TY - GEN
T1 - The multiple access channel with an untrusted relay
AU - Zewail, Ahmed A.
AU - Yener, Aylin
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/12/1
Y1 - 2014/12/1
N2 - This paper considers a Gaussian multiple access channel aided by a relay. Specifically, the relay facilitates communication between multiple sources and a destination to which the sources have no direct link. In this set up, the relay node is considered to be untrusted, i.e., honest but curious, from whom the source messages need to be kept secret. We identify an achievable secrecy rate region utilizing cooperative jamming from the destination, and using compress-and-forward at the relay. Additionally, an outer bound on the secrecy rate region is derived. Numerical results indicate that the outer bound is tight in some cases of interest.
AB - This paper considers a Gaussian multiple access channel aided by a relay. Specifically, the relay facilitates communication between multiple sources and a destination to which the sources have no direct link. In this set up, the relay node is considered to be untrusted, i.e., honest but curious, from whom the source messages need to be kept secret. We identify an achievable secrecy rate region utilizing cooperative jamming from the destination, and using compress-and-forward at the relay. Additionally, an outer bound on the secrecy rate region is derived. Numerical results indicate that the outer bound is tight in some cases of interest.
UR - http://www.scopus.com/inward/record.url?scp=84929346934&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84929346934&partnerID=8YFLogxK
U2 - 10.1109/ITW.2014.6970785
DO - 10.1109/ITW.2014.6970785
M3 - Conference contribution
AN - SCOPUS:84929346934
T3 - 2014 IEEE Information Theory Workshop, ITW 2014
SP - 25
EP - 29
BT - 2014 IEEE Information Theory Workshop, ITW 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2014 IEEE Information Theory Workshop, ITW 2014
Y2 - 2 November 2014 through 5 November 2014
ER -