Interaction and Secrecy in Gaussian Diamond Relay Networks
نویسنده
چکیده
Interaction and Secrecy in Gaussian Diamond Relay Networks Wanyao Zhao Master of Applied Science Graduate Department of Electrical and Computer Engineering University of Toronto 2015 In this thesis, the physical layer secrecy for several Gaussian network models are studied. We first establish the secure degrees of freedom (d.o.f.) of helper-assisted Gaussian wiretap channel with shared keys between the transmitter and the helpers. As a natural extension, we next consider the Gaussian diamond wiretap channel where the relays can obtain common randomness from the source node. Secure d.o.f. for the diamond wiretap channel is established and upper and lower bounds for the multi-relay case are also provided. We then study the diamond channel with conferencing links and investigate the effects of the conferencing links under Gaussian channel as well as binary adder MAC channel. Finally we discuss the artificial noise transmission for secrecy with constantamplitude constraint for the beamforming vector. The effects of such constraint are examined and algorithms to solve for the beamforming vector are given.
منابع مشابه
On the Achievable Rate-Regions for the Gaussian Two-way Diamond Channels
In this channel,we study rate region of a Gaussian two-way diamond channel which operates in half-duplex mode. In this channel, two transceiver (TR) nodes exchange their messages with the help of two relay nodes. We consider a special case of the Gaussian two-way diamond channels which is called Compute-and-Forward Multiple Access Channel (CF-MAC). In the CF-MAC, the TR nodes transmit their mes...
متن کاملInformation-Theoretic Secrecy for Wireless Networks
The aim of information-theoretic secrecy is to ensure that an eavesdropper who listens to the wireless transmission of a message can only collect an arbitrarily small number of information bits about this message. In contrast to cryptography, there are no assumptions on the computational power of the eavesdropper. Information-theoretically secret communication has been studied for many particul...
متن کاملPerformance Study of Untrusted Relay Network Utilizing Cooperative Jammer
Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...
متن کاملSecure Analog Network Coding in Layered Networks
We consider a class of Gaussian layered networks where a source communicates with a destination through L intermediate relay layers with N nodes in each layer in the presence of a single eavesdropper which can overhear the transmissions of the nodes in any one layer. The problem of maximum secrecy rate achievable with analog network coding for a unicast communication over such layered wireless ...
متن کاملOn Deterministic Models for Gaussian Networks
In this thesis we study wireless networks modeled by the additive white Gaussian noise (AWGN) model. The AWGN capacity region of most network topologies is unknown, which means that the optimal transmission scheme is unknown as well. This motivates the search for capacity approximations and for approximately optimal schemes. Deterministic channel models have been proposed as means to approximat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015