aided Cooperative Jamming
    Shi, Hui
    Yang, Weiwei
    Cai, Yueming
    Jia, Yongxing
    Yang, Wendong
    Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 2019, 294 LNCIST : 58 - 71
  • [9] Cross-Layer Security in Two-Hop Wireless Gaussian Relay Network with Untrusted Relays
    Kaliszan, Michal
    Mohammadi, Jafar
    Stanczak, Slawomir
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013,
  • [10] Relay selection in two-hop IEEE 802.16 Mobile Multi-hop Relay networks
    Li, Dandan
    Jin, Hao
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1007 - 1011