{"title":"Secrecy in Two-Way Relay Systems","authors":"Shengli Fu, Zhang Tao, M. Colef","doi":"10.1109/GLOCOM.2010.5683210","DOIUrl":null,"url":null,"abstract":"Due to the broadcast nature of wireless channels, the two-way system can be eavesdropped on when a confidential message is transmitted, which is one of the motivations of this paper. While most of existing work focuses on the discussion of secrecy rate with information theoretical approach, this paper discusses the probability of successful detection for the system experiencing exponential path loss. By investigating the symbol-error-rate at the legitimate nodes and eavesdropper, we find the optimal power allocation among the two-way communication systems. We also investigate the impact factor on the secrecy capacity including the location of eavesdropper, path loss exponent, and decoding strategies.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"25 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOM.2010.5683210","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
Due to the broadcast nature of wireless channels, the two-way system can be eavesdropped on when a confidential message is transmitted, which is one of the motivations of this paper. While most of existing work focuses on the discussion of secrecy rate with information theoretical approach, this paper discusses the probability of successful detection for the system experiencing exponential path loss. By investigating the symbol-error-rate at the legitimate nodes and eavesdropper, we find the optimal power allocation among the two-way communication systems. We also investigate the impact factor on the secrecy capacity including the location of eavesdropper, path loss exponent, and decoding strategies.