Secure Communications for the Two-User Broadcast Channel With Random Traffic

被引:6
作者
Mohapatra, Parthajit [1 ]
Pappas, Nikolaos [2 ]
Lee, Jemin [3 ]
Quek, Tony Q. S. [4 ]
Angelakis, Vangelis [2 ]
机构
[1] IIT Kharagpur, GS Sanyal Sch Telecommun, Kharagpur 721302, W Bengal, India
[2] Linkoping Univ, Dept Sci & Technol, SE-60174 Norrkoping, Sweden
[3] Daegu Gyeongbuk Inst Sci & Technol, Dept Informat & Commun Engn, Daegu 42988, South Korea
[4] Singapore Univ Technol & Design, Informat Syst Technol & Design Pillar, Singapore 487372, Singapore
基金
新加坡国家研究基金会;
关键词
Broadcast channel; bursty traffic; stability region; successive decoding; queueing; MULTIPLE-ACCESS; FUNDAMENTAL LIMITS; INTERFERENCE; STABILITY; SECRECY; NETWORKS; SYSTEMS; ERROR;
D O I
10.1109/TIFS.2018.2818076
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we study the stability region of the two-user broadcast channel (BC) with bursty data arrivals and security constraints. It is assumed that one of the receivers has a secrecy constraint, i.e., its packets need to be kept secret from the other receiver, which is defined based on signal to interference noise ratio. The receiver with secrecy constraint has full-duplex capability to send a jamming signal for improving its service rate. The stability region of the two-user BC with secrecy constraint is characterized for the general decoding case. Then, assuming two different decoding schemes, the respective stability regions are derived. The full-duplex operation of receiver results in self-interference, and the effect of imperfect self-interference cancelation on the stability region is also investigated. The stability region of the BC with a secrecy constraint, where the receivers do not have full duplex capability can be obtained as a special case of the results derived in this paper. In addition, the paper considers the problem of maximizing the saturated throughput of the queue for which there is no secrecy constraint under minimum service guarantees for the other queue. The results provide new insights on the effect of the secrecy constraint on the stability region of the BC. It is found that the stability region with secrecy constraint is sensitive to the degree of self-interference cancelation.
引用
收藏
页码:2294 / 2309
页数:16
相关论文
共 48 条
[1]   Exploiting Full-Duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks [J].
Akgun, Berk ;
Koyluoglu, Onur Ozan ;
Krunz, Marwan .
IEEE Transactions on Communications, 2017, 65 (02) :956-968
[2]  
[Anonymous], 2013, 2013 IEEE INF THEORY
[3]  
[Anonymous], 2011, Network information theory
[4]  
[Anonymous], CORR
[5]   Probabilistic Cooperation of a Full-Duplex Relay in Random Access Networks [J].
Avgouleas, Ioannis ;
Pappas, Nikolaos ;
Yuan, Di ;
Angelakis, Vangelis .
IEEE ACCESS, 2017, 5 :7394-7404
[6]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[7]  
Bashar S., 2009, P IEEE GLOB, P1
[8]  
Çapar Ç, 2012, IEEE INFOCOM SER, P1152, DOI 10.1109/INFCOM.2012.6195474
[9]   Physical Layer Network Security in the Full-Duplex Relay System [J].
Chen, Gaojie ;
Gong, Yu ;
Xiao, Pei ;
Chambers, Jonathon A. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :574-583
[10]   Achievable Rates of Full-Duplex MIMO Radios in Fast Fading Channels With Imperfect Channel Estimation [J].
Cirik, Ali Cagatay ;
Rong, Yue ;
Hua, Yingbo .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2014, 62 (15) :3874-3886