Multi-Terminal Two-Hop Untrusted-Relay Networks with Hierarchical Security Guarantees

Ahmed A. Zewail, Aylin Yener

    Research output: Contribution to journalArticlepeer-review

    11 Scopus citations

    Abstract

    We consider a two-source two-destination two-hop relay network, where all data communication must be kept secret from the relay node. The model considered is the simplest primitive that embodies a multi-Transmitter multi-receiver network that needs to communicate sharing an untrusted relay node. We focus on two scenarios. In the first scenario, each source aims to send two messages to be kept secret from the relay: A common message that should be decoded by both destinations, and a private message that should be decoded by the first destination while kept secret from the second one. We define an achievable rate region by utilizing stochastic encoding at the sources, the Gaussian noise cooperative jamming from the destinations, and compress-And-forward at the relay. In the second scenario, each source aims to send a confidential message to its intended destination, which should be kept secret from the other one as well as the relay. We define an achievable rate region using a combination of nested lattice codes and random binning at the sources, structured cooperative jamming from destinations, and scaled compute-And-forward at the relay. We also derive genie-Aided outer bounds on the secrecy rate regions. We present numerical results that demonstrate the performance of the proposed achievable schemes. Overall, this paper provides insights into how to utilize an untrusted relay to communicate to destinations with different levels of security clearance, and how intentional interference is an enabler of communication.

    Original languageEnglish (US)
    Article number7903628
    Pages (from-to)2052-2066
    Number of pages15
    JournalIEEE Transactions on Information Forensics and Security
    Volume12
    Issue number9
    DOIs
    StatePublished - Sep 2017

    All Science Journal Classification (ASJC) codes

    • Safety, Risk, Reliability and Quality
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'Multi-Terminal Two-Hop Untrusted-Relay Networks with Hierarchical Security Guarantees'. Together they form a unique fingerprint.

    Cite this