The two-hop interference untrusted-relay channel with confidential messages

This paper considers the two-user interference relay channel where each source wishes to communicate to its destination a message that is confidential from the other destination. Furthermore, the relay, that is the enabler of communication, due to the absence of direct links, is untrusted. Thus, the messages from both sources need to be kept secret from the relay as well. We provide an achievable secure rate region for this network. The achievability scheme utilizes structured codes for message transmission, cooperative jamming and scaled compute-and-forward. In particular, the sources use nested lattice codes and stochastic encoding, while the destinations jam using lattice points. The relay decodes two integer combinations of the received lattice points and forwards, using Gaussian codewords, to both destinations. The achievability technique provides the insight that we can utilize the untrusted relay node as an encryption block in a two-hop interference relay channel with confidential messages.

[1]  Navin Kashyap,et al.  Lattice coding for strongly secure compute-and-forward in a bidirectional relay , 2013, ISIT.

[2]  Syed Ali Jafar Capacity With Causal and Noncausal Side Information: A Unified View , 2006, IEEE Transactions on Information Theory.

[3]  H. Vincent Poor,et al.  The Wiretap Channel With Feedback: Encryption Over the Channel , 2007, IEEE Transactions on Information Theory.

[4]  Michael Gastpar,et al.  Secure transmission using an untrusted relay with scaled compute-and-forward , 2015, 2015 IEEE Information Theory Workshop (ITW).

[5]  Sennur Ulukus,et al.  Secrecy in Cooperative Relay Broadcast Channels , 2008, IEEE Transactions on Information Theory.

[6]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[7]  Michael Gastpar,et al.  Multiple Access via Compute-and-Forward , 2014, ArXiv.

[8]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[9]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[10]  Aylin Yener,et al.  Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay , 2013, IEEE Transactions on Information Theory.

[11]  Yasutada Oohama,et al.  Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).

[12]  Michael Gastpar,et al.  Asymmetric Compute-and-Forward with CSIT , 2014, ArXiv.

[13]  Aylin Yener,et al.  Providing Secrecy With Structured Codes: Two-User Gaussian Channels , 2014, IEEE Transactions on Information Theory.

[14]  Aylin Yener,et al.  The multiple access channel with an untrusted relay , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[15]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[16]  Aylin Yener,et al.  End-to-End Secure Multi-Hop Communication with Untrusted Relays , 2008, IEEE Transactions on Wireless Communications.

[17]  Aylin Yener,et al.  Multi-terminal networks with an untrusted relay , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).