Nothing Special   »   [go: up one dir, main page]

Next Article in Journal
An Entropy-Based Contagion Index and Its Sampling Properties for Landscape Analysis
Previous Article in Journal
Entropy Change during Martensitic Transformation in Ni50−xCoxMn50−yAly Metamagnetic Shape Memory Alloys
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Hybrid Cooperative Coding Scheme for the Relay-Eavesdropper Channel

1
Department of Electronic Engineering and Information Science, University of Science and Technology of China, P.O.Box No.4, 230027, Hefei, Anhui, China
2
School of Electrical, Electronic, and Computer Engineering, Newcastle University, Newcastle, NE1 7RU, UK
*
Author to whom correspondence should be addressed.
Entropy 2014, 16(3), 1819-1841; https://doi.org/10.3390/e16031819
Submission received: 16 December 2013 / Revised: 18 March 2014 / Accepted: 19 March 2014 / Published: 24 March 2014

<p>Relay-eavesdropper channel.</p> ">

<p>The encoder structure in Block <span class="html-italic">b</span>, 2 ≤ <span class="html-italic">b</span> ≤ <span class="html-italic">B</span>, where the common message <math display="inline"> <semantics id="sm124"> <mrow> <msub> <mrow> <mi>w</mi></mrow> <mrow> <mn>0</mn> <mi>b</mi></mrow></msub> <mo>=</mo> <mo stretchy="false">(</mo> <msub> <mrow> <mi>w</mi></mrow> <mrow> <mn>12</mn> <mi>b</mi> <mo>-</mo> <mn>1</mn></mrow></msub> <mo>,</mo> <msubsup> <mrow> <mi>w</mi></mrow> <mrow> <mn>12</mn> <mi>b</mi> <mo>-</mo> <mn>1</mn></mrow> <mi>x</mi></msubsup> <mo stretchy="false">)</mo></mrow></semantics></math>, which is transmitted by the source in the previous block, and “SP” is the abbreviation of the word “superposition”.</p> ">

<p>The considered Gaussian network topology.</p> ">

<p>Achievable secrecy rates of various coding schemes <span class="html-italic">versus</span> the location of the relay (<span class="html-italic">i.e.</span>, the value of <span class="html-italic">z</span>), where the relay is in Track 1.</p> ">

<p>Achievable secrecy rates of various coding schemes <span class="html-italic">versus</span> the location of the relay (<span class="html-italic">i.e.</span>, the value of <span class="html-italic">z</span>), where the relay is in Track 2.</p> ">

<p>Achievable secrecy rates of two coding schemes <span class="html-italic">versus</span> the location of the relay (<span class="html-italic">i.e.</span>, the value of <span class="html-italic">z</span>), where the relay is in Track 1 in <a href="#f3-entropy-16-01819" class="html-fig">Figure 3</a>.</p> ">

">

">

">
Versions Notes

Abstract

: This paper considers the four-node relay-eavesdropper channel, where a relay node helps the source to send secret messages to the destination in the presence of a passive eavesdropper. For the discrete memoryless case, we propose a hybrid cooperative coding scheme, which is based on the combination of the partial decode-forward scheme, the noise-forward scheme and the random binning scheme. The key feature of the proposed hybrid cooperative scheme is that the relay integrates the explicit cooperation strategy and the implicit cooperation strategy by forwarding source messages and additional interference at the same time. The derived achievable secrecy rate shows that some existing works can be viewed as special cases of the proposed scheme. Then, the achievable secrecy rate is extended to the Gaussian channel based on Gaussian codebooks, and the optimal power policy is also identified in the high power region. Both the analysis and numerical results are provided to demonstrate that the proposed hybrid cooperative coding scheme outperforms the comparable ones, especially in the high power region.

1. Introduction

The concept of information theoretic secrecy was first introduced by Shannon in [1], where a key is used to protect confidential messages over noiseless transmissions. When considering the noisy transmission, Wyner introduced the wiretap channel in [2], where the received signal at the eavesdropper was assumed to be a degraded version of the signal at the legitimate receiver. Csiszár and Körner extended this degraded wiretap channel to a more general broadcast channel with confidential messages and found the secrecy capacity in [3]. Wyner’s channel has also been extended to the wiretap channel with side information, where the side information was assumed to be non-casually known to the transmitter [4,5]. Recently, secrecy problems have been considered in various multi-user setups. For example, multiple access channels (MACs) were studied in [69], where an external eavesdropper was introduced in [6,7], while each legitimate user in [8,9] acted as an eavesdropper for the messages intended to the other users. Broadcast channels (BCs) were considered in [10,11], where each user is also an eavesdropper for the messages intended to the others. Relay channels were studied in [1217], where an external eavesdropper was introduced in [1215], while the relay node in [16,17] was an untrusted helper, i.e., this untrusted helper also acted as an eavesdropper to the main receiver.

