End-to-end Secure Multi-hop Communication with Untrusted Relays is Possible

被引:1
|
作者
He, Xiang [1 ]
Yener, Aylin [1 ]
机构
[1] Penn State Univ, Dept Elect Engn, Wireless Commun & Networking Lab, University Pk, PA 16802 USA
关键词
D O I
10.1109/ACSSC.2008.5074494
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
We consider a source-destination pair that can communicate only through a chain of unauthenticated intermediate relay nodes over AWGN links. In this scenario, it is desirable to use these relays-as otherwise communicating with the destination is impossible-without the relays being able to decode the information flowing through them. This in turn is tantamount to treating the relays as eavesdroppers from whom the information needs to be kept secret. An important question then becomes that of identifying the limits of reliable and secure communication in this network in the information theoretic sense. In particular, we ask whether it is possible to achieve a non-vanishing perfect secrecy rate regardless of the number of hops. In this work, we find that the answer is yes and show that a constant secrecy rate for an arbitrary number of hops is achievable by employing the combination of a lattice code and a random code.
引用
收藏
页码:681 / 685
页数:5
相关论文
共 50 条
  • [41] Adaptive CSMA for Decentralized Scheduling of Multi-Hop Networks With End-to-End Deadline Constraints
    Singh, Rahul
    Kumar, P. R.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (03) : 1224 - 1237
  • [42] End-to-End Throughput Analysis of Multi-Hop Wireless Networks Using Stochastic Geometry
    Liang, Yuan
    Ren, Jian
    Li, Tongtong
    10TH EAI INTERNATIONAL CONFERENCE ON MOBILE MULTIMEDIA COMMUNICATIONS (MOBIMEDIA 2017), 2017, : 18 - 24
  • [43] A distributed scheduling algorithm for end-to-end flow fairness in wireless multi-hop networks
    Qin, Xiaowei
    Xu, Peixia
    EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2007, : 385 - 390
  • [44] End-to-end performance improvements for multi-hop ad-hoc wireless networks
    Choi, W
    Lee, Y
    Rhee, SH
    Chung, K
    Lee, JY
    Cho, JW
    Cho, WD
    SECOND IEEE WORKSHOP ON SOFTWARE TECHNOLOGIES FOR FUTURE EMBEDDED AND UBIQUITOUS SYSTEMS, PROCEEDINGS, 2004, : 53 - 57
  • [45] End-to-End Throughput of Ad Hoc Multi-Hop Networks in a Poisson Field of Interferers
    Buratti, Chiara
    Verdone, Roberto
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (05) : 3189 - 3202
  • [46] End-to-end SER of MRT/MRC and SC in multi-hop wireless sensor networks
    Haci Ilhan
    Wireless Networks, 2020, 26 : 3985 - 3995
  • [47] End-to-end delay estimation for multi-hop wireless networks with random access policy
    Jiao WanGuo
    Sheng Min
    Shi Yan
    Li YuZhou
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (06) : 1 - 13
  • [48] Analysis of end-to-end performance in a multi-hop wireless network for different hop-level ARQ policies
    Issariyakul, T
    Hossain, E
    GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 3022 - 3026
  • [49] Influence of Multi-rate Control Function on the End-to-End Latency of Multi-hop Wireless LAN
    Miyashita, Michifumi
    Takada, Jun-ichi
    2013 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2013,
  • [50] Impact of link distance on end-to-end throughput in multi-rate, multi-hop wireless networks
    Wu, Xiaoxin
    Ding, Gang
    Zhu, Wenwu
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 2977 - +