Title :
Cross-layer security in two-hop wireless Gaussian relay network with untrusted relays
Author :
Kaliszan, Michal ; Mohammadi, Javad ; Stanczak, Slawomir
Author_Institution :
Heinrich-Hertz-Lehrstuhl fur Informationstheorie und Theor. Informationstechnik, Tech. Univ. Berlin, Berlin, Germany
Abstract :
This paper deals with the challenge of providing information-theoretic secrecy in a two-hop wireless channel with multiple untrusted relay nodes. Instead of perfect secrecy (in the information-theoretic sense), of interest here is a cross-layer approach where only parts of relayed information are protected at the physical layer against eavesdropping at relay nodes. For both decode-and-forward and amplify-and-forward relaying strategies, we present a novel framework for designing secrecy schemes for two-hop relay channels that ensure some predefined level of partial secrecy. The paper is concluded by some numerical simulations to show the interplay between different system parameters such as the the rate, secrecy factor, the number of relays and antennas.
Keywords :
amplify and forward communication; decode and forward communication; numerical analysis; radio networks; telecommunication security; wireless channels; amplify-and-forward relaying strategies; antennas; cross-layer approach; cross-layer security; decode-and-forward relaying strategies; eavesdropping; information-theoretic secrecy; multiple untrusted relay nodes; numerical simulations; partial secrecy; relay nodes; relayed information; secrecy factor; secrecy schemes; two-hop relay channels; two-hop wireless channel; two-hop wireless gaussian relay network; untrusted relays; Base stations; Communication system security; Optimization; Protocols; Relays; Security; Vectors; Untrusted relays; cross-layer security; transmit beamforming;
Conference_Titel :
Communications (ICC), 2013 IEEE International Conference on
Conference_Location :
Budapest
DOI :
10.1109/ICC.2013.6654854