Since user cooperation can potentially enhance the security, many existing works have designed cooperative secure transmission schemes for multi-user networks. These existing cooperation schemes can be divided into two different types: the explicit cooperation strategy and the implicit cooperation strategy. The explicit cooperation strategy means that the helper nodes send messages that are correlated to the intended messages, such as the decode-forward (DF) scheme [12] or the partial DF [13] for relay-eavesdropper channels. The implicit cooperation strategy requires helper nodes to send interference messages that are independent of the intended messages, such as cooperative jamming (CJ) [6], noise-forward (NF) [12] and the interference-assisted scheme [14].

Different from these works in [6,1214] that consider these two types of cooperation strategies separately, this paper aims to design a hybrid cooperative coding scheme that integrates the explicit cooperation strategy and the implicit cooperation strategy together. Most recently, hybrid cooperative coding schemes have been considered in [7,15] for the MAC channel with conference and secrecy constraints. Compared to the works in [7,15], which are based on an assumption that there exist secret communication links between a source and its helper partner, the proposed hybrid cooperative coding scheme is applicable to a more practical relay-eavesdropper channel in which the transmissions from the source to the relay can be overheard by the eavesdropper.

The contributions of the this paper can be summarized as follows. Firstly, we propose a hybrid cooperative coding scheme for the four-node relay-eavesdropper channel, where a relay node helps the source to send secret messages to the destination in the presence of a passive eavesdropper. The basic idea is to combine the partial DF scheme [18] for relay channels, the NF [12] scheme for relay-eavesdropper channels and random binning [2] for wiretap channels. Note that the NF and random binning schemes can provide useful randomness to protect the secret messages. The key feature of the proposed hybrid cooperative scheme is that the relay integrates the explicit cooperation strategy and the implicit cooperation strategy by forwarding source messages and additional interference at the same time. The derived achievable secrecy rate shows that the proposed scheme generalizes some existing works, such as the DF [12], partial DF [13] and NF [12] schemes for relay-eavesdropper channels. Secondly, the achievable rate result is extended to the memoryless Gaussian channel based on Gaussian codebooks. Then, the optimal power policy is developed for the proposed scheme in the high power region, and the result shows that the secrecy rate achieved by the proposed scheme can be sufficiently large in the high power region, even if the source-relay link is weak. This is benefited from the fact that the interference generated at the relay can protect the transmissions from the source to the relay by confusing the eavesdropper. Finally, we illustrate the proposed scheme through some examples of the Gaussian network topologies. The numerical results show that our scheme outperforms the comparable ones, especially when the transmit power is large.

In the following, the details about the differences between the proposed scheme and the existing ones are provided in order to further highlight the contribution of this paper.

  • The channel model and the coding scheme developed in [19] are fundamentally different from those in this paper. First, the work in [19] considers the relay-eavesdropper channel model with parallel subchannels, whereas this paper considers the relay-eavesdropper channel model with only a single communication channel. Second, the coding scheme in [19] uses a subset of channels to perform the DF scheme and the remaining ones to perform the NF scheme, and the interaction between these two relaying schemes exists only across different subchannels. In contrary, by using the superposition coding scheme, the partial DF and NF schemes in the proposed coding scheme are strongly connected to each other in the same channel.

  • The work in [20] combined partial DF, NF and compress-and-forward (CF) schemes for the discrete memoryless relay-eavesdropper channel. In Section 3.4, we will show that the use of the CF scheme does not offer any performance gains in terms of the secrecy rate. Compared to the scheme in [20] that is based on the successive decoding strategy for separately decoding different messages, the proposed scheme utilizes the backward decoding strategy to jointly decode the common part (known by both the source and relay) of the source messages. Moreover, the proposed scheme decodes the interference messages from the relay after decoding the common part of the source messages, whereas the scheme in [20] decodes these two types of messages in a reversed order. This results in different secrecy rates achieved by these two coding schemes, and their performances will be compared in detail in Section 3.4.

