TY - GEN
T1 - Two-hop untrusted relay channel with an external eavesdropper under layered secrecy constraints
AU - Zewail, Ahmed A.
AU - Yener, Aylin
N1 - Funding Information:
This work was supported in part by the National Science Foundation Grants CCF 13-19338 and CNS 13-14719
PY - 2016
Y1 - 2016
N2 - We consider a Gaussian network consisting of a source that aims to communicate to its legitimate destination via an untrusted relay node in the presence of an external eavesdropper. The source wishes to send two independent messages to the destination: one message must be kept secret from the external eavesdropper only, while the other message must be kept secret from the external eavesdropper and the untrusted relay both. We identify achievable secure rates under these layered secrecy constraints. Considering a two-hop half-duplex setup, we employ the destination as a cooperative jammer in the first phase in order to help provide secrecy from the relay and the external eavesdropper, and the source as a cooperative jammer in the second phase in order to detriment the external eavesdropper. The source encodes its messages using stochastic encoding and security embedding coding. We provide the secrecy analysis and present numerical results to demonstrate the performance of the proposed achievability technique. Our study points to the value of the source serving as a cooperative jammer as well as the need for power control policies at the legitimate nodes in order to ensure secrecy in this system.
AB - We consider a Gaussian network consisting of a source that aims to communicate to its legitimate destination via an untrusted relay node in the presence of an external eavesdropper. The source wishes to send two independent messages to the destination: one message must be kept secret from the external eavesdropper only, while the other message must be kept secret from the external eavesdropper and the untrusted relay both. We identify achievable secure rates under these layered secrecy constraints. Considering a two-hop half-duplex setup, we employ the destination as a cooperative jammer in the first phase in order to help provide secrecy from the relay and the external eavesdropper, and the source as a cooperative jammer in the second phase in order to detriment the external eavesdropper. The source encodes its messages using stochastic encoding and security embedding coding. We provide the secrecy analysis and present numerical results to demonstrate the performance of the proposed achievability technique. Our study points to the value of the source serving as a cooperative jammer as well as the need for power control policies at the legitimate nodes in order to ensure secrecy in this system.
UR - http://www.scopus.com/inward/record.url?scp=85015393628&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85015393628&partnerID=8YFLogxK
U2 - 10.1109/GLOCOM.2016.7842357
DO - 10.1109/GLOCOM.2016.7842357
M3 - Conference contribution
AN - SCOPUS:85015393628
T3 - 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings
BT - 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 59th IEEE Global Communications Conference, GLOBECOM 2016
Y2 - 4 December 2016 through 8 December 2016
ER -