Effect of network topology on the secrecy capacity in multiple-access relay channel

被引:0
作者
Zhao, Su [1 ,2 ]
Chen, Min [1 ]
Meng, Qingmin [1 ,2 ]
Tian, Feng [1 ]
Yue, Wenjing [1 ]
机构
[1] Nanjing University of Posts and Telecommunications
[2] National Mobile Communications Research Lab., Southeast University
来源
Journal of Information and Computational Science | 2014年 / 11卷 / 04期
关键词
Multiple-access relay channel; Network coding; Secrecy capacity;
D O I
10.12733/jics20102980
中图分类号
学科分类号
摘要
A design based on network coding is presented to improve the secrecy capacity of the cooperative communication system where a amplify-and-forward relaying is employed. The system consists of two source nodes, one destination node and one eavesdropper. For a single session between one source and the destination, we derive the approximate formula of secrecy capacity in the high SNR regime. Through detailed computer simulation, we evaluate the effect of node's location on the secrecy capacity in the multiple-access relay channel. 1548-7741/Copyright © 2014 Binary Information Press.
引用
收藏
页码:1233 / 1241
页数:8
相关论文
共 11 条
[1]  
Ahlswede R., Cai N., Li S.Y.R., Yeung R.W., Network information flow, IEEE Transactions on Information Theory, 46, 4, pp. 1204-1216, (2000)
[2]  
Peng C., Zhang Q., Zhao M., Yao Y., On the performance analysis of network-coded cooperation in wireless networks, Proc. of IEEE INFOCOM, pp. 1460-1468, (2007)
[3]  
Bao X., Li J., Adaptive Network Coded Cooperation (ANCC) for wireless relay network: Matching code-on-graph with network-on-graph, IEEE Transactions on Wireless Communications, 7, 2, pp. 574-583, (2008)
[4]  
Sharma S., Shi Y., Liu J., Hou Y.T., Kompella S., Is network coding always good for cooperative communications?, Proc. of IEEE INFOCOM, pp. 1-9, (2010)
[5]  
Shannon C.E., Communication theory of secrecy systems, Bell System Technical Journal, 28, 4, pp. 656-715, (1949)
[6]  
Wyner A.D., The wire-tap channel, Bell System Technical Journal, 54, 8, pp. 1355-1387, (1975)
[7]  
Lai L., Ei Gamal H., The relay-eavesdropper channel: Cooperation for secrecy, IEEE Transactions on Information Theory, 54, 9, pp. 4005-4019, (2008)
[8]  
Dong L., Han Z., Petropulu A., Poor H.V., Secure wireless communications via cooperation, Proc. 46th Annual Allerton Conference on Communication, Control, and Computing, (2008)
[9]  
Dong L., Han Z., Petropulu A., Poor H.V., Amplify-and-forward based cooperation for secure wireless communications, Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, (2009)
[10]  
Laneman J.N., Tse D.N.C., Wornell G.W., Cooperative diversity in wireless network: Efficient protocols and outage behavior, IEEE Transactions on Information Theory, 50, 12, pp. 3062-3080, (2004)