The rest of this paper is organized as follows. In Section 2, the notations, the channel model and the main result are given for the discrete memoryless relay-eavesdropper. Section 3 extends the main result to the Gaussian case, for which an achievable secrecy rate, a power policy in the high power region and some numerical results are provided. The achievable secrecy rate associated with the proposed hybrid coding scheme for the discrete memoryless relay-eavesdropper channel is established in Section 4. Finally, conclusions are provided in Section 5.

2. System Model and Achievable Secrecy Rate

2.1. Notations

Throughout this paper, a random variable, its realization and its finite alphabet are denoted with an upper case letter (e.g., X), the corresponding lower case letter (e.g., x) and the corresponding calligraphic letter (e.g., Entropy 16 01819f7), respectively. The probability distribution of the random variable, X, is denoted as p(x) = pX(x) for simplicity, where x Entropy 16 01819f7. Furthermore, we use Xn to denote a random n-vector (X1,, Xn) and use xn = (x1,, xn) to denote a specific n-vector value in Entropy 16 01819f8, which is the n-th Cartesian power of Entropy 16 01819f7.

Moreover, let Xi and X(]i [) denote the set {X(j), 1 ≤ j < i} and the set {X(j), 1 ≤ j < i or i < jn}, respectively. In addition, [1 : B] = {1, 2,, B}, [x]+ = max{x, 0}, C ( x ) = 1 2 log ( 1 + x ), and k is arbitrarily small positive number for ∀κ. Finally, A ɛ ( n ) ( X 1 , X 2 ) denotes the set of jointly typical n-sequences with respect to p(x1, x2) (more details can be seen in [21]).

2.2. Discrete Memoryless Relay-Eavesdropper Channel

As shown in Figure 1, this paper considers a four-node discrete memoryless channel, where the source (X1) wishes to send a message W1 Entropy 16 01819f9 = {1,, M} to the destination (Y), while keeping it secret from an external eavesdropper (Y2), with the help of a full duplex relay node, (X2, Y1). This channel is first introduced in [12], termed as the relay-eavesdropper channel, which consists of a transition probability distribution ( Entropy 16 01819f10 × Entropy 16 01819f11, p(y, y1, y2|x1, x2), Entropy 16 01819f12 × Entropy 16 01819f13 × Entropy 16 01819f14). Here, the finite sets, Entropy 16 01819f10, Entropy 16 01819f11, denote the input alphabets at the source and the relay, respectively, while the finite sets, Entropy 16 01819f12, Entropy 16 01819f13, Entropy 16 01819f14, denote the output alphabets at the destination, the relay and the eavesdropper, respectively. The (M, n, P e n) code of this system consists of a stochastic encoder, f1, at the source that maps the message, W1, into a codeword, X 1 n X 1 n, a stochastic encoder, f2, at the relay that maps its received signals (Y1,1,, Y1,i−1) before time i into a channel input, X2,i, and a decoding function φ : Entropy 16 01819f15W1. The average error probability is:

P e n = 1 M w 1 W 1 P r ( φ ( Y n ) w 1 w 1 was sent ) .

The secrecy level is measured by the equivocation rate ( 1 / n ) H ( W 1 Y 2 n ). A prefect secrecy rate, Rs, is said to be achievable if for any ε > 0, there exists a sequence of codes (M, n, P e n), such that:

M 2 n R s ,     P e n ɛ R s - ɛ 1 n H ( W 1 Y 2 n ) .

2.3. Achievable Secrecy Rate

Before the presentation of our main result, we first define some parameters as follows.

Definition 1

Let ℘ denote the set of all the joint distributions of the random variables (U, V1, X1, X2, Y1, Y2) that factor as:

p ( u , v 1 , x 1 , x 2 , y , y 1 , y 2 ) = p ( u ) p ( x 1 , v 1 u ) p ( x 2 u ) p ( y , y 1 , y 2 x 1 , x 2 ) .

In this definition, one can observe that (V1, X1) − UX2 is a Markov chain, where U represents the common message known by the source and the relay. Conditioned on U, (V1, X1) and X2 can be generated at the source and the relay, respectively.

