The Gaussian two-way relay channel with wiretapper

Sungsoo Kim, Won-Yong Shin, Koji Ishibashi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Secrecy capacity is analyzed in a Gaussian two-way relay wiretap channel (TRWC), where two legitimate source nodes wish to exchange their messages through a relay in the presence of an eavesdropper. We assume that all intended nodes operate in full-duplex mode and there is no direct path between two sources. In the Gaussian TRWC, we propose an achievable coding scheme composed of superposed lattice codes with both structured and random codebooks. A jamming strategy is further introduced at the two sources as well as at the relay to maximize the achievable secrecy rate regions, where each node allocates part of its power to jam the eavesdropper. Our result indicates that positive achievable secrecy rates are maintained even for the reversely degraded scenario. In addition, assuming two sources with equal power constraint, it is shown that the scheme asymptotically achieves within 1/2 bit from the cut-set bound based on the channel with no secrecy constraints, as the downlink phase is in the high signal-to-noise ratio regime.

Original languageEnglish
Title of host publicationConference Record of the 45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011
Pages1987-1991
Number of pages5
DOIs
Publication statusPublished - 2011 Dec 1
Event45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011 - Pacific Grove, CA, United States
Duration: 2011 Nov 62011 Nov 9

Publication series

NameConference Record - Asilomar Conference on Signals, Systems and Computers
ISSN (Print)1058-6393

Other

Other45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011
CountryUnited States
CityPacific Grove, CA
Period11/11/611/11/9

Fingerprint

Jamming
Signal to noise ratio

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Computer Networks and Communications

Cite this

Kim, S., Shin, W-Y., & Ishibashi, K. (2011). The Gaussian two-way relay channel with wiretapper. In Conference Record of the 45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011 (pp. 1987-1991). [6190373] (Conference Record - Asilomar Conference on Signals, Systems and Computers). https://doi.org/10.1109/ACSSC.2011.6190373
Kim, Sungsoo ; Shin, Won-Yong ; Ishibashi, Koji. / The Gaussian two-way relay channel with wiretapper. Conference Record of the 45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011. 2011. pp. 1987-1991 (Conference Record - Asilomar Conference on Signals, Systems and Computers).
@inproceedings{7119d724226b4a7393080febd3572569,
title = "The Gaussian two-way relay channel with wiretapper",
abstract = "Secrecy capacity is analyzed in a Gaussian two-way relay wiretap channel (TRWC), where two legitimate source nodes wish to exchange their messages through a relay in the presence of an eavesdropper. We assume that all intended nodes operate in full-duplex mode and there is no direct path between two sources. In the Gaussian TRWC, we propose an achievable coding scheme composed of superposed lattice codes with both structured and random codebooks. A jamming strategy is further introduced at the two sources as well as at the relay to maximize the achievable secrecy rate regions, where each node allocates part of its power to jam the eavesdropper. Our result indicates that positive achievable secrecy rates are maintained even for the reversely degraded scenario. In addition, assuming two sources with equal power constraint, it is shown that the scheme asymptotically achieves within 1/2 bit from the cut-set bound based on the channel with no secrecy constraints, as the downlink phase is in the high signal-to-noise ratio regime.",
author = "Sungsoo Kim and Won-Yong Shin and Koji Ishibashi",
year = "2011",
month = "12",
day = "1",
doi = "10.1109/ACSSC.2011.6190373",
language = "English",
isbn = "9781467303231",
series = "Conference Record - Asilomar Conference on Signals, Systems and Computers",
pages = "1987--1991",
booktitle = "Conference Record of the 45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011",

}

Kim, S, Shin, W-Y & Ishibashi, K 2011, The Gaussian two-way relay channel with wiretapper. in Conference Record of the 45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011., 6190373, Conference Record - Asilomar Conference on Signals, Systems and Computers, pp. 1987-1991, 45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011, Pacific Grove, CA, United States, 11/11/6. https://doi.org/10.1109/ACSSC.2011.6190373

The Gaussian two-way relay channel with wiretapper. / Kim, Sungsoo; Shin, Won-Yong; Ishibashi, Koji.

Conference Record of the 45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011. 2011. p. 1987-1991 6190373 (Conference Record - Asilomar Conference on Signals, Systems and Computers).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - The Gaussian two-way relay channel with wiretapper

AU - Kim, Sungsoo

AU - Shin, Won-Yong

AU - Ishibashi, Koji

PY - 2011/12/1

Y1 - 2011/12/1

N2 - Secrecy capacity is analyzed in a Gaussian two-way relay wiretap channel (TRWC), where two legitimate source nodes wish to exchange their messages through a relay in the presence of an eavesdropper. We assume that all intended nodes operate in full-duplex mode and there is no direct path between two sources. In the Gaussian TRWC, we propose an achievable coding scheme composed of superposed lattice codes with both structured and random codebooks. A jamming strategy is further introduced at the two sources as well as at the relay to maximize the achievable secrecy rate regions, where each node allocates part of its power to jam the eavesdropper. Our result indicates that positive achievable secrecy rates are maintained even for the reversely degraded scenario. In addition, assuming two sources with equal power constraint, it is shown that the scheme asymptotically achieves within 1/2 bit from the cut-set bound based on the channel with no secrecy constraints, as the downlink phase is in the high signal-to-noise ratio regime.

AB - Secrecy capacity is analyzed in a Gaussian two-way relay wiretap channel (TRWC), where two legitimate source nodes wish to exchange their messages through a relay in the presence of an eavesdropper. We assume that all intended nodes operate in full-duplex mode and there is no direct path between two sources. In the Gaussian TRWC, we propose an achievable coding scheme composed of superposed lattice codes with both structured and random codebooks. A jamming strategy is further introduced at the two sources as well as at the relay to maximize the achievable secrecy rate regions, where each node allocates part of its power to jam the eavesdropper. Our result indicates that positive achievable secrecy rates are maintained even for the reversely degraded scenario. In addition, assuming two sources with equal power constraint, it is shown that the scheme asymptotically achieves within 1/2 bit from the cut-set bound based on the channel with no secrecy constraints, as the downlink phase is in the high signal-to-noise ratio regime.

UR - http://www.scopus.com/inward/record.url?scp=84861321992&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84861321992&partnerID=8YFLogxK

U2 - 10.1109/ACSSC.2011.6190373

DO - 10.1109/ACSSC.2011.6190373

M3 - Conference contribution

SN - 9781467303231

T3 - Conference Record - Asilomar Conference on Signals, Systems and Computers

SP - 1987

EP - 1991

BT - Conference Record of the 45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011

ER -

Kim S, Shin W-Y, Ishibashi K. The Gaussian two-way relay channel with wiretapper. In Conference Record of the 45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011. 2011. p. 1987-1991. 6190373. (Conference Record - Asilomar Conference on Signals, Systems and Computers). https://doi.org/10.1109/ACSSC.2011.6190373