Secure relaying: Can publicly transferred keys increase degrees of freedom?

Secure communication over a half-duplex relay system in the presence of an external wiretapper is investigated. In such a scenario, conventional relaying protocols generally provide secrecy rates that converge to a finite constant in the high signal-to-noise ratio (SNR) regime. It is shown in this work that strictly superior performance can be achieved by allowing the destination to transfer random keys in the form of known interference to the relay insecurely over the wireless medium. When there is no direct link between the source and the destination, an amplify-and-forward (AF) protocol is shown to achieve a secrecy rate that scales as 1/2 log SNR, if each of the legitimate nodes has a single antenna only. However, in the presence of a direct link between source and destination, this scaling rule no longer applies. The bottleneck of the AF scheme in the presence of a direct source-destination link is identified, motivating the use of multiple antennas at the destination to almost surely guarantee a secure degree of freedom of one half over the channel. The results hold even if the eavesdropper has more antennas than the source and the relay combined.

[1]  Elza Erkip,et al.  The Relay Channel with a Wire-tapper , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[2]  Claude E. Shannon,et al.  Two-way Communication Channels , 1961 .

[3]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[4]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[5]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[6]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[7]  H. Vincent Poor,et al.  The Wiretap Channel With Feedback: Encryption Over the Channel , 2007, IEEE Transactions on Information Theory.

[8]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[9]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[10]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[11]  Aylin Yener,et al.  Providing secrecy with lattice codes , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[12]  G. Wornell,et al.  Secure Transmission with Multiple Antennas: The MIMOME Channel , 2008 .

[13]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.