Two-hop untrusted relay channel with an external eavesdropper under layered secrecy constraints

Ahmed A. Zewail, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)

    Abstract

    We consider a Gaussian network consisting of a source that aims to communicate to its legitimate destination via an untrusted relay node in the presence of an external eavesdropper. The source wishes to send two independent messages to the destination: one message must be kept secret from the external eavesdropper only, while the other message must be kept secret from the external eavesdropper and the untrusted relay both. We identify achievable secure rates under these layered secrecy constraints. Considering a two-hop half-duplex setup, we employ the destination as a cooperative jammer in the first phase in order to help provide secrecy from the relay and the external eavesdropper, and the source as a cooperative jammer in the second phase in order to detriment the external eavesdropper. The source encodes its messages using stochastic encoding and security embedding coding. We provide the secrecy analysis and present numerical results to demonstrate the performance of the proposed achievability technique. Our study points to the value of the source serving as a cooperative jammer as well as the need for power control policies at the legitimate nodes in order to ensure secrecy in this system.

    Original languageEnglish (US)
    Title of host publication2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    ISBN (Electronic)9781509013289
    DOIs
    StatePublished - Jan 1 2016
    Event59th IEEE Global Communications Conference, GLOBECOM 2016 - Washington, United States
    Duration: Dec 4 2016Dec 8 2016

    Publication series

    Name2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings

    Other

    Other59th IEEE Global Communications Conference, GLOBECOM 2016
    CountryUnited States
    CityWashington
    Period12/4/1612/8/16

    Fingerprint

    Power control

    All Science Journal Classification (ASJC) codes

    • Computational Theory and Mathematics
    • Computer Networks and Communications
    • Hardware and Architecture
    • Safety, Risk, Reliability and Quality

    Cite this

    Zewail, A. A., & Yener, A. (2016). Two-hop untrusted relay channel with an external eavesdropper under layered secrecy constraints. In 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings [7842357] (2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/GLOCOM.2016.7842357
    Zewail, Ahmed A. ; Yener, Aylin. / Two-hop untrusted relay channel with an external eavesdropper under layered secrecy constraints. 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2016. (2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings).
    @inproceedings{4b0bccba68bf477f9a2b3cd8b8316b32,
    title = "Two-hop untrusted relay channel with an external eavesdropper under layered secrecy constraints",
    abstract = "We consider a Gaussian network consisting of a source that aims to communicate to its legitimate destination via an untrusted relay node in the presence of an external eavesdropper. The source wishes to send two independent messages to the destination: one message must be kept secret from the external eavesdropper only, while the other message must be kept secret from the external eavesdropper and the untrusted relay both. We identify achievable secure rates under these layered secrecy constraints. Considering a two-hop half-duplex setup, we employ the destination as a cooperative jammer in the first phase in order to help provide secrecy from the relay and the external eavesdropper, and the source as a cooperative jammer in the second phase in order to detriment the external eavesdropper. The source encodes its messages using stochastic encoding and security embedding coding. We provide the secrecy analysis and present numerical results to demonstrate the performance of the proposed achievability technique. Our study points to the value of the source serving as a cooperative jammer as well as the need for power control policies at the legitimate nodes in order to ensure secrecy in this system.",
    author = "Zewail, {Ahmed A.} and Aylin Yener",
    year = "2016",
    month = "1",
    day = "1",
    doi = "10.1109/GLOCOM.2016.7842357",
    language = "English (US)",
    series = "2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings",
    publisher = "Institute of Electrical and Electronics Engineers Inc.",
    booktitle = "2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings",
    address = "United States",

    }

    Zewail, AA & Yener, A 2016, Two-hop untrusted relay channel with an external eavesdropper under layered secrecy constraints. in 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings., 7842357, 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings, Institute of Electrical and Electronics Engineers Inc., 59th IEEE Global Communications Conference, GLOBECOM 2016, Washington, United States, 12/4/16. https://doi.org/10.1109/GLOCOM.2016.7842357

    Two-hop untrusted relay channel with an external eavesdropper under layered secrecy constraints. / Zewail, Ahmed A.; Yener, Aylin.

    2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2016. 7842357 (2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    TY - GEN

    T1 - Two-hop untrusted relay channel with an external eavesdropper under layered secrecy constraints

    AU - Zewail, Ahmed A.

    AU - Yener, Aylin

    PY - 2016/1/1

    Y1 - 2016/1/1

    N2 - We consider a Gaussian network consisting of a source that aims to communicate to its legitimate destination via an untrusted relay node in the presence of an external eavesdropper. The source wishes to send two independent messages to the destination: one message must be kept secret from the external eavesdropper only, while the other message must be kept secret from the external eavesdropper and the untrusted relay both. We identify achievable secure rates under these layered secrecy constraints. Considering a two-hop half-duplex setup, we employ the destination as a cooperative jammer in the first phase in order to help provide secrecy from the relay and the external eavesdropper, and the source as a cooperative jammer in the second phase in order to detriment the external eavesdropper. The source encodes its messages using stochastic encoding and security embedding coding. We provide the secrecy analysis and present numerical results to demonstrate the performance of the proposed achievability technique. Our study points to the value of the source serving as a cooperative jammer as well as the need for power control policies at the legitimate nodes in order to ensure secrecy in this system.

    AB - We consider a Gaussian network consisting of a source that aims to communicate to its legitimate destination via an untrusted relay node in the presence of an external eavesdropper. The source wishes to send two independent messages to the destination: one message must be kept secret from the external eavesdropper only, while the other message must be kept secret from the external eavesdropper and the untrusted relay both. We identify achievable secure rates under these layered secrecy constraints. Considering a two-hop half-duplex setup, we employ the destination as a cooperative jammer in the first phase in order to help provide secrecy from the relay and the external eavesdropper, and the source as a cooperative jammer in the second phase in order to detriment the external eavesdropper. The source encodes its messages using stochastic encoding and security embedding coding. We provide the secrecy analysis and present numerical results to demonstrate the performance of the proposed achievability technique. Our study points to the value of the source serving as a cooperative jammer as well as the need for power control policies at the legitimate nodes in order to ensure secrecy in this system.

    UR - http://www.scopus.com/inward/record.url?scp=85015393628&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=85015393628&partnerID=8YFLogxK

    U2 - 10.1109/GLOCOM.2016.7842357

    DO - 10.1109/GLOCOM.2016.7842357

    M3 - Conference contribution

    T3 - 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings

    BT - 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings

    PB - Institute of Electrical and Electronics Engineers Inc.

    ER -

    Zewail AA, Yener A. Two-hop untrusted relay channel with an external eavesdropper under layered secrecy constraints. In 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc. 2016. 7842357. (2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings). https://doi.org/10.1109/GLOCOM.2016.7842357