2018
DOI: 10.1109/tifs.2018.2818076
|View full text |Cite
|
Sign up to set email alerts
|

Secure Communications for the Two-User Broadcast Channel With Random Traffic

Abstract: In this work, we study the stability region of the two-user broadcast channel (BC) with bursty data arrivals and security constraints. We consider the scenario, where one of the receivers has a secrecy constraint and its packets need to be kept secret from the other receiver. This is achieved by employing fullduplexing at the receiver with the secrecy constraint, so that it transmits a jamming signal to impede the reception of the other receiver. In this context, the stability region of the two-user BC is char… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 14 publications
(19 citation statements)
references
References 48 publications
0
19
0
Order By: Relevance
“…Data arrival at the service nodes in wireless networks is bursty however, a large number of research works in information theory assumes the presence of backlogged users [8]- [7], [9]- [13]. In [21] the stability region of a broadcast channel for two users was examined taking into consideration the security of a single link and the bursty nature of packet arrival at the sender node. The secrecy constraints of a wireless broadcast channel were exploited in [22] and [23], where a confidential broadcast transmission is directed to multiple users that need to decode their dedicated packets to remain secret from the other users.…”
Section: A Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Data arrival at the service nodes in wireless networks is bursty however, a large number of research works in information theory assumes the presence of backlogged users [8]- [7], [9]- [13]. In [21] the stability region of a broadcast channel for two users was examined taking into consideration the security of a single link and the bursty nature of packet arrival at the sender node. The secrecy constraints of a wireless broadcast channel were exploited in [22] and [23], where a confidential broadcast transmission is directed to multiple users that need to decode their dedicated packets to remain secret from the other users.…”
Section: A Related Workmentioning
confidence: 99%
“…Based on the analysis in [21], we cannot perform successive decoding at both users simultaneously because this will result in infeasible power allocations for the packet transmissions. We consider the following scenarios based on different decoding ability at the users 1) Both the users D and U treat interference as noise.…”
Section: Success Probabilities With Secrecy Constraintsmentioning
confidence: 99%
See 1 more Smart Citation
“…1 The system model where queue Q 1 has bursty traffic with arrival rate 1 and a queue Q 2 which is saturated. Receiver D 1 transmits a jamming signal of power P J to receiver D 2 to hinder eavesdropping different traffic assumptions at Q 1 and Q 2 , in contrast with [5], where the case where one queue has bursty traffic and other queue has saturated traffic is not considered.…”
Section: Throughput Analysismentioning
confidence: 99%
“…Most of the works in physical layer secrecy assume that users have always data to transmit. However, in many practical scenarios, the arrival of data is bursty in nature and the notion of stable throughput or region becomes a meaningful measure for such scenarios [2][3][4][5][6]. However, the exact characterization of delay is rather difficult, even in small multiple access networks, and remains unexplored in most cases [6].…”
Section: Introductionmentioning
confidence: 99%