On the Secure Degrees of Freedom of Relaying With Half-Duplex Feedback

被引:13
作者
Kim, Tung T. [1 ]
Poor, H. Vincent [1 ]
机构
[1] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
Degrees of freedom; feedback; information-theoretic security; relay channels; wiretap channels; SECRECY; CHANNEL; CAPACITY;
D O I
10.1109/TIT.2010.2090250
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure communication protocols over a single-relay system in the presence of a multiple-antenna eavesdropper are investigated. When there is no direct link between the source and the destination, an amplify-and-forward (AF) protocol that allows both the destination and the source to jam the eavesdropper is shown to achieve secrecy rates that grow linearly with the transmit power in dB, even if all the legitimate nodes have strictly fewer antennas than the eavesdropper. The number of achievable secure degrees of freedom is quantified and shown to match an upper bound when the number of antennas at the destination is sufficiently large. However, in the presence of a direct link between source and destination, this scaling rule no longer applies. The bottleneck of the AF scheme in the presence of a direct source-destination link is identified, motivating the use of another AF scheme and a novel compress-and-forward protocol that can achieve a positive number of secure degrees of freedom using an insecure feedback link.
引用
收藏
页码:291 / 302
页数:12
相关论文
共 16 条
[1]  
Cover T.M., 2006, ELEMENTS INFORM THEO, V2nd ed
[2]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189
[3]   Providing Secrecy with Lattice Codes [J].
He, Xiang ;
Yener, Aylin .
2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, :1199-1206
[4]   Capacity bounds and power allocation for wireless relay channels [J].
Host-Madsen, A ;
Zhang, JS .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (06) :2020-2040
[5]  
Khisti A., 2010, IEEE T INF THEORY
[6]   The Wiretap Channel With Feedback: Encryption Over the Channel [J].
Lai, Lifeng ;
El Gamal, Hesham ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (11) :5059-5067
[7]   The relay-eavesdropper channel: Cooperation for secrecy [J].
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (09) :4005-4019
[8]  
Liang Y., 2009, INFORM THEORETIC SEC
[9]  
MAURER UM, 1993, IEEE T INFORM THEORY, V39, P733, DOI 10.1109/18.256484
[10]  
Oggier F., IEEE T INF THE UNPUB