ePrints@IIScePrints@IISc Home | About | Browse | Latest Additions | Advanced Search | Contact | Help

Secure Compute-and-Forward in a Bidirectional Relay

Vatedka, Shashank and Kashyap, Navin and Thangaraj, Andrew (2015) Secure Compute-and-Forward in a Bidirectional Relay. In: IEEE TRANSACTIONS ON INFORMATION THEORY , MAY 2015, pp. 2531-2556.

[img] PDF
iee_tra_inf_the-61_5_2531_2015.pdf - Published Version
Restricted to Registered users only

Download (1MB) | Request a copy
Official URL: http://dx.doi.org/10.1109/TIT.2015.2412114

Abstract

We consider the basic bidirectional relaying problem, in which two users in a wireless network wish to exchange messages through an intermediate relay node. In the compute-and-forward strategy, the relay computes a function of the two messages using the naturally occurring sum of symbols simultaneously transmitted by user nodes in a Gaussian multiple-access channel (MAC), and the computed function value is forwarded to the user nodes in an ensuing broadcast phase. In this paper, we study the problem under an additional security constraint, which requires that each user's message be kept secure from the relay. We consider two types of security constraints: 1) perfect secrecy, in which the MAC channel output seen by the relay is independent of each user's message and 2) strong secrecy, which is a form of asymptotic independence. We propose a coding scheme based on nested lattices, the main feature of which is that given a pair of nested lattices that satisfy certain goodness properties, we can explicitly specify probability distributions for randomization at the encoders to achieve the desired security criteria. In particular, our coding scheme guarantees perfect or strong secrecy even in the absence of channel noise. The noise in the channel only affects reliability of computation at the relay, and for Gaussian noise, we derive achievable rates for reliable and secure computation. We also present an application of our methods to the multihop line network in which a source needs to transmit messages to a destination through a series of intermediate relays.

Item Type: Conference Proceedings
Publication: IEEE TRANSACTIONS ON INFORMATION THEORY
Publisher: IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Additional Information: Copy right for this article belongs to the IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141 USA
Keywords: Two-way relay; compute-and-forward; physical layer security; nested lattice coding
Department/Centre: Division of Electrical Sciences > Electrical Communication Engineering
Date Deposited: 22 May 2015 07:16
Last Modified: 22 May 2015 07:16
URI: http://eprints.iisc.ac.in/id/eprint/51553

Actions (login required)

View Item View Item