Title :
Secure Communication Over Parallel Relay Channel
Author :
Awan, Zohaib Hassan ; Zaidi, Abdellatif ; Vandendorpe, Luc
Author_Institution :
ICTEAM Inst., Univ. catholique de Louvain, Louvain-la-Neuve, Belgium
fDate :
4/1/2012 12:00:00 AM
Abstract :
We investigate the problem of secure communication over parallel relay channel in the presence of a passive eavesdropper. We consider a four-terminal relay-eavesdropper channel which consists of multiple relay-eavesdropper channels as subchannels. For the discrete memoryless model, we establish outer and inner bounds on the rate-equivocation region. The inner bound allows mode selection at the relay. For each subchannel, secure transmission is obtained through one of two coding schemes at the relay: decoding-and-forwarding the source message or confusing the eavesdropper through noise injection. For the Gaussian memoryless channel, we establish lower and upper bounds on the perfect secrecy rate. Furthermore, we study a special case in which the relay does not hear the source and show that under certain conditions the lower and upper bounds coincide. The results established for the parallel Gaussian relay-eavesdropper channel are then applied to study the fading relay-eavesdropper channel. Analytical results are illustrated through some numerical examples.
Keywords :
Gaussian channels; channel coding; decode and forward communication; fading channels; telecommunication security; Gaussian memoryless channel; coding schemes; discrete memoryless model; fading relay-eavesdropper channel; four-terminal relay-eavesdropper channel; noise injection; parallel Gaussian relay-eavesdropper channel; parallel relay channel; passive eavesdropper; perfect secrecy rate; rate-equivocation region; relay mode selection; secure communication; source message decoding-and-forwarding method; Context; Delta modulation; Fading; Noise measurement; Receivers; Relays; Upper bound; Eavesdropping; fading channels; parallel relay channels; secrecy; wire-tap channel;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2012.2185493