Two-hop untrusted relay channel with an external eavesdropper under layered secrecy constraints

Ahmed A. Zewail, Aylin Yener

    Research output: Contribution to journalConference articlepeer-review

    3 Scopus citations

    Abstract

    We consider a Gaussian network consisting of a source that aims to communicate to its legitimate destination via an untrusted relay node in the presence of an external eavesdropper. The source wishes to send two independent messages to the destination: one message must be kept secret from the external eavesdropper only, while the other message must be kept secret from the external eavesdropper and the untrusted relay both. We identify achievable secure rates under these layered secrecy constraints. Considering a two-hop half-duplex setup, we employ the destination as a cooperative jammer in the first phase in order to help provide secrecy from the relay and the external eavesdropper, and the source as a cooperative jammer in the second phase in order to detriment the external eavesdropper. The source encodes its messages using stochastic encoding and security embedding coding. We provide the secrecy analysis and present numerical results to demonstrate the performance of the proposed achievability technique. Our study points to the value of the source serving as a cooperative jammer as well as the need for power control policies at the legitimate nodes in order to ensure secrecy in this system.

    Original languageEnglish (US)
    Article number7842357
    JournalProceedings - IEEE Global Communications Conference, GLOBECOM
    DOIs
    StatePublished - 2016
    Event59th IEEE Global Communications Conference, GLOBECOM 2016 - Washington, United States
    Duration: Dec 4 2016Dec 8 2016

    All Science Journal Classification (ASJC) codes

    • Artificial Intelligence
    • Computer Networks and Communications
    • Hardware and Architecture
    • Signal Processing

    Fingerprint

    Dive into the research topics of 'Two-hop untrusted relay channel with an external eavesdropper under layered secrecy constraints'. Together they form a unique fingerprint.

    Cite this