TY - JOUR
T1 - Achievable Secrecy Rates for Relay-Eavesdropper Channel Based on the Application of Noisy Network Coding
AU - Xu, Peng
AU - Ding, Zhiguo
AU - Dai, Xuchu
N1 - Funding Information:
Manuscript received October 4, 2017; revised January 5, 2018 and February 1, 2018; accepted February 1, 2018. Date of publication February 12, 2018; date of current version March 2, 2018. The work of P. Xu was supported in part by the National Natural Science Foundation of China under Grant 61701066, in part by the Scientific and Technological Research Program of Chongqing Municipal Education Commission under Grant KJ1704088, and in part by the Doctoral Initial Funding of Chongqing University of Posts and Telecommunications under Grant A2016-84. The work of Z. Ding was supported in part by the UK EPSRC under Grant EP/ L025272/1 and in part by the H2020-MSCA-RISE-2015 under Grant 690750. The work of X. Dai was supported by the National Natural Science Foundation of China under Grant 61471334. This paper was presented at the 2013 IEEE Wireless Communications and Networking Conference [1]. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Walid Saad. (Corresponding author: Peng Xu.) P. Xu is with the Chongqing Key Laboratory of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China (e-mail: [email protected]).
Publisher Copyright:
© 2005-2012 IEEE.
PY - 2018/7
Y1 - 2018/7
N2 - In this paper, we consider the design of a new secure transmission scheme for a four-node relay-eavesdropper channel, where user cooperation is used to facilitate secure communications. The key idea of the proposed achievable scheme is to apply the compression relaying concept of noisy network coding (NNC) to the secrecy communication scenario. But different from the original non-secrecy NNC, the compression rate at the relay is adaptively chosen according to the eavesdropping channel. Particularly, helping interference information is injected into the compression codebook at the relay by simply enlarging the compression rate, which is to effectively suppress the eavesdropping channel. Closed-form expressions of the secrecy rates achieved by the proposed NNC-based secure scheme are characterized for both the discrete memoryless and Gaussian relay-eavesdropper channels, where the optimal compression rate and the optimal transmit power at the relay are also determined. The proposed secure scheme can be viewed as a general framework, which naturally combines the NNC compression relaying scheme with the interference-assisted scheme. Analytical and numerical results demonstrate that the proposed secure scheme offers constant performance gains over typical existing cooperative secure schemes.
AB - In this paper, we consider the design of a new secure transmission scheme for a four-node relay-eavesdropper channel, where user cooperation is used to facilitate secure communications. The key idea of the proposed achievable scheme is to apply the compression relaying concept of noisy network coding (NNC) to the secrecy communication scenario. But different from the original non-secrecy NNC, the compression rate at the relay is adaptively chosen according to the eavesdropping channel. Particularly, helping interference information is injected into the compression codebook at the relay by simply enlarging the compression rate, which is to effectively suppress the eavesdropping channel. Closed-form expressions of the secrecy rates achieved by the proposed NNC-based secure scheme are characterized for both the discrete memoryless and Gaussian relay-eavesdropper channels, where the optimal compression rate and the optimal transmit power at the relay are also determined. The proposed secure scheme can be viewed as a general framework, which naturally combines the NNC compression relaying scheme with the interference-assisted scheme. Analytical and numerical results demonstrate that the proposed secure scheme offers constant performance gains over typical existing cooperative secure schemes.
KW - Information theoretic secrecy
KW - Interference
KW - Noisy network coding
KW - Relay-eavesdropper channel
UR - http://www.scopus.com/inward/record.url?scp=85041824349&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2018.2805601
DO - 10.1109/TIFS.2018.2805601
M3 - Article
AN - SCOPUS:85041824349
SN - 1556-6013
VL - 13
SP - 1736
EP - 1751
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
IS - 7
ER -