Multi-terminal networks with an untrusted relay

Ahmed A. Zewail, Mohamed Nafea, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations

    Abstract

    This paper investigates the impact of cooperation with an untrusted relay in multi-source multi-destination networks. The set up considered is one where the relay is the only means of communications due to the absence of direct links between the sources and the destinations. Since the relay is untrusted, all messages from the sources need to be kept secret from the relay. Furthermore, the destinations are assumed to have different levels of security clearance, i.e., some private messages should only be decoded by their intended receiver and should be kept secret from other destinations. An achievable secure rate region is found by using random binning at the sources, cooperative jamming from the destinations, and compress-and-forward at the relay. Additionally, a genie aided outer bound on the secure rate region is derived. Comparison of inner and outer bounds are provided.

    Original languageEnglish (US)
    Title of host publication2014 52nd Annual Allerton Conference on Communication, Control, and Computing, Allerton 2014
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages895-902
    Number of pages8
    ISBN (Electronic)9781479980093
    DOIs
    StatePublished - Jan 30 2014
    Event2014 52nd Annual Allerton Conference on Communication, Control, and Computing, Allerton 2014 - Monticello, United States
    Duration: Sep 30 2014Oct 3 2014

    Publication series

    Name2014 52nd Annual Allerton Conference on Communication, Control, and Computing, Allerton 2014

    Other

    Other2014 52nd Annual Allerton Conference on Communication, Control, and Computing, Allerton 2014
    Country/TerritoryUnited States
    CityMonticello
    Period9/30/1410/3/14

    All Science Journal Classification (ASJC) codes

    • Computer Networks and Communications
    • Computer Science Applications

    Fingerprint

    Dive into the research topics of 'Multi-terminal networks with an untrusted relay'. Together they form a unique fingerprint.

    Cite this