TY - JOUR
T1 - Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks
AU - Shafie, Ahmed El
AU - Salem, Ahmed Sultan
AU - Mabrouk, Asma
AU - Tourki, Kamel
AU - Al-Dhahir, Naofal
N1 - KAUST Repository Item: Exported on 2020-10-01
Acknowledgements: This paper was made possible by NPRP grant number 8-627-2-260 from the Qatar National Research Fund (a member of Qatar Foundation). The statements made herein are solely the responsibility of the authors. The review of this paper was coordinated by Prof. J. Li.
PY - 2018/1/30
Y1 - 2018/1/30
N2 - This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been previously shared between Alice and Bob during the perfectly secured time slots (i.e., when the channel secrecy rate is positive). The secret-key bits exchanged between Alice and Bob are stored in a finite-length buffer and are used to secure data transmission whenever needed. We model the secret-key buffer as a queueing system and analyze its Markov chain. Our numerical results show the gains of our proposed scheme relative to benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure throughput.
AB - This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been previously shared between Alice and Bob during the perfectly secured time slots (i.e., when the channel secrecy rate is positive). The secret-key bits exchanged between Alice and Bob are stored in a finite-length buffer and are used to secure data transmission whenever needed. We model the secret-key buffer as a queueing system and analyze its Markov chain. Our numerical results show the gains of our proposed scheme relative to benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure throughput.
UR - http://hdl.handle.net/10754/626541
UR - https://ieeexplore.ieee.org/document/8275036
UR - http://www.scopus.com/inward/record.url?scp=85041384061&partnerID=8YFLogxK
U2 - 10.1109/TVT.2018.2799900
DO - 10.1109/TVT.2018.2799900
M3 - Article
SN - 0018-9545
VL - 67
SP - 6727
EP - 6731
JO - IEEE Transactions on Vehicular Technology
JF - IEEE Transactions on Vehicular Technology
IS - 7
ER -