2016 IEEE International Symposium on Information Theory (ISIT) 2016
DOI: 10.1109/isit.2016.7541813
|View full text |Cite
|
Sign up to set email alerts
|

Secure degrees of freedom of the Gaussian diamond-wiretap channel

Abstract: In this paper, we consider the Gaussian diamond-wiretap channel that consists of an orthogonal broadcast channel from a source to two relays and a Gaussian fast-fading multiple access-wiretap channel from the two relays to a legitimate destination and an eavesdropper. For the multiple access part, we consider both the case with full channel state information (CSI) and the case with no eavesdropper's CSI, at the relays and the legitimate destination. For both the cases, we establish the exact secure degrees of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
11
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(11 citation statements)
references
References 28 publications
0
11
0
Order By: Relevance
“…Let us first present the secure d.o.f. of the wiretapped diamond-relay channel when N = M , which was established in [31,Theorem 6].…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Let us first present the secure d.o.f. of the wiretapped diamond-relay channel when N = M , which was established in [31,Theorem 6].…”
Section: Resultsmentioning
confidence: 99%
“…is The achievability part of Theorem 2 when the location of wiretapped links is known can be easily proved by generalizing the proposed schemes in [31]. However, when the location of wiretapped links is unknown, it is not straightforward to extend the proposed schemes in [31] because their sub-schemes require asymmetric link d.o.f. and hence the amount of wiretapped information depends on the unknown location of wiretapped links.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…This approach has been used for example for wiretap channels in [22], [23], for relay networks [24] and for IC channels [25], [26]. It was also recently used in [27] for an s.d.o.f. analysis of the Gaussian diamond-wiretap channel, which is a multi-hop version of the G-MAC-WT.…”
Section: Introductionmentioning
confidence: 99%