2007 41st Annual Conference on Information Sciences and Systems 2007
DOI: 10.1109/ciss.2007.4298265
|View full text |Cite
|
Sign up to set email alerts
|

The Relay Channel with a Wire-tapper

Abstract: In this work a relay channel with a wire-tapper is studied for both discrete memoryless and Gaussian channels. The wire-tapper receives a physically degraded version of the destination's signal. We find inner and outer bounds for the capacity-equivocation rate region. We also argue that when the destination receives a physically degraded version of the relay's signal, inner and outer bounds meet for some special cases.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
49
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 64 publications
(50 citation statements)
references
References 15 publications
1
49
0
Order By: Relevance
“…If we disable the confidential messages sent to user 1 by setting , the channel model reduces to a relay channel with secrecy constraints, and the achievable equivocation rate for the second user becomes (15) subject to (16) and the corresponding joint distribution reduces to . Further, if we make the potentially suboptimal selection of , the corresponding achievable secrecy rate and the constraint coincide with their counterparts found in [11], [13] for the relay channel.…”
Section: Remarkmentioning
confidence: 99%
See 1 more Smart Citation
“…If we disable the confidential messages sent to user 1 by setting , the channel model reduces to a relay channel with secrecy constraints, and the achievable equivocation rate for the second user becomes (15) subject to (16) and the corresponding joint distribution reduces to . Further, if we make the potentially suboptimal selection of , the corresponding achievable secrecy rate and the constraint coincide with their counterparts found in [11], [13] for the relay channel.…”
Section: Remarkmentioning
confidence: 99%
“…[8], [9] consider broadcast channels (BCs) where both receivers want to have secure communication with the transmitter; in here as well, each receiver of the BC is an eavesdropper for the other user. [10]- [16] consider secrecy in relay channels, where in [10]- [13], the relay is the eavesdropper, while in [14], [15] there is an external eavesdropper. In [16], the relay helps the transmitter to improve its rate while it receives confidential messages that should be kept hidden from the main receiver.…”
Section: Introductionmentioning
confidence: 99%
“…7.6) which was considered in [26] and [30]. In the relay-eavesdropper channel, the relay node will use DAF and CAF methods to strengthen the main link.…”
Section: Active Cooperation For Secrecymentioning
confidence: 99%
“…The secrecy sum capacity for a reverse broadcast channel is derived subject to this restrictive assumption. The notion of the wire-tap channel is also extended to multiple access channels [13]- [16], relay channels [17]- [20], parallel channels [21] and MIMO channels [22]- [27]. Some other related works on the communication of confidential messages can be found in [28]- [32].…”
Section: Introductionmentioning
confidence: 99%