Two-Hop Secure Communication Using an Untrusted Relay
We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to b...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2009-01-01
|
Series: | EURASIP Journal on Wireless Communications and Networking |
Online Access: | http://dx.doi.org/10.1155/2009/305146 |
id |
doaj-598b0d9c9d0b4b04ae2d827efb434b00 |
---|---|
record_format |
Article |
spelling |
doaj-598b0d9c9d0b4b04ae2d827efb434b002020-11-24T23:58:15ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14721687-14992009-01-01200910.1155/2009/305146Two-Hop Secure Communication Using an Untrusted RelayXiang HeAylin YenerWe consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted relay node is essential, we find that a positive secrecy rate is achievable. The center piece of the achievability scheme is the help provided by either the destination node with transmission capability, or an external “good samaritan” node. In either case, the helper performs cooperative jamming that confuses the eavesdropping relay and disables it from being able to decipher what it is relaying. We next derive an upper bound on the secrecy rate for this system. We observe that the gap between the upper bound and the achievable rate vanishes as the power of the relay node goes to infinity. Overall, the paper presents a case for intentional interference, that is, cooperative jamming, as an enabler for secure communication. http://dx.doi.org/10.1155/2009/305146 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Xiang He Aylin Yener |
spellingShingle |
Xiang He Aylin Yener Two-Hop Secure Communication Using an Untrusted Relay EURASIP Journal on Wireless Communications and Networking |
author_facet |
Xiang He Aylin Yener |
author_sort |
Xiang He |
title |
Two-Hop Secure Communication Using an Untrusted Relay |
title_short |
Two-Hop Secure Communication Using an Untrusted Relay |
title_full |
Two-Hop Secure Communication Using an Untrusted Relay |
title_fullStr |
Two-Hop Secure Communication Using an Untrusted Relay |
title_full_unstemmed |
Two-Hop Secure Communication Using an Untrusted Relay |
title_sort |
two-hop secure communication using an untrusted relay |
publisher |
SpringerOpen |
series |
EURASIP Journal on Wireless Communications and Networking |
issn |
1687-1472 1687-1499 |
publishDate |
2009-01-01 |
description |
We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted relay node is essential, we find that a positive secrecy rate is achievable. The center piece of the achievability scheme is the help provided by either the destination node with transmission capability, or an external “good samaritan” node. In either case, the helper performs cooperative jamming that confuses the eavesdropping relay and disables it from being able to decipher what it is relaying. We next derive an upper bound on the secrecy rate for this system. We observe that the gap between the upper bound and the achievable rate vanishes as the power of the relay node goes to infinity. Overall, the paper presents a case for intentional interference, that is, cooperative jamming, as an enabler for secure communication. |
url |
http://dx.doi.org/10.1155/2009/305146 |
work_keys_str_mv |
AT xianghe twohopsecurecommunicationusinganuntrustedrelay AT aylinyener twohopsecurecommunicationusinganuntrustedrelay |
_version_ |
1725450824495136768 |