Secrecy outage probability of network-coded cooperation without channel state information

We evaluate the secrecy performance of a cooperative network where the destination node is wiretapped by a malicious and passive eavesdropper. We propose the application of the network coding technique as an alternative to increase the secrecy at the destination node, in a scenario without channel state information (CSI) at the transmitter side. Network coding is leveraged by assuming that the legitimate cooperative nodes are able to perform non-binary linear combinations of different frames before the transmission. Theoretic and numerical analyses show that the secrecy can be considerably increased through the use of network coding when compared to the direct transmission and traditional cooperative techniques.

[1]  Frederic Gabry Cooperation for Secrecy in Wireless Networks , 2012 .

[2]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[3]  Ruoheng Liu,et al.  On the Achievable Secrecy Throughput of Block Fading Channels with No Channel State Information at Transmitter , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[4]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[5]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[6]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[7]  Branka Vucetic,et al.  Multiuser Cooperative Diversity Through Network Coding Based on Classical Coding Theory , 2010, IEEE Transactions on Signal Processing.

[8]  Richard Demo Souza,et al.  Network-coded cooperation for a two-user wiretap channel , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[9]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[10]  Ming Xiao,et al.  Multiple-User Cooperative Communications Based on Linear Network Coding , 2010, IEEE Transactions on Communications.

[11]  H. Vincent Poor,et al.  On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.

[12]  H. Vincent Poor,et al.  Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels , 2012, IEEE Transactions on Information Forensics and Security.

[13]  Abbas Jamalipour,et al.  Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[14]  L. Devroye Non-Uniform Random Variate Generation , 1986 .

[15]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[16]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..