2018
DOI: 10.1109/tit.2018.2866146
|View full text |Cite
|
Sign up to set email alerts
|

The Wiretapped Diamond-Relay Channel

Abstract: In this paper, we study a diamond-relay channel where the source is connected to M relays through orthogonal links and the relays transmit to the destination over a wireless multiple-access channel in the presence of an eavesdropper. The eavesdropper not only observes the relay transmissions through another multiple-access channel, but also observes a certain number of source-relay links. The legitimate terminals know neither the eavesdropper's channel state information nor the location of source-relay links r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 38 publications
0
1
0
Order By: Relevance
“…In those settings, the messages are transmitted over the channels with secrecy constraints, which often incur a penalty in capacity (cf. [10], [13], [19], [24], [25], [28], [29], [31], [33], [37], [38], [40]). One way to minimize the capacity penalty incurred by secrecy constraints is to add helper(s) into the channels (see, e.g., [25], [33], [34], [36], [39], [41]- [45]).…”
Section: Introductionmentioning
confidence: 99%
“…In those settings, the messages are transmitted over the channels with secrecy constraints, which often incur a penalty in capacity (cf. [10], [13], [19], [24], [25], [28], [29], [31], [33], [37], [38], [40]). One way to minimize the capacity penalty incurred by secrecy constraints is to add helper(s) into the channels (see, e.g., [25], [33], [34], [36], [39], [41]- [45]).…”
Section: Introductionmentioning
confidence: 99%