Two-Hop Secure Communication Using an Untrusted Relay

We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to b...

Full description

Bibliographic Details
Main Authors: Xiang He, Aylin Yener
Format: Article
Language:English
Published: SpringerOpen 2009-01-01
Series:EURASIP Journal on Wireless Communications and Networking
Online Access:http://dx.doi.org/10.1155/2009/305146
id doaj-598b0d9c9d0b4b04ae2d827efb434b00
record_format Article
spelling doaj-598b0d9c9d0b4b04ae2d827efb434b002020-11-24T23:58:15ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14721687-14992009-01-01200910.1155/2009/305146Two-Hop Secure Communication Using an Untrusted RelayXiang HeAylin YenerWe consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted relay node is essential, we find that a positive secrecy rate is achievable. The center piece of the achievability scheme is the help provided by either the destination node with transmission capability, or an external “good samaritan” node. In either case, the helper performs cooperative jamming that confuses the eavesdropping relay and disables it from being able to decipher what it is relaying. We next derive an upper bound on the secrecy rate for this system. We observe that the gap between the upper bound and the achievable rate vanishes as the power of the relay node goes to infinity. Overall, the paper presents a case for intentional interference, that is, cooperative jamming, as an enabler for secure communication. http://dx.doi.org/10.1155/2009/305146
collection DOAJ
language English
format Article
sources DOAJ
author Xiang He
Aylin Yener
spellingShingle Xiang He
Aylin Yener
Two-Hop Secure Communication Using an Untrusted Relay
EURASIP Journal on Wireless Communications and Networking
author_facet Xiang He
Aylin Yener
author_sort Xiang He
title Two-Hop Secure Communication Using an Untrusted Relay
title_short Two-Hop Secure Communication Using an Untrusted Relay
title_full Two-Hop Secure Communication Using an Untrusted Relay
title_fullStr Two-Hop Secure Communication Using an Untrusted Relay
title_full_unstemmed Two-Hop Secure Communication Using an Untrusted Relay
title_sort two-hop secure communication using an untrusted relay
publisher SpringerOpen
series EURASIP Journal on Wireless Communications and Networking
issn 1687-1472
1687-1499
publishDate 2009-01-01
description We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted relay node is essential, we find that a positive secrecy rate is achievable. The center piece of the achievability scheme is the help provided by either the destination node with transmission capability, or an external “good samaritan” node. In either case, the helper performs cooperative jamming that confuses the eavesdropping relay and disables it from being able to decipher what it is relaying. We next derive an upper bound on the secrecy rate for this system. We observe that the gap between the upper bound and the achievable rate vanishes as the power of the relay node goes to infinity. Overall, the paper presents a case for intentional interference, that is, cooperative jamming, as an enabler for secure communication.
url http://dx.doi.org/10.1155/2009/305146
work_keys_str_mv AT xianghe twohopsecurecommunicationusinganuntrustedrelay
AT aylinyener twohopsecurecommunicationusinganuntrustedrelay
_version_ 1725450824495136768