2013
DOI: 10.1109/twc.2012.120412.101358
|View full text |Cite
|
Sign up to set email alerts
|

End-to-End Secure Multi-Hop Communication with Untrusted Relays

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
55
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 53 publications
(55 citation statements)
references
References 21 publications
0
55
0
Order By: Relevance
“…In such a network, one can again ask the question whether secure communication between the source and the relay is possible. Reference [68] considered this multi-hop line network, where a source node aims to communicate securely with a destination via a chain of untrusted relays, and found a secrecy rate that is independent of the number of untrusted relays in the network. This result is surprising in that it states that enlisting the cooperation from many untrusted nodes does not penalize the system from the perspective of secure communication.…”
Section: Untrusted Multi-hop Channelmentioning
confidence: 99%
See 1 more Smart Citation
“…In such a network, one can again ask the question whether secure communication between the source and the relay is possible. Reference [68] considered this multi-hop line network, where a source node aims to communicate securely with a destination via a chain of untrusted relays, and found a secrecy rate that is independent of the number of untrusted relays in the network. This result is surprising in that it states that enlisting the cooperation from many untrusted nodes does not penalize the system from the perspective of secure communication.…”
Section: Untrusted Multi-hop Channelmentioning
confidence: 99%
“…The need for a new achievable scheme, different from the one in [64], follows from the fact that applying a scheme based on compressand-forward in the line network leads to accumulation of the quantization noise over the hops, and one would end up with an achievable secrecy rate that decreases dramatically as the number of hops increases, eventually with vanishing end-to-end secrecy rate. To overcome this limitation, [68] proposes an achievable secrecy scheme based on the compute-and-forward strategy [56], [57].…”
Section: Untrusted Multi-hop Channelmentioning
confidence: 99%
“…For example, the algorithm of [37] can be easily extended to solve Eq. (17). We used this algorithm to provide the simulation results in Section VI.…”
Section: Relay Strategymentioning
confidence: 99%
“…The destination node can help the source node by jamming the relay node with a random signal. This model is extended in [17] to a multi-hop line network.…”
mentioning
confidence: 99%
“…In contrast, secure physical layer network coding is a method to securely transmit a message by a combination of coding operation on nodes when the network is given as a set of noisy channels. In this paper, we give several examples of network, in which, secure physical layer network coding has advantage over secure network coding.only secure computation-and-forward, which is a method to securely transmit the modulo sum of two input message when noisy multiple access channel is given [10], [11], [12], [13], [14], [15]. The motivation of these studies is the realization of secure two way-relay channel with untrusted relay.…”
mentioning
confidence: 99%