The role of feedback in two-way secure communications

Xiang He, Aylin Yener

    Research output: Contribution to journalArticlepeer-review

    39 Scopus citations

    Abstract

    Most practical communication links are bidirectional. In these models, since the source node also receives signals, its encoder has the option of computing its output based on the signals it received in the past. On the other hand, from a practical point of view, it would also be desirable to identify the cases where such an encoder design may not improve communication rates. This question is particularly interesting for the case where the transmitted messages and the feedback signals are subject to eavesdropping. In this paper, we investigate the question of how much impact the feedback has on the secrecy capacity by studying two fundamental models. First, we consider the Gaussian two-way wiretap channel and derive an outer bound for its secrecy capacity region. We show that the secrecy rate loss can be unbounded when feedback signals are not utilized except for a special case we identify, and thus conclude that utilizing feedback can be highly beneficial in general. Second, we consider a half-duplex Gaussian two-way relay channel where the relay node is also an eavesdropper, and find that the impact of feedback is less pronounced compared to the previous scenario. Specifically, the loss in secrecy rate, when ignoring the feedback, is quantified to be less than 0.5 bit per channel use when the relay power goes to infinity. This achievable rate region is obtained with simple time sharing along with cooperative jamming, which, with its simplicity and near optimum performance, is a viable alternative to an encoder that utilizes feedback signals.

    Original languageEnglish (US)
    Article number6600943
    Pages (from-to)8115-8130
    Number of pages16
    JournalIEEE Transactions on Information Theory
    Volume59
    Issue number12
    DOIs
    StatePublished - Dec 2013

    All Science Journal Classification (ASJC) codes

    • Information Systems
    • Computer Science Applications
    • Library and Information Sciences

    Fingerprint

    Dive into the research topics of 'The role of feedback in two-way secure communications'. Together they form a unique fingerprint.

    Cite this