The Wiretapped Diamond-Relay Channel

Cited 3 time in webofscience Cited 3 time in scopus
  • Hit : 304
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorLee, Si-Hyeonko
dc.contributor.authorKhisti, Ashishko
dc.date.accessioned2020-03-19T02:25:18Z-
dc.date.available2020-03-19T02:25:18Z-
dc.date.created2020-02-25-
dc.date.created2020-02-25-
dc.date.issued2018-11-
dc.identifier.citationIEEE TRANSACTIONS ON INFORMATION THEORY, v.64, no.11, pp.7194 - 7207-
dc.identifier.issn0018-9448-
dc.identifier.urihttp://hdl.handle.net/10203/272660-
dc.description.abstractIn this paper, we study a diamond-relay channel where the source is connected to M relays through orthogonal links and the relays transmit to the destination over a wireless multiple-access channel in the presence of an eavesdropper. The eavesdropper not only observes the relay transmissions through another multiple-access channel but also observes a certain number of source-relay links. The legitimate terminals know neither the eavesdropper's channel state information nor the location of source-relay links revealed to the eavesdropper except the total number of such links. For this wiretapped diamond-relay channel, we establish the optimal secure d.o.f. In the achievability part, our proposed scheme uses the source-relay links to transmit a judiciously constructed combination of message symbols, artificial noise symbols, and fictitious message symbols associated with secure network coding. The relays use a combination of beamforming and interference alignment in their transmission scheme. For the converse part, we take a genie-aided approach assuming that the location of wiretapped links is known.-
dc.languageEnglish-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleThe Wiretapped Diamond-Relay Channel-
dc.typeArticle-
dc.identifier.wosid000448029300020-
dc.identifier.scopusid2-s2.0-85052699140-
dc.type.rimsART-
dc.citation.volume64-
dc.citation.issue11-
dc.citation.beginningpage7194-
dc.citation.endingpage7207-
dc.citation.publicationnameIEEE TRANSACTIONS ON INFORMATION THEORY-
dc.identifier.doi10.1109/TIT.2018.2866146-
dc.contributor.localauthorLee, Si-Hyeon-
dc.contributor.nonIdAuthorKhisti, Ashish-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorInformation theoretic security-
dc.subject.keywordAuthorphysical layer security-
dc.subject.keywordAuthorrelay communications-
dc.subject.keywordPlusWIRE-TAP CHANNEL-
dc.subject.keywordPlusGAUSSIAN MULTIPLE-ACCESS-
dc.subject.keywordPlusBROADCAST CHANNELS-
dc.subject.keywordPlusSECURE DEGREES-
dc.subject.keywordPlusINTERFERENCE ALIGNMENT-
dc.subject.keywordPlusCONFIDENTIAL MESSAGES-
dc.subject.keywordPlusARTIFICIAL-NOISE-
dc.subject.keywordPlusFREEDOM-
dc.subject.keywordPlusSECRECY-
dc.subject.keywordPlusANTENNAS-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 3 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0