Leaking Rate Region to Eavesdroppers and Untrusted Relays

The trustworthiness of nodes in a network is practically a complicated concept and strongly depends on the social relationship among the nodes. For a certain model of trustworthiness, the scheme can be optimized to achieve the highest average secrecy rate based on pre-defined information about possibly malicious nodes. In such a scheme, the secrecy rate is considered as a function of the maximum achievable rate (MAR) at the destination, the MAR at the malicious nodes and the corresponding probabilities. However, in some cases, the trustworthiness model is not available, for example, an engineer does not know if a certain node is maliciously eavesdropping, such a function cannot be derived. Consequently, we need to consider the performance of a scheme in a wide range of trustworthiness levels. To evaluate the performance for such a case, in this paper, we propose a novel concept for comparing these leaking rates which is called leaking rate region. We derive the closed form of leaking rate region for the case of two untrusted relays with multiple antennas at the source and the destination.

[1]  Tony Q. S. Quek,et al.  Confidential Cooperative Communication With Trust Degree of Potential Eavesdroppers , 2016, IEEE Transactions on Wireless Communications.

[2]  Yao-Win Peter Hong,et al.  Multicasting with untrusted relays: A noncoherent secure network coding approach , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[3]  Li Sun,et al.  Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes , 2015, IEEE Communications Letters.

[4]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[5]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[6]  Justin P. Coon,et al.  Modelling trust in random wireless networks , 2014, 2014 11th International Symposium on Wireless Communications Systems (ISWCS).

[7]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[8]  Candice King,et al.  Fundamentals of wireless communications , 2013, 2014 67th Annual Conference for Protective Relay Engineers.

[9]  Sheng Chen,et al.  Social-aware D2D communications: qualitative insights and quantitative analysis , 2014, IEEE Communications Magazine.

[10]  Dongtang Ma,et al.  Destination-Aided Cooperative Jamming for Dual-Hop Amplify-and-Forward MIMO Untrusted Relay Systems , 2016, IEEE Transactions on Vehicular Technology.

[11]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[12]  Tony Q. S. Quek,et al.  Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.

[13]  Xu Chen,et al.  Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case , 2015, IEEE/ACM Transactions on Networking.