{"title":"协同中继网络的速率区域和保密速率区域","authors":"Liang Chen","doi":"10.1109/CISS.2013.6616691","DOIUrl":null,"url":null,"abstract":"This paper studies the transmission rates and physical layer security of cooperative relay networks. For any relay network, there are natural information theoretic cut-set bounds, which upper bound the transmission rates. We further tighten the outer bounds on rate regions. We also study the achievable rate regions in consideration of physical layer security. We analyze two cross-group cooperative strategies with decode- and-forward relaying and compress-and-forward relaying respectively. We can use the decode-and-forward scheme only if the users which have both good communication channels from the source and high levels of security clearance are selected to serve as relays; otherwise, we cannot achieve physical layer security. While the compress-and-forward scheme is used, physical layer security can be achieved even though the relays have lower security clearance than the destinations.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Rate regions and secrecy rate regions of cooperative relay networks\",\"authors\":\"Liang Chen\",\"doi\":\"10.1109/CISS.2013.6616691\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper studies the transmission rates and physical layer security of cooperative relay networks. For any relay network, there are natural information theoretic cut-set bounds, which upper bound the transmission rates. We further tighten the outer bounds on rate regions. We also study the achievable rate regions in consideration of physical layer security. We analyze two cross-group cooperative strategies with decode- and-forward relaying and compress-and-forward relaying respectively. We can use the decode-and-forward scheme only if the users which have both good communication channels from the source and high levels of security clearance are selected to serve as relays; otherwise, we cannot achieve physical layer security. While the compress-and-forward scheme is used, physical layer security can be achieved even though the relays have lower security clearance than the destinations.\",\"PeriodicalId\":268095,\"journal\":{\"name\":\"2013 47th Annual Conference on Information Sciences and Systems (CISS)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-03-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 47th Annual Conference on Information Sciences and Systems (CISS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CISS.2013.6616691\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CISS.2013.6616691","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Rate regions and secrecy rate regions of cooperative relay networks
This paper studies the transmission rates and physical layer security of cooperative relay networks. For any relay network, there are natural information theoretic cut-set bounds, which upper bound the transmission rates. We further tighten the outer bounds on rate regions. We also study the achievable rate regions in consideration of physical layer security. We analyze two cross-group cooperative strategies with decode- and-forward relaying and compress-and-forward relaying respectively. We can use the decode-and-forward scheme only if the users which have both good communication channels from the source and high levels of security clearance are selected to serve as relays; otherwise, we cannot achieve physical layer security. While the compress-and-forward scheme is used, physical layer security can be achieved even though the relays have lower security clearance than the destinations.