DocumentCode :
2602697
Title :
Coding schemes for confidential communications
Author :
Tang, Xiaojun ; Ruoheng Liu ; Spasojevic, Predrag ; Poor, H. Vincent
Author_Institution :
WINLAB, Rutgers Univ., North Brunswick, NJ
fYear :
2008
fDate :
Jan. 27 2008-Feb. 1 2008
Firstpage :
370
Lastpage :
378
Abstract :
In this paper, the hybrid automatic retransmission request (HARQ) coding scheme is revisited for a block-fading wire-tap channel, in which two legitimate users communicate over a block-fading channel in the presence of a passive eavesdropper who intercepts the transmissions through an independent block-fading channel. In this model, the transmitter obtains a 1-bit ACK/NACK feedback from the legitimate receiver via an error-free public channel. Both reliability and confidentiality of secure HARQ protocols are studied by the joint consideration of channel coding, secrecy coding, and retransmission protocols. In particular, the error and secrecy performance of repetition time diversity (RTD) and incremental redundancy (INR) schemes are investigated based on good Wyner code sequences, which ensure that the confidential message is decoded successfully by the legitimate receiver and is kept in total ignorance by the eavesdropper for a given set of channel realizations. This paper first illustrates that there exists a good rate-compatible Wyner code family which ensures a secure INR protocol. Next, two types of outage probabilities, connection outage and secrecy outage probabilities are defined in order to characterize the tradeoff between the reliability of the legitimate communication link and the confidentiality with respect to the eavesdropperpsilas link. For a given connection/secrecy outage probability pair, an achievable throughput of secure HARQ protocols is derived for block-fading channels. Finally, both asymptotic analysis and numerical computations demonstrate the benefits of HARQ protocols to throughput and secrecy.
Keywords :
automatic repeat request; channel coding; diversity reception; fading channels; protocols; telecommunication security; ACK/NACK feedback; HARQ coding scheme; HARQ protocols; Wyner code sequences; asymptotic analysis; block-fading channel; channel coding; confidential communications; confidential message; connection outage probabilities; error-free public channel; hybrid automatic retransmission request coding scheme; incremental redundancy schemes; legitimate communication link; legitimate receiver; passive eavesdropper; repetition time diversity schemes; retransmission protocols; secrecy coding; secrecy outage probabilities; wire-tap channel; Channel coding; Communication system security; Decoding; Diversity reception; Protocols; Redundancy; Telecommunication network reliability; Throughput; Transmitters; Wireless networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory and Applications Workshop, 2008
Conference_Location :
San Diego, CA
Print_ISBN :
978-1-4244-2670-6
Type :
conf
DOI :
10.1109/ITA.2008.4601077
Filename :
4601077
Link To Document :
بازگشت