Definition 2

For a given p℘, define two rates, R11(p) and R12(p), as:

R 11 ( p ) I ( X 1 ; Y X 2 , U , V 1 ) + min { I ( X 2 ; Y U , V 1 ) , I ( X 2 ; Y 2 U , X 1 ) } - min { I ( X 2 ; Y U , V 1 ) , I ( X 2 ; Y 2 U , V 1 ) } - I ( X 1 ; Y 2 U , V 1 , X 2 ) ,
R 12 ( p ) min { I ( U , V 1 ; Y ) , I ( V 1 ; Y 1 X 2 , U ) } - I ( U , V 1 ; V 2 ) .

Note that R11(p) is the rate of the private secret message at the source that is not known by the relay, while R12(p) is the rate of the common secret message that is known by the source and the relay.

Based on the above definitions, the following theorem gives an achievable secrecy rate for the discrete memoryless relay-eavesdropper channel.

Theorem 1

For the considered relay-eavesdropper channel, the following secrecy rate is achievable.

R s = max p P             R 11 ( p ) + R 12 ( p )

Proof

The proposed achievable scheme is based on the careful combination of the partial DF [18] scheme for relay channels, the NF scheme [12] for relay-eavesdropper channels and random binning for wiretap channels [2]. Specifically, the proposed coding scheme integrates some essential techniques, such as rate splitting, superposition Markov block encoding [18] (Theorem 7), random binning [2], backward decoding and interference injecting [12], etc. In the following, we will outline the proposed hybrid cooperative coding scheme, and the details of the complete proof will be provided in Section 4. (Note that in the next paragraph, a message is said to be a common message if it has been known by both the source and the relay in a certain block, such as w0b in Block b. Otherwise, it is said to be a private message, such as w11b and w2b, which are only known by the source and the relay, respectively.)

Briefly speaking, for a given joint distribution, p, the whole transmission duration is formed by B Markov blocks, in which B −1 secret messages will be sent. At Block b, the new secret message, w1b, is first split into two parts: one part needs to be transmitted directly from the source to the destination (w11b); and the other part needs to be decoded by the relay (w12b). Here w11b and w12b are mixed with dummy messages w 11 b x and w 12 b x, respectively. In the encoding process, the random variable, U, in Theorem 1 represents the common message w 0 b = ( w 12 b - 1 , w 12 b - 1 x ). Note that w0b was decoded by the relay at the end of the previous block, i.e., Block b−1, and becomes the common message in this block. The random variable, V1, represents the superposition code in which the new message (w12b, w 12 b x) is superimposed on the common message, w0b, where (w12b, w 12 b x) needs to be decoded by the relay at the end of Block b and will become the common message, w0b+1, in Block b + 1. In this sense, V1 also carries the common part of the source message, but for the next block. The channel input, X1, represents the superposition code in which the private message (w11b, w 11 b x) is superimposed on w0b and (w12b, w 12 b x). At the same block, noise injection is realized at the relay via sending the so-called “interference message”, w2b, i.e., the relay randomly generates a private interference message, w2b, in order to confuse the eavesdropper. The channel input, X2, represents the superposition code in which the interference message, w2b, is superimposed on the common message, w0b, where w0b has been decoded by the relay at the end of the previous block. The encoder structure of the proposed cooperative coding scheme is briefly illustrated in Figure 2.

Remark 1

Since the relay simultaneously forwards the common part of the source messages and private interference, the proposed scheme can be viewed as a hybrid cooperative scheme that combines the explicit and implicit cooperation strategies. The key feature of such a hybrid cooperative scheme is that it can improve the signal strength through the main channel and suppress the eavesdropping capability at the same time.

Remark 2

The use of the channel prefixing technique (e.g., Appendices B and C in [12]) may further increase the secrecy rate. However, we do not consider this technique in this paper to avoid the intractability of its evaluation, which simplifies the achievable result in Theorem 1.

The achievable secrecy rate in Theorem 1 generalizes some existing coding schemes for the relay eavesdropper channels.

Remark 3

If we set X1 = V1 and X2 = U inEquations (4) and (5), Theorem 1 reduces to:

R s = max p ( x 1 , x 2 ) min { I ( X 1 , X 2 ; Y ) , I ( X 1 ; Y 1 X 2 ) } - I ( X 1 , X 2 ; Y 2 ) ,

which is consistent with the secrecy rate achieved by the DF scheme in [12] (Theorem 2).

