Elements of information theory
Elements of information theory
Wcdma for Umts
Capacity of cognitive interference channels with and without secrecy
IEEE Transactions on Information Theory
IEEE Transactions on Wireless Communications
Fading channels: information-theoretic and communications aspects
IEEE Transactions on Information Theory
The throughput of hybrid-ARQ protocols for the Gaussian collision channel
IEEE Transactions on Information Theory
The throughput of some wireless multiaccess systems
IEEE Transactions on Information Theory
Service outage based power and rate allocation for parallel fading channels
IEEE Transactions on Information Theory
Applications of LDPC Codes to the Wiretap Channel
IEEE Transactions on Information Theory
Multiple-Access Channels With Confidential Messages
IEEE Transactions on Information Theory
Secure Communication Over Fading Channels
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
On the Secrecy Capacity of Fading Channels
IEEE Transactions on Information Theory
Information Theoretic Security
Foundations and Trends in Communications and Information Theory
Secret-key sharing based on layered broadcast coding over fading channels
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Relay selection for secure cooperative networks with jamming
IEEE Transactions on Wireless Communications
Fading cognitive multiple-access channels with confidential messages
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Performance of hybrid-ARQ in block-fading channels: a fixed outage probability analysis
IEEE Transactions on Communications
Hi-index | 754.84 |
The focus of this paper is an information-theoretic study of retransmission protocols for reliable packet communication under a secrecy constraint. The hybrid automatic retransmission request (HARQ) protocol is revisited for a block-fading wiretap channel. Here, two legitimate users communicate over a block-fading channel in the presence of a passive eavesdropper who intercepts the transmissions through an independent block-fading channel. In this model, the transmitter obtains a 1-bit ACK/NACK feedback from the legitimate receiver via an error-free public channel. Both reliability and confidentiality of secure HARQ protocols are studied through the joint consideration of channel coding, secrecy coding, and retransmission protocols. In particular, the error and secrecy performance of repetition time diversity (RTD) and incremental redundancy (INR) protocols are investigated based on Wyner code sequences. These protocols ensure that the confidential message is decoded successfully by the legitimate receiver and is kept completely secret from the eavesdropper for a set of channel realizations. This paper illustrates that there exists a rate-compatible Wyner code family which ensures a secure INR protocol. Further, it defines the connection outage and secrecy outage probabilities to characterize the tradeoff between the reliability of the legitimate communication link and the confidentiality with respect to the eavesdropper's link. For a given connection/secrecy outage probability pair, an achievable throughput of secure HARQ protocols is derived for block-fading channels. Finally, both asymptotic analysis and numerical calculations demonstrate the benefits of HARQ protocols to throughput and secrecy.