End-to-end secure multi-hop communication with untrusted relays is possible

Xiang He, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations

    Abstract

    We consider a source-destination pair that can communicate only through a chain of unauthenticated intermediate relay nodes over AWGN links. In this scenario, it is desirable to use these relays-as otherwise communicating with the destination is impossible-without the relays being able to decode the information flowing through them. This in turn is tantamount to treating the relays as eavesdroppers from whom the information needs to be kept secret. An important question then becomes that of identifying the limits of reliable and secure communication in this network in the information theoretic sense. In particular, we ask whether it is possible to achieve a nonvanishing perfect secrecy rate regardless of the number of hops. In this work, we find that the answer is yes and show that a constant secrecy rate for an arbitrary number of hops is achievable by employing the combination of a lattice code and a random code.

    Original languageEnglish (US)
    Title of host publication2008 42nd Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2008
    Pages681-685
    Number of pages5
    DOIs
    StatePublished - Dec 1 2008
    Event2008 42nd Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2008 - Pacific Grove, CA, United States
    Duration: Oct 26 2008Oct 29 2008

    Publication series

    NameConference Record - Asilomar Conference on Signals, Systems and Computers
    ISSN (Print)1058-6393

    Other

    Other2008 42nd Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2008
    Country/TerritoryUnited States
    CityPacific Grove, CA
    Period10/26/0810/29/08

    All Science Journal Classification (ASJC) codes

    • Signal Processing
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'End-to-end secure multi-hop communication with untrusted relays is possible'. Together they form a unique fingerprint.

    Cite this