Remark 4

If we set U = V1 = ∅︀ in Equations (4) and (5), Theorem 1 reduces to:

R s = max p ( x 1 ) p ( x 2 ) I ( X 1 ; Y X 2 ) + min { I ( X 2 ; Y ) , I ( X 2 ; Y 2 X 1 ) } - min { I ( X 2 ; Y ) , I ( X 2 ; Y 2 ) } - I ( X 1 ; Y 2 X 2 ) ,

which is consistent with the secrecy rate achieved by the NF scheme in [12] (Theorem 3).

Remark 5

If we set and U = X2, Theorem 1 reduces to:

R s = max p ( v 1 , x 1 , x 2 ) min { I ( X 1 , X 2 ; Y ) , I ( X 1 ; Y X 2 , V 1 ) + I ( V 1 ; Y 1 X 2 ) } - I ( X 1 , X 2 ; Y 2 ) ,

which is consistent with the secrecy rate achieved by the partial DF scheme in [13] (Theorem 8).

3. Gaussian Relay-Eavesdropper Channel

In this section, the memoryless Gaussian relay-eavesdropper channel is considered, where the received symbols at the relay (Y1), the destination (Y ) and the eavesdropper (Y2) are:

Y 1 = h s r X 1 + N 1 , Y = h s d X 1 + h r d X 2 + N , Y 2 = h s e X 1 + h r e X 2 + N 2 .

Here, N1, N, N2 ~ Entropy 16 01819f16 (0, 1), which are the Gaussian adaptive noises; hαβ denotes the channel coefficient between node α ∈ {s, r} and node β ∈ {r, d, e}, αβ. The average power constraints at the source and the relay are P1 and P2, respectively.

3.1. Achievable Secrecy Rate

In this subsection, we use a joint Gaussian distribution to get an achievable secrecy rate.

We let U, V1,0, X1,0, X2,0 ~ Entropy 16 01819f16 (0, 1), and they are independent of each other. Then, the variables, V1, X1 and X2, are set to be:

V 1 = P 1 u U + P 1 v 0 V 1 , 0 ,
X 1 = V 1 + P 1 x 0 X 1 , 0 ,
X 2 = r P 2 u U + P 2 x 0 X 2 , 0 ,

where r ∈ {−1, 1}, which is used to determine the covariance of the channel inputs, X1 and X2, to be positive or negative. In these relationships, U represents the common message shared by both the source and the relay in a certain block; V1,0 represents the new source message that needs to be decoded by the relay and will become the common message in the next block; X1,0 represents the private source message; X2,0 represents the private interference message at the relay.

To satisfy the power constraints, we require the power tuple X 2 = r P 2 u U + P 2 x 0 X 2 , 0 , in Equations (11)(13) to lie in Entropy 16 01819f17, where Entropy 16 01819f17 denotes the power allocation set that is given by:

A = { ( P 1 u , P 1 v 0 , P 1 x 0 , P 2 u , P 2 x 0 ) P 1 u , P 1 v 0 , P 1 x 0 , P 2 u , P 2 x 0 0 P 1 u + P 1 v 0 + P 1 x 0 P 1 ,     P 2 u + P 2 x 0 P 2 } .

Now, based on Theorem 1 and the above definitions, an achievable secrecy rate is given in the following lemma.

Lemma 1

For the Gaussian relay-eavesdropper channel, the following secrecy rate is achievable:

R s G = max r = ± 1 , A A R 11 G ( r , A ) + R 12 G ( r , A ) ,

where R 11 G ( r , A ) and R 12 G ( r , A ) are defined as:

R 11 G ( r , A ) = C ( h s d 2 P 1 x 0 ) + min  { C ( h r d 2 P 2 x 0 1 + h s d 2 P 1 x 0 ) , C ( h r e 2 P 2 x 0 ) } - min  { C ( h r d 2 P 2 x 0 1 + h s d 2 P 1 x 0 ) , C ( h r e 2 P 2 x 0 1 + h s e 2 P 1 x 0 ) } - C ( h s e 2 P 1 x 0 ) ,
R 12 G ( r , A ) = min  { C ( h s d P 1 u + r h r d P 2 u 2 + h s d 2 P 1 v 0 1 + h s d 2 P 1 x 0 + h r d 2 P 2 x 0 ) , C ( h s r 2 P 1 v 0 1 + h s r 2 P 1 x 0 ) } - C ( h s e P 1 u + r h r e P 2 u 2 + h s e 2 P 1 v 0 1 + h s e 2 P 1 x 0 + h r e 2 P 2 x 0 ) .

