2018
DOI: 10.1109/tifs.2018.2833799
|View full text |Cite
|
Sign up to set email alerts
|

Rate Adaptation for Secure HARQ Protocols

Abstract: This paper investigates the incremental-redundancy hybrid-automatic repeat request (IR-HARQ) transmission over independent block-fading channels in the presence of an eavesdropper, where the secrecy of the transmission is ensured via introduction of dummy-messages. Since the encoder only knows the statistics of the channel state, the secrecy and the reliability are defined in a probabilistic framework. Unlike previous works on this subject, we design a coding strategy tailored to IR-HARQ by splitting the dummy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 57 publications
0
12
0
Order By: Relevance
“…Hence, their slopes are positive when R B is less than its optimal valueR B , and negative when R B >R B . The maximum η s (R B ), using the parameterized close-form solution in Equations (21)- (23), are plotted in Figure 4. These results well match the maximum η s and maximum approximated η s without COP constraint.…”
Section: Sop Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Hence, their slopes are positive when R B is less than its optimal valueR B , and negative when R B >R B . The maximum η s (R B ), using the parameterized close-form solution in Equations (21)- (23), are plotted in Figure 4. These results well match the maximum η s and maximum approximated η s without COP constraint.…”
Section: Sop Resultsmentioning
confidence: 99%
“…The optimal rates are initialized asR B = 0 andR E = 0. Next, usingR E =R E , we solve the optimization of R B in Equation (14), while the optimal pointR B is obtained by Equations (21)- (23). Then, usingR B =R B , we solve the optimization of R E in Equation (33), while the optimal pointR E is obtained by Equation (40).…”
Section: Optimization Of the Rate Pair (R B R E )mentioning
confidence: 99%
See 1 more Smart Citation
“…Similar to the discussion above, we still consider a small COP and R B = R ⋆ B , as given in (22). Then η s , as expressed in (23), is proved to be quasi-concave. Let φ t be defined as in (26) again, and this optimization problem becomes…”
Section: Optimization With Cop and Sop Constraintsmentioning
confidence: 99%
“…To efficiently use HARQ, Tomasin designed a multiple-encoding HARQ scheme with statistics channel state information (CSI). As channel capacity is not suitable for HARQ that combines retransmitted codewords, secrecy throughput was widely discussed with respect to PLS of HARQ [21][22][23]. Tang et al [21] analyzed SOP, secrecy throughput, and their asymptotic properties; Mheich et al [22] optimized secrecy throughput as extended; Treust et al [23] designed an adaptive rate transmission scheme to improve secrecy throughput.…”
Section: Introductionmentioning
confidence: 99%