Secure communication with a relay helping the wire-tapper

Melda Yuksel, Elza Erkip

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

A four terminal Gaussian network, composed of a single source-destination pair, a relay and a wire-tapper is considered. Unlike the relay channel with a wire-tapper, it is assumed that the relay assists the wire-tapper, not the destination. The relay's objective is to decrease the achievable secrecy rates. However, since the destination is also allowed to listen to the relay's transmission, it also benefits from the relay in terms of achievable rates. Direct transmission, amplify-and-forward (AF), decode-and-forward (DF) and compress-and-forward (CF) relaying schemes are compared in terms of secrecy rates. It is shown that the best relaying strategy depends on relay's location. Comparison of relaying protocols and best power allocation schemes, when the relay assists the source-destination communication, do not readily extend to the case when the relay assists the wire-tapper.

Original languageEnglish (US)
Title of host publication2007 IEEE Information Theory Workshop, ITW 2007, Proceedings
Pages595-600
Number of pages6
DOIs
StatePublished - Dec 1 2007
Event2007 IEEE Information Theory Workshop, ITW 2007 - Lake Tahoe, CA, United States
Duration: Sep 2 2007Sep 6 2007

Publication series

Name2007 IEEE Information Theory Workshop, ITW 2007, Proceedings

Other

Other2007 IEEE Information Theory Workshop, ITW 2007
CountryUnited States
CityLake Tahoe, CA
Period9/2/079/6/07

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Information Systems
  • Information Systems and Management

Fingerprint Dive into the research topics of 'Secure communication with a relay helping the wire-tapper'. Together they form a unique fingerprint.

  • Cite this

    Yuksel, M., & Erkip, E. (2007). Secure communication with a relay helping the wire-tapper. In 2007 IEEE Information Theory Workshop, ITW 2007, Proceedings (pp. 595-600). [4313141] (2007 IEEE Information Theory Workshop, ITW 2007, Proceedings). https://doi.org/10.1109/ITW.2007.4313141