2009
DOI: 10.1109/tit.2009.2013043
|View full text |Cite
|
Sign up to set email alerts
|

On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels

Abstract: The focus of this paper is an information-theoretic study of retransmission protocols for reliable packet communication under a secrecy constraint. The hybrid automatic retransmission request (HARQ) protocol is revisited for a block-fading wire-tap channel, in which two legitimate users communicate over a block-fading channel in the presence of a passive eavesdropper who intercepts the transmissions through an independent block-fading channel. In this model, the transmitter obtains a 1-bit ACK/NACK feedback… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

4
196
1

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 131 publications
(201 citation statements)
references
References 31 publications
4
196
1
Order By: Relevance
“…Each ARQ epoch is assumed to be contained in one coherence interval (i.e., fixed channel gains) and that different epochs correspond to independent coherence intervals (the same assumptions as [4]). We denote the constant rate used in each transmission frame by R 0 bits/channel use.…”
Section: System Modelmentioning
confidence: 99%
See 4 more Smart Citations
“…Each ARQ epoch is assumed to be contained in one coherence interval (i.e., fixed channel gains) and that different epochs correspond to independent coherence intervals (the same assumptions as [4]). We denote the constant rate used in each transmission frame by R 0 bits/channel use.…”
Section: System Modelmentioning
confidence: 99%
“…2) It is clear from (6) that a positive secret key rate is achievable under very mild conditions on the channels experienced by Bob and Eve. More precisely, unlike the approach proposed in [4], Theorem 1 establishes the achievability of a positive perfect secrecy rate by appropriately exploiting the ARQ feedback even when Eve's average SNR is higher than that of Bob. 3) Theorem 1 characterizes the fundamental limit on secret key sharing and not message transmission.…”
Section: Information Theoretic Foundationmentioning
confidence: 99%
See 3 more Smart Citations