tailieunhanh - Báo cáo hóa học: "Research Article Two-Hop Secure Communication Using an Untrusted Relay"

Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Two-Hop Secure Communication Using an Untrusted Relay | Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2009 Article ID 305146 13 pages doi 2009 305146 Research Article Two-Hop Secure Communication Using an Untrusted Relay Xiang He and Aylin Yener Wireless Communications and Networking Laboratory Electrical Engineering Department The Pennsylvania State University University Park PA 16802 USA Correspondence should be addressed to Aylin Yener yener@ Received 4 December 2008 Revised 8 August 2009 Accepted 8 October 2009 Recommended by Hesham El-Gamal We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet the information it relays needs to be kept secret from it. In this two-hop communication scenario where the use of the untrusted relay node is essential we find that a positive secrecy rate is achievable. The center piece of the achievability scheme is the help provided by either the destination node with transmission capability or an external good samaritan node. In either case the helper performs cooperative jamming that confuses the eavesdropping relay and disables it from being able to decipher what it is relaying. We next derive an upper bound on the secrecy rate for this system. We observe that the gap between the upper bound and the achievable rate vanishes as the power of the relay node goes to infinity. Overall the paper presents a case for intentional interference that is cooperative jamming as an enabler for secure communication. Copyright 2009 X. He and A. Yener. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited. 1. Introduction Information theoretic security was proposed by Shannon

TÀI LIỆU LIÊN QUAN