On the Reliability-Security Tradeoff and Secrecy Throughput in Cooperative ARQ

This work has studied the physical layer security in cooperative automatic-repeat-request (CARQ), under the assumption of no instantaneous channel state information (CSI) at legitimate users. Different from present works, this paper not only derives closed form expressions for connection outage probability (COP) and secrecy outage probability (SOP) to evaluate the reliability and security, respectively, but also first establishes the direct relationship between them via the reliability-security tradeoff (RST). Moreover, we present a novel formulation for secrecy throughput, which gives a more complete insight into the efficiency of CARQ achieving reliable and secure transmission.

[1]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.

[2]  H. Vincent Poor,et al.  On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.

[3]  Rahul Vaze Throughput-Delay-Reliability Tradeoff with ARQ in Wireless Ad Hoc Networks , 2011, IEEE Transactions on Wireless Communications.

[4]  Keivan Navaie,et al.  Diversity Multiplexing Trade-off in ARQ Based Cooperative and Non-Cooperative Communication over General Channel Dynamics , 2011, IEEE Transactions on Wireless Communications.

[5]  Dongmei Zhang,et al.  Throughput and energy efficiency of a novel cooperative ARQ strategy for wireless sensor networks , 2012, Comput. Commun..

[6]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[7]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[8]  Weifeng Su,et al.  Cooperative Decode-and-Forward ARQ Relaying: Performance Analysis and Power Optimization , 2010, IEEE Transactions on Wireless Communications.

[9]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[10]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.