Leaking rate region to eavesdroppers and untrusted relays

Chan Dai Truyen Thai, Jemin Lee, Tony Q.S. Quek

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

The trustworthiness of nodes in a network is practically a complicated concept and strongly depends on the social relationship among the nodes. For a certain model of trustworthiness, the scheme can be optimized to achieve the highest average secrecy rate based on pre-defined information about possibly malicious nodes. In such a scheme, the secrecy rate is considered as a function of the maximum achievable rate (MAR) at the destination, the MAR at the malicious nodes and the corresponding probabilities. However, in some cases, the trustworthiness model is not available, for example, an engineer does not know if a certain node is maliciously eavesdropping, such a function cannot be derived. Consequently, we need to consider the performance of a scheme in a wide range of trustworthiness levels. To evaluate the performance for such a case, in this paper, we propose a novel concept for comparing these leaking rates which is called leaking rate region. We derive the closed form of leaking rate region for the case of two untrusted relays with multiple antennas at the source and the destination.

Original languageEnglish
Title of host publication2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509013289
DOIs
Publication statusPublished - 2016
Event59th IEEE Global Communications Conference, GLOBECOM 2016 - Washington, United States
Duration: 2016 Dec 42016 Dec 8

Publication series

Name2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings

Other

Other59th IEEE Global Communications Conference, GLOBECOM 2016
Country/TerritoryUnited States
CityWashington
Period16-12-0416-12-08

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Hardware and Architecture
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Leaking rate region to eavesdroppers and untrusted relays'. Together they form a unique fingerprint.

Cite this