Proof

We calculate each piece of mutual information in Equations (4) and (5) using the variables defined in Equations (11)(13), and this lemma can be proven.

3.2. Power Policy in the High Power Region

According to the achievable secrecy rate in Lemma 1, the following lemma takes an example to illustrate how to allocate the transmit powers at the source and the relay in the high power region.

Lemma 2

Let a = h s e 2 h s d 2 , b = h r d 2 h r e 2 , c = h s r 2 h s d 2, and assume P1 = P2 = P for simplicity. When P →∞, c > 0 and b 1 a, the optimal power allocation for Equation (15) satisfies:

( P 1 u , P 1 v 0 , P 1 x 0 , P 2 u , P 2 x 0 ) ( P 1 , P 1 2 , P 0 , P 1 , P 1 2 ) ,

where f(x) ≐ xy denotes that f(x) is exponentially equal to xy, i.e., lim x log  f ( x ) log  x = y (≤̇ and ≥̇ are defined similarly).

Proof

Refer to Appendix A.

According to this power policy and the derivations in Appendix A, the achievable secrecy rate in Lemma 1 satisfies:

lim P R s G log  P = 1 4 .

The above relationship reflects that the achievable secrecy rate, R s G, is arbitrarily large as P →∞.

Remark 6

Since we have only required the source-relay channel gain to be positive (i.e., c > 0) in Lemma 2, it shows that the proposed hybrid cooperative scheme can achieve a sufficiently large secrecy rate even for a weak source-relay channel (i.e., c is small). This is because the interference at the relay with the power, P 2 x 0, can protect the transmissions from the source to the relay by confusing the eavesdropper. In this case, the bottleneck of the source-relay channel (i.e., hsr) suffered by the DF scheme ([12]) and partial DF scheme ([13]) can be greatly mitigated by introducing the interference at the relay node, and the proposed hybrid cooperative scheme can efficiently overcome the bottleneck of the source-relay channel.

3.3. Numerical Results

In this subsection, we will provide some numerical results to demonstrate the performance of the proposed hybrid cooperative scheme. Specifically, in the Gaussian relay-eavesdropper channel (10), the channel gain between node α ∈ {s, r} and node β ∈ {r, d, e} (αβ) is h α β = d α β - γ / 2. Here, dαβ is the distance between α and β and γ is the path loss exponent, which is set as γ = 2. Based on these definitions, we use the network geometry shown in Figure 3, where the source, the destination and the eavesdropper are located at (0,0), (1,0) and (0,1), respectively. In addition, the relay is located at ( 3 2 z , 1 2 z) in Track 1 and ( 1 2 z , 3 2 z) in Track 2, where z > 0. When the relay is in Track 1, it is nearer to the destination than to the eavesdropper; when the relay is in Track 2, it is nearer to the eavesdropper than to the destination. To show the performance of the proposed coding scheme, the DF scheme in [12], the partial DF scheme in [13], the NF scheme in [12] and the CJ scheme in [6] are taken to be the comparable ones. Note that when considering the network geometry in Figure 3, one will see that the DF scheme [12] achieves exactly the same secrecy rate as that of the partial DF scheme [13]. In computing the upper bound, following the same parameter setting in [12], we have used the upper bound in [12] (Theorem 1) using Gaussian inputs for the ease of computation. As discussed in [12], Gaussian inputs are not necessarily optimal for the upper bound.

Figure 4 shows that achievable secrecy rates achieved the proposed scheme and the comparable ones for the case that the relay is in Track 1. In the first sub-figure, i.e., Figure 4a, we consider the moderate transmit power pair (P1, P2) = (10, 20). From this sub-figure, one can see that the DF scheme [12] (or the partial DF scheme [13]) can only perform well when the relay is very near to the source (i.e., z is small). However, the proposed hybrid cooperative scheme with artificial interference can still perform well when the relay is not near the source (i.e., z is large). When 0 < z < 1.3, the proposed scheme can achieve an exactly larger secrecy rate in comparison with the NF scheme [12]. Interestingly, the proposed scheme can still outperform the NF scheme when 1 < z < 1.3, which means that partially decoding the source message at the relay is useful, even if hsr < hse. This is because the interference at the relay can protect the transmissions from the source to the relay by confusing the eavesdropper. When z > 1.3, the proposed scheme reduces to the NF scheme, and the relay should not decode any source message in this case. In the second sub-figure, i.e., Figure 4b, we consider the high transmit power pair (P1, P2) = (100, 200). From this sub-figure, one can see that the performance gain between the proposed scheme and each comparable one is enlarged. This is because the performance of the proposed scheme can be greatly enhanced when the transmit powers at the source and the relay increase, as shown in Lemma 2 and Remark 6.

