Secure communication with a relay helping the wire-tapper

Melda Yuksel, Elza Erkip

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

A four terminal Gaussian network, composed of a single source-destination pair, a relay and a wire-tapper is considered. Unlike the relay channel with a wire-tapper, it is assumed that the relay assists the wire-tapper, not the destination. The relay's objective is to decrease the achievable secrecy rates. However, since the destination is also allowed to listen to the relay's transmission, it also benefits from the relay in terms of achievable rates. Direct transmission, amplify-and-forward (AF), decode-and-forward (DF) and compress-and-forward (CF) relaying schemes are compared in terms of secrecy rates. It is shown that the best relaying strategy depends on relay's location. Comparison of relaying protocols and best power allocation schemes, when the relay assists the source-destination communication, do not readily extend to the case when the relay assists the wire-tapper.

Original languageEnglish (US)
Title of host publication2007 IEEE Information Theory Workshop, ITW 2007, Proceedings
Pages595-600
Number of pages6
DOIs
StatePublished - 2007
Event2007 IEEE Information Theory Workshop, ITW 2007 - Lake Tahoe, CA, United States
Duration: Sep 2 2007Sep 6 2007

Other

Other2007 IEEE Information Theory Workshop, ITW 2007
CountryUnited States
CityLake Tahoe, CA
Period9/2/079/6/07

Fingerprint

Wire
Secure communication
Destination
Communication
Secrecy

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Information Systems
  • Information Systems and Management

Cite this

Yuksel, M., & Erkip, E. (2007). Secure communication with a relay helping the wire-tapper. In 2007 IEEE Information Theory Workshop, ITW 2007, Proceedings (pp. 595-600). [4313141] https://doi.org/10.1109/ITW.2007.4313141

Secure communication with a relay helping the wire-tapper. / Yuksel, Melda; Erkip, Elza.

2007 IEEE Information Theory Workshop, ITW 2007, Proceedings. 2007. p. 595-600 4313141.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Yuksel, M & Erkip, E 2007, Secure communication with a relay helping the wire-tapper. in 2007 IEEE Information Theory Workshop, ITW 2007, Proceedings., 4313141, pp. 595-600, 2007 IEEE Information Theory Workshop, ITW 2007, Lake Tahoe, CA, United States, 9/2/07. https://doi.org/10.1109/ITW.2007.4313141
Yuksel M, Erkip E. Secure communication with a relay helping the wire-tapper. In 2007 IEEE Information Theory Workshop, ITW 2007, Proceedings. 2007. p. 595-600. 4313141 https://doi.org/10.1109/ITW.2007.4313141
Yuksel, Melda ; Erkip, Elza. / Secure communication with a relay helping the wire-tapper. 2007 IEEE Information Theory Workshop, ITW 2007, Proceedings. 2007. pp. 595-600
@inproceedings{17b7d881c4aa4828bd1a4261bacf81d1,
title = "Secure communication with a relay helping the wire-tapper",
abstract = "A four terminal Gaussian network, composed of a single source-destination pair, a relay and a wire-tapper is considered. Unlike the relay channel with a wire-tapper, it is assumed that the relay assists the wire-tapper, not the destination. The relay's objective is to decrease the achievable secrecy rates. However, since the destination is also allowed to listen to the relay's transmission, it also benefits from the relay in terms of achievable rates. Direct transmission, amplify-and-forward (AF), decode-and-forward (DF) and compress-and-forward (CF) relaying schemes are compared in terms of secrecy rates. It is shown that the best relaying strategy depends on relay's location. Comparison of relaying protocols and best power allocation schemes, when the relay assists the source-destination communication, do not readily extend to the case when the relay assists the wire-tapper.",
author = "Melda Yuksel and Elza Erkip",
year = "2007",
doi = "10.1109/ITW.2007.4313141",
language = "English (US)",
isbn = "1424415640",
pages = "595--600",
booktitle = "2007 IEEE Information Theory Workshop, ITW 2007, Proceedings",

}

TY - GEN

T1 - Secure communication with a relay helping the wire-tapper

AU - Yuksel, Melda

AU - Erkip, Elza

PY - 2007

Y1 - 2007

N2 - A four terminal Gaussian network, composed of a single source-destination pair, a relay and a wire-tapper is considered. Unlike the relay channel with a wire-tapper, it is assumed that the relay assists the wire-tapper, not the destination. The relay's objective is to decrease the achievable secrecy rates. However, since the destination is also allowed to listen to the relay's transmission, it also benefits from the relay in terms of achievable rates. Direct transmission, amplify-and-forward (AF), decode-and-forward (DF) and compress-and-forward (CF) relaying schemes are compared in terms of secrecy rates. It is shown that the best relaying strategy depends on relay's location. Comparison of relaying protocols and best power allocation schemes, when the relay assists the source-destination communication, do not readily extend to the case when the relay assists the wire-tapper.

AB - A four terminal Gaussian network, composed of a single source-destination pair, a relay and a wire-tapper is considered. Unlike the relay channel with a wire-tapper, it is assumed that the relay assists the wire-tapper, not the destination. The relay's objective is to decrease the achievable secrecy rates. However, since the destination is also allowed to listen to the relay's transmission, it also benefits from the relay in terms of achievable rates. Direct transmission, amplify-and-forward (AF), decode-and-forward (DF) and compress-and-forward (CF) relaying schemes are compared in terms of secrecy rates. It is shown that the best relaying strategy depends on relay's location. Comparison of relaying protocols and best power allocation schemes, when the relay assists the source-destination communication, do not readily extend to the case when the relay assists the wire-tapper.

UR - http://www.scopus.com/inward/record.url?scp=45249083184&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=45249083184&partnerID=8YFLogxK

U2 - 10.1109/ITW.2007.4313141

DO - 10.1109/ITW.2007.4313141

M3 - Conference contribution

AN - SCOPUS:45249083184

SN - 1424415640

SN - 9781424415649

SP - 595

EP - 600

BT - 2007 IEEE Information Theory Workshop, ITW 2007, Proceedings

ER -