TY - GEN
T1 - Secure relaying
T2 - 2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009
AU - Kim, Tùng T.
AU - Poor, H. Vincent
PY - 2009
Y1 - 2009
N2 - Secure communication over a half-duplex relay system in the presence of an external wiretapper is investigated. In such a scenario, conventional relaying protocols generally provide secrecy rates that converge to a finite constant in the high signal-to-noise ratio (SNR) regime. It is shown in this work that strictly superior performance can be achieved by allowing the destination to transfer random keys in the form of known interference to the relay insecurely over the wireless medium. When there is no direct link between the source and the destination, an amplify-and-forward (AF) protocol is shown to achieve a secrecy rate that scales as 1/2 log SNR, if each of the legitimate nodes has a single antenna only. However, in the presence of a direct link between source and destination, this scaling rule no longer applies. The bottleneck of the AF scheme in the presence of a direct source-destination link is identified, motivating the use of multiple antennas at the destination to almost surely guarantee a secure degree of freedom of one half over the channel. The results hold even if the eavesdropper has more antennas than the source and the relay combined.
AB - Secure communication over a half-duplex relay system in the presence of an external wiretapper is investigated. In such a scenario, conventional relaying protocols generally provide secrecy rates that converge to a finite constant in the high signal-to-noise ratio (SNR) regime. It is shown in this work that strictly superior performance can be achieved by allowing the destination to transfer random keys in the form of known interference to the relay insecurely over the wireless medium. When there is no direct link between the source and the destination, an amplify-and-forward (AF) protocol is shown to achieve a secrecy rate that scales as 1/2 log SNR, if each of the legitimate nodes has a single antenna only. However, in the presence of a direct link between source and destination, this scaling rule no longer applies. The bottleneck of the AF scheme in the presence of a direct source-destination link is identified, motivating the use of multiple antennas at the destination to almost surely guarantee a secure degree of freedom of one half over the channel. The results hold even if the eavesdropper has more antennas than the source and the relay combined.
UR - http://www.scopus.com/inward/record.url?scp=77949617580&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77949617580&partnerID=8YFLogxK
U2 - 10.1109/ALLERTON.2009.5394873
DO - 10.1109/ALLERTON.2009.5394873
M3 - Conference contribution
AN - SCOPUS:77949617580
SN - 9781424458714
T3 - 2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009
SP - 1076
EP - 1081
BT - 2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009
Y2 - 30 September 2009 through 2 October 2009
ER -