Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Journal articles
  4. Secure Transmission on the Two-Hop Relay Channel With Scaled Compute-and-Forward
 
research article

Secure Transmission on the Two-Hop Relay Channel With Scaled Compute-and-Forward

Ren, Zhijie
•
Goseling, Jasper
•
Weber, Jos H.
Show more
2017
IEEE Transactions on Information Theory

In this paper, we consider communication on a two-hop channel in which a source wants to send information reliably and securely to the destination via a relay. We consider both the untrusted relay case and the external eavesdropper case. In the untrusted relay case, the relay behaves as an eavesdropper, and there is a cooperative node, which sends a jamming signal to confuse the relay when it is receiving from the source. In the external eavesdropper case, the relay is trusted, and there is an external node eavesdropping the communication. We propose two secure transmission schemes using the scaled compute-and-forward technique. One of the schemes is based on a random binning code, and the other one is based on a lattice chain code. It is proved that in the high signal-to-noise-ratio (SNR) scenario and/or the limited relay power scenario, if the destination is used as the jammer, both schemes outperform all existing schemes and achieve the upper bound. In particular, if the SNR is large and the source, the relay, and the cooperative jammer have identical power and channels, both schemes achieve the upper bound for secrecy rate, which is merely 1/2 bit per channel use lower than the channel capacity without secrecy constraints. We also prove that one of our schemes achieves a positive secrecy rate in the external eavesdropper case in which the relay is trusted and there exists an external eavesdropper.

  • Details
  • Metrics
Type
research article
DOI
10.1109/TIT.2017.2757503
Web of Science ID

WOS:000416211900016

Author(s)
Ren, Zhijie
Goseling, Jasper
Weber, Jos H.
Gastpar, Michael C.  
Date Issued

2017

Publisher

Institute of Electrical and Electronics Engineers

Published in
IEEE Transactions on Information Theory
Volume

63

Issue

12

Start page

7753

End page

7769

Subjects

Relays

•

Jamming

•

Signal to noise ratio

•

Lattices

•

Upper bound

•

Reliability

•

Electronic mail

•

Compute-and-forward

•

lattice codes

•

two-hop channel

•

untrusted relay

•

information theoretic security

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LINX  
Available on Infoscience
November 23, 2017
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/142302
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés