Information Theoretic Security
Foundations and Trends in Communications and Information Theory
Secrecy capacity of a class of broadcast channels with an eavesdropper
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Secrecy capacity of a class of orthogonal relay eavesdropper channels
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Capacity bounds for broadcast channels with confidential messages
IEEE Transactions on Information Theory
Authentication over noisy channels
IEEE Transactions on Information Theory
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel
IEEE Transactions on Information Theory
Physical layer security game: how to date a girl with her boyfriend on the same table
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Information secrecy from multiple eavesdroppers in orthogonal relay channels
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
The secrecy capacity of the semi-deterministic broadcast channel
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Wiretap channel type II with an active eavesdropper
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Secure diversity-multiplexing tradeoffs in MIMO relay channels
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Relay selection for secure cooperative networks with jamming
IEEE Transactions on Wireless Communications
Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages
IEEE Transactions on Information Theory
Improving wireless physical layer security via cooperating relays
IEEE Transactions on Signal Processing
Secure relaying: can publicly transferred keys increase degrees of freedom?
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Ergodic secrecy capacity region of the fading broadcast channel
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Sarnoff'10 Proceedings of the 33rd IEEE conference on Sarnoff
Secrecy rate optimization under cooperation with perfect channel state information
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Secure communications with insecure feedback: breaking the high-SNR ceiling
IEEE Transactions on Information Theory
Cooperation with an untrusted relay: a secrecy perspective
IEEE Transactions on Information Theory
Two-hop secure communication using an untrusted relay
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Physical layer security game: interaction between source, eavesdropper, and friendly jammer
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
MAC with partially cooperating encoders and security constraints
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
Relay and jammer cooperation as a coalitional game in secure cooperative wireless networks
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
Optimization schemes for protective jamming
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
Securing wireless communications in transmit-beamforming systems by precoding jamming noise signals
Security and Communication Networks
Control of wireless networks with secrecy
IEEE/ACM Transactions on Networking (TON)
Wireless Personal Communications: An International Journal
Optimization Schemes for Protective Jamming
Mobile Networks and Applications
A New Relay and Jammer Selection Schemes for Secure One-Way Cooperative Networks
Wireless Personal Communications: An International Journal
Hi-index | 755.20 |
This paper establishes the utility of user cooperation in facilitating secure wireless communications. In particular, the four-terminal relay-eavesdropper channel is introduced and an outer-bound on the optimal rate-equivocation region is derived. Several cooperation strategies are then devised and the corresponding achievable rate-equivocation region are characterized. Of particular interest is the novel noise-forwarding (NF) strategy, where the relay node sends codewords independent of the source message to confuse the eavesdropper. This strategy is used to illustrate the deaf helper phenomenon, where the relay is able to facilitate secure communications while being totally ignorant of the transmitted messages. Furthermore, NF is shown to increase the secrecy capacity in the reversely degraded scenario, where the relay node fails to offer performance gains in the classical setting. The gain offered by the proposed cooperation strategies is then proved theoretically and validated numerically in the additive white Gaussian noise (AWGN) channel.