DocumentCode :
3812477
Title :
On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels
Author :
Xiaojun Tang;Ruoheng Liu;Predrag Spasojevic;H. Vincent Poor
Author_Institution :
Dept. of Electr. & Comput. Eng., Rutgers Univ., Brunswick, NJ
Volume :
55
Issue :
4
fYear :
2009
Firstpage :
1575
Lastpage :
1591
Abstract :
The focus of this paper is an information-theoretic study of retransmission protocols for reliable packet communication under a secrecy constraint. The hybrid automatic retransmission request (HARQ) protocol is revisited for a block-fading wiretap channel. Here, two legitimate users communicate over a block-fading channel in the presence of a passive eavesdropper who intercepts the transmissions through an independent block-fading channel. In this model, the transmitter obtains a 1-bit ACK/NACK feedback from the legitimate receiver via an error-free public channel. Both reliability and confidentiality of secure HARQ protocols are studied through the joint consideration of channel coding, secrecy coding, and retransmission protocols. In particular, the error and secrecy performance of repetition time diversity (RTD) and incremental redundancy (INR) protocols are investigated based on Wyner code sequences. These protocols ensure that the confidential message is decoded successfully by the legitimate receiver and is kept completely secret from the eavesdropper for a set of channel realizations. This paper illustrates that there exists a rate-compatible Wyner code family which ensures a secure INR protocol. Further, it defines the connection outage and secrecy outage probabilities to characterize the tradeoff between the reliability of the legitimate communication link and the confidentiality with respect to the eavesdropper´s link. For a given connection/secrecy outage probability pair, an achievable throughput of secure HARQ protocols is derived for block-fading channels. Finally, both asymptotic analysis and numerical calculations demonstrate the benefits of HARQ protocols to throughput and secrecy.
Keywords :
"Throughput","Protocols","Redundancy","Transmitters","Electronic mail","Wireless networks","Communication system security","Feedback","Channel coding","Decoding"
Journal_Title :
IEEE Transactions on Information Theory
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/TIT.2009.2013043
Filename :
4802331
Link To Document :
بازگشت