Near-Optimal Modulo-and-Forward Scheme for the Untrusted Relay Channel

被引:19
作者
Zhang, Shengli [1 ,2 ,3 ]
Fan, Lisheng [4 ]
Peng, Mugen [5 ]
Poor, H. Vincent [6 ]
机构
[1] Shenzhen Univ, Sch Informat Engn, Shenzhen 518060, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710126, Peoples R China
[3] Stanford Univ, Dept Elect Engn, Stanford, CA 94305 USA
[4] Shantou Univ, Dept Elect Engn, Shantou 515063, Peoples R China
[5] Beijing Univ Posts & Telecommun, Minist Educ, Key Lab Univ Wireless Commun, Beijing 100876, Peoples R China
[6] Princeton Univ, Sch Engn & Appl Sci, Princeton, NJ 08544 USA
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Untrusted relay; lattice codes; modulo-and-forward; physical layer security; SECRECY CAPACITY; WIRETAP; SELECTION; SYSTEMS; CODES;
D O I
10.1109/TIT.2016.2530080
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies an untrusted relay channel, in which the destination sends artificial noise simultaneously with the source sending a message to the relay, in order to protect the source's confidential message. The traditional amplify-and-forward (AF) scheme shows poor performance in this situation because of the interference power dilemma. Providing better security by using stronger artificial noise will consume more power of the relay, impairing the confidential message's transmission. To solve this problem, this paper proposes a modulo-and-forward (MF) operation at the relay with nested lattice encoding at the source. For the proposed MF scheme with full channel state information at the transmitter (CSIT), theoretical analysis shows that the MF scheme approaches the secrecy capacity within 1/2 bit for all channel realizations, and, hence, achieves full generalized security degrees of freedom (G-SDoF). In contrast, the AF scheme can only achieve a small fraction of the G-SDoF. For the MF scheme without CSIT, the total outage event, defined as either connection outage or secrecy outage, is introduced. Based on this total outage definition, analysis shows that the proposed MF scheme achieves the full generalized secure diversity gain (G-SDG) of order one. On the other hand, the AF scheme can achieve a G-SDG of only 1/2 at most.
引用
收藏
页码:2545 / 2556
页数:12
相关论文
共 31 条
[11]   Generalized Degrees of Freedom of the Symmetric Gaussian K User Interference Channel [J].
Jafar, Syed A. ;
Vishwanath, Sriram .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (07) :3297-3303
[12]   Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System [J].
Jeong, Cheol ;
Kim, Il-Min ;
Kim, Dong In .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (01) :310-325
[13]   LDPC Codes for the Gaussian Wiretap Channel [J].
Klinc, Demijan ;
Ha, Jeongseok ;
McLaughlin, Steven W. ;
Barros, Joao ;
Kwak, Byung-Jae .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :532-540
[14]  
LEUNGYANCHEONG SK, 1978, IEEE T INFORM THEORY, V24, P451, DOI 10.1109/TIT.1978.1055917
[15]   Relay Subset Selection in Wireless Networks Using Partial Decode-and-Forward Transmission [J].
Lo, Caleb K. ;
Vishwanath, Sriram ;
Heath, Robert W., Jr. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (02) :692-704
[16]   Opportunistic Relay Selection with Outdated CSI: Outage Probability and Diversity Analysis [J].
Lopez Vicario, Jose ;
Bel, Albert ;
Lopez-Salcedo, Jose A. ;
Seco, Gonzalo .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (06) :2872-2876
[17]  
Lu K., 2009, P IEEE INT C COMM IC, P1
[18]   Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes [J].
Mahdavifar, Hessam ;
Vardy, Alexander .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (10) :6428-6443
[19]  
Mukherjee A., 2010, Chinese Medicine, V1, P1
[20]   Approximately Achieving Gaussian Relay Network Capacity With Lattice-Based QMF Codes [J].
Ozgur, Ayfer ;
Diggavi, Suhas N. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (12) :8275-8294