• DocumentCode
    1756685
  • Title

    End-to-End Secure Multi-Hop Communication with Untrusted Relays

  • Author

    Xiang He ; Yener, Aylin

  • Author_Institution
    Dept. of Electr. Eng., Pennsylvania State Univ., University Park, PA, USA
  • Volume
    12
  • Issue
    1
  • fYear
    2013
  • fDate
    41275
  • Firstpage
    1
  • Lastpage
    11
  • Abstract
    A multi-hop line network is considered, where each node can receive signals transmitted by its two neighbors. As such, the model embodies both the interference and broadcast aspects of wireless networks. The leftmost node wishes to send messages to the rightmost node, while keeping these messages confidential from all the intermediate relay nodes. In this setting where any or all of the relay nodes can be eavesdroppers, it is shown that end-to-end secure and reliable communication is possible. Notably, it is shown that an end-to-end secrecy rate that is independent of the number of hops, i.e., intermediate eavesdroppers, is achievable by means of a carefully designed transmission schedule, compute-and-forward relaying and coding strategy utilizing nested lattice codes. The achievable rate obtained indicates that imposing secrecy constraints penalizes the capacity by at most 1 bit per channel use. Therefore, it is concluded that information theoretic secrecy can be guaranteed for this model irrespective of eavesdropping relays and a fixed modest cost for the end-to-end rate.
  • Keywords
    radio networks; scheduling; telecommunication network reliability; telecommunication security; broadcast aspect; coding strategy; compute-and-forward relaying; eavesdropping relays; end-to-end multihop communication reliability; end-to-end multihop communication security; end-to-end secrecy rate; information theoretic secrecy; interference aspect; intermediate eavesdroppers; intermediate relay nodes; multihop line network; nested lattice codes; transmission schedule; untrusted relays; wireless networks; Interference; Lattices; Relays; Spread spectrum communication; Vectors; Wireless networks; Information theoretic secrecy; line network; nested lattice code; untrusted relays;
  • fLanguage
    English
  • Journal_Title
    Wireless Communications, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1536-1276
  • Type

    jour

  • DOI
    10.1109/TWC.2012.120412.101358
  • Filename
    6378495