2008 IEEE International Symposium on Information Theory 2008
DOI: 10.1109/isit.2008.4595384
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy in cooperative relay broadcast channels

Abstract: Abstract-We investigate the effects of user cooperation on the secrecy of broadcast channels by considering a cooperative relay broadcast channel. We show that user cooperation can increase the achievable secrecy region. We propose an achievable scheme that combines Marton's coding scheme for broadcast channels and Cover and El Gamal's compress-and-forward scheme for relay channels. We derive outer bounds for the rate-equivocation region using auxiliary random variables for single-letterization. Finally, we co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
63
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 63 publications
(65 citation statements)
references
References 30 publications
2
63
0
Order By: Relevance
“…The signals are received by the legitimate user as a sequence Multiple-user versions of the secrecy problem have been considered for various channel models. [22], [23] consider multiple-access channels, [24], [25] consider broadcast channels, and [26]- [29] consider secrecy in relay channels.…”
Section: Information-theoretic Secrecymentioning
confidence: 99%
“…The signals are received by the legitimate user as a sequence Multiple-user versions of the secrecy problem have been considered for various channel models. [22], [23] consider multiple-access channels, [24], [25] consider broadcast channels, and [26]- [29] consider secrecy in relay channels.…”
Section: Information-theoretic Secrecymentioning
confidence: 99%
“…Practical applications of low-density parity-check (LDPC) codes for Gaussian wiretap channel were studied in [25][26][27]. The physical-layer security in cooperative relaying networks has also been investigated in recent research works [28][29][30][31][32][33].…”
Section: Introductionmentioning
confidence: 99%
“…Diversity techniques, in which Alice, Bob and/or Eve may be equipped with multiple antennas, are investigated in [5][6][7][8]. Recently, cooperative communication schemes have also been analyzed in the context of PHY security [9][10][11][12], and more recently [13] gives a summary of recent advances in cooperative security at the physical layer.…”
Section: Introductionmentioning
confidence: 99%