Physical Layer Network Coding with Multiple Untrusted Relays for Physical Layer Security

被引:0
作者
Yamaguchi, Kazuma [1 ]
Takyu, Osamu [1 ]
Ohtsuki, Tomoaki [2 ]
Sasamori, Fumihito [1 ]
Handa, Shiro [1 ]
机构
[1] Shinshu Univ, Matsumoto, Nagano, Japan
[2] Keio Univ, Tokyo 108, Japan
来源
2014 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA) | 2014年
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
We proposed the physical layer security (PLS) under the untrusted relay in the wireless communication with the physical layer network coding (PLNC). In PLNC, the two information source accesses the relay station, simultaneously and thus it is difficult for the relay station to demodulate each signal due to the masking-effect from the other signal. As a result, the leakage of information to the untrusted relay is avoidable. The transmit power control (TPC) for the balancing between the two received signal powers is powerful. The secure capacity is enlarged but has not been optimized for maximizing the secure capacity. In this paper, the quasi-optimization of TPC for enlarging secure capacity is derived in the wireless communication with the untrusted relay and PLNC.
引用
收藏
页数:5
相关论文
共 9 条
  • [1] HAYKIN S, 1999, COMMUNICATION SYSTEM
  • [2] Two-Hop Secure Communication Using an Untrusted Relay
    He, Xiang
    Yener, Aylin
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2009,
  • [3] Link adaptation for physical layer security over wireless fading channels
    Khodakarami, H.
    Lahouti, F.
    [J]. IET COMMUNICATIONS, 2012, 6 (03) : 353 - 362
  • [4] The Secrecy Capacity of the MIMO Wiretap Channel
    Oggier, Frederique
    Hassibi, Babak
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (08) : 4961 - 4972
  • [5] Wireless network coding by amplify-and-forward for bi-directional traffic flows
    Popovski, Petar
    Yomo, Hiroyuki
    [J]. IEEE COMMUNICATIONS LETTERS, 2007, 11 (01) : 16 - 18
  • [6] Tanenbum A, 2002, COMPUTER NETWORKS
  • [7] The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
    Tekin, Ender
    Yener, Aylin
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2735 - 2751
  • [8] M2M: From Mobile to Embedded Internet
    Wu, Geng
    Talwar, Shilpa
    Johnsson, Kerstin
    Himayat, Nageen
    Johnson, Kevin D.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2011, 49 (04) : 36 - 43
  • [9] Yamaguchi K., 2013, IEEE APWCS 2013, P41