End-to-end Secure Multi-hop Communication with Untrusted Relays is Possible

被引:1
|
作者
He, Xiang [1 ]
Yener, Aylin [1 ]
机构
[1] Penn State Univ, Dept Elect Engn, Wireless Commun & Networking Lab, University Pk, PA 16802 USA
关键词
D O I
10.1109/ACSSC.2008.5074494
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
We consider a source-destination pair that can communicate only through a chain of unauthenticated intermediate relay nodes over AWGN links. In this scenario, it is desirable to use these relays-as otherwise communicating with the destination is impossible-without the relays being able to decode the information flowing through them. This in turn is tantamount to treating the relays as eavesdroppers from whom the information needs to be kept secret. An important question then becomes that of identifying the limits of reliable and secure communication in this network in the information theoretic sense. In particular, we ask whether it is possible to achieve a non-vanishing perfect secrecy rate regardless of the number of hops. In this work, we find that the answer is yes and show that a constant secrecy rate for an arbitrary number of hops is achievable by employing the combination of a lattice code and a random code.
引用
收藏
页码:681 / 685
页数:5
相关论文
共 50 条
  • [11] Composable end-to-end security of Gaussian quantum networks with untrusted relays
    Ghalaii, Masoud
    Papanastasiou, Panagiotis
    Pirandola, Stefano
    NPJ QUANTUM INFORMATION, 2022, 8 (01)
  • [12] Composable end-to-end security of Gaussian quantum networks with untrusted relays
    Masoud Ghalaii
    Panagiotis Papanastasiou
    Stefano Pirandola
    npj Quantum Information, 8
  • [13] End-to-End Versus Hop-by-Hop Soft State Refresh for Multi-hop Signaling Systems
    He, Jianhua
    Fu, Xiaoming
    Tang, Zuoyin
    2009 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2009), 2009, : 171 - +
  • [14] Hop-by-hop versus end-to-end congestion control in wireless multi-hop UWB networks
    Reena, P.
    Jacob, Lillykutty
    ADCOM 2007: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2007, : 255 - 261
  • [15] End-to-end resource allocation in OFDM based linear multi-hop networks
    Zhang, Xiaolu
    Jiao, Wenhua
    Tao, Meixia
    Wang, Wenbao
    27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 1552 - +
  • [16] End-to-End Delay in Multi-Hop Wireless Networks With Random Relay Deployment
    Liang, Yuan
    Zheng, Yu
    Ren, Jian
    Li, Tongtong
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 513 - 517
  • [17] Providing End-to-End Delay Guarantees for Multi-hop Wireless Sensor Networks
    Hou, I-Hong
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 414 - 419
  • [18] Accurate calculation of end-to-end throughput capacity for wireless multi-hop networks
    Zhao, H.-T. (haitaozhao@nudt.edu.cn), 1600, Chinese Academy of Sciences (24):
  • [19] Channel Assignment Based on the End-to-End Throughput in Multi-hop Wireless Networks
    Siris, Vasilios A.
    Stamatakis, George
    Tragos, Elias
    WIRED/WIRELESS INTERNET COMMUNICATIONS, 2011, 6649 : 422 - 433
  • [20] Scheduling Stochastic Traffic With End-to-End Deadlines in Multi-hop Wireless Networks
    Tsanikidis, Christos
    Ghaderi, Javad
    IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2024, : 651 - 660