Secure adaptive transmission in two-way relay wiretap channels

Chenxi Liu, Nan Yang, Shihao Yan, Jinhong Yuan, Robert Malaney

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Citations (Scopus)

Abstract

In this work we investigate, for the first time, the secrecy performance of a single-input single-output single antenna eavesdropper two-way relay wiretap channel, in which only statistical channel state information from the eavesdropper is available at the sources. We propose a secure adaptive transmission scheme for this two-way relay wiretap channel in which the sum effective secrecy throughput is utilized as the performance metric. Given our adopted system model, we determine the wiretap code rate parameters for the two sources which maximize this performance metric. In addition, we explore the relationship between the sum effective secrecy throughput and the transmit powers at the sources, demonstrating how the sum effective secrecy for the adopted system is maximized at certain transmit powers. Given the practical system model we investigate, the results reported here are important for the deployment of physical layer security in two-way relay wiretap channels.

Original languageEnglish
Title of host publication2014 IEEE/CIC International Conference on Communications in China, ICCC 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages664-669
Number of pages6
ISBN (Electronic)9781479941469
DOIs
Publication statusPublished - 12 Jan 2015
Externally publishedYes
Event2014 IEEE/CIC International Conference on Communications in China, ICCC 2014 - Shanghai, China
Duration: 13 Oct 201415 Oct 2014

Publication series

Name2014 IEEE/CIC International Conference on Communications in China, ICCC 2014

Conference

Conference2014 IEEE/CIC International Conference on Communications in China, ICCC 2014
Country/TerritoryChina
CityShanghai
Period13/10/1415/10/14

Fingerprint

Dive into the research topics of 'Secure adaptive transmission in two-way relay wiretap channels'. Together they form a unique fingerprint.

Cite this