Figure 5 shows the achievable secrecy rates achieved by the proposed scheme and the comparable ones for the case that the relay is in Track 2. Figure 5a,b also considers the moderate power pair (P1, P2) = (10, 20) and the high power pair (P1, P2) = (100, 200), respectively. Since the relay is nearer the eavesdropper in Track 2, the NF scheme is invalid. In this case, the CJ scheme [6] can achieve a positive secrecy rate, since the artificial noise at the relay harms the eavesdropper more than it harms the destination. However, the achievable secrecy rate of the CJ scheme is bounded even at high transmit power, as shown in [14]. To the contrary, the achievable secrecy rate of the proposed scheme is unbounded at high transmit power, as shown in Equation (19) and Remark 6. This is mainly because the interference at the relay can protect the transmissions from the source to the relay by confusing the eavesdropper, as discussed in Remark 6. As a result, the proposed scheme outperforms the CJ scheme and the comparable ones, especially in the high power region, as shown in Figure 5a,b.

3.4. Comparison with the Secrecy Rate in [20]

Since it is intractable to compare the two secrecy rates achieved by the proposed scheme and the one in [20] in theory, in this subsection, some numerical examples will be illustrated to compare these two achievable secrecy rates. We will first prove that the CF relaying strategy is useless when considering the perfect secrecy rate. Since the random variables (V, U) in [20] have the same meaning as that of (U, V1) in this paper, (V, U) in [20] are replaced by (U, V1), respectively, for coherence. When considering the perfect secrecy rate, R1 = Re in Equation (17) in [20] and Re can be upper bounded as:

R e ( a ) min { I ( X 2 ; Y U ) , I ( X 2 ; Y 2 U , X 1 ) } - I ( Y 1 ; Y ^ 1 X 2 , V 1 ) + I ( X 1 ; Y ^ 1 Y , X 2 , V 1 ) + I ( X 1 ; Y X 2 , V 1 ) + min { I ( V 1 ; Y 1 U , X 2 ) , I ( U ; Y ) + I ( V 1 ; Y U , X 2 ) } - I ( X 1 , X 2 ; Y 2 ) ( b ) min { I ( X 2 ; Y U ) , I ( X 2 ; Y 2 U , X 1 ) } + I ( X 1 ; Y X 2 , V 1 ) + min { I ( V 1 ; Y 1 U , X 2 ) , I ( U ; Y ) + I ( V 1 ; Y U , X 2 ) } - I ( X 1 , X 2 ; Y 2 )

for some distribution p(u, v1, x1, x2, ŷ1, y, y1, y2) = p(u)p(v1|u)p(x1|v1)p(x2|u)p(ŷ1|y1, v1, x2) p(y, y1, y2|x1, x2), where (a) is due to Equation (18) in [20]; (b) is due to the Markov chain (Y, X1) → (Y1, X2, V1) → Ŷ1, which leads to the fact that:

I ( X 1 ; Y ^ 1 Y , X 2 , V 1 ) = H ( Y ^ 1 Y , X 2 , V 1 ) - H ( Y ^ 1 Y , X 1 , X 2 , V 1 ) H ( Y ^ 1 X 2 , V 1 ) - H ( Y ^ 1 Y 1 , Y , X 1 , X 2 , V 1 ) = H ( Y ^ 1 X 2 , V 1 ) - H ( Y ^ 1 Y 1 , X 2 , V 1 ) = I ( Y 1 ; Y ^ 1 X 2 , V 1 ) .

From Equation (20), obviously we should set Ŷ1 = ∅︀, and the CF relaying strategy is useless. Now, the network geometry of Track 1 in Figure 3 is taken as an example to compare the proposed scheme and the one in [20]. To be fair, the random variables (U, V1, X1, X2) in Equation (20) are also set according to Equations (11)(13).

As shown in Figure 6a,b, the scheme in [20] outperforms the proposed scheme when the source-relay channel is strong (i.e., z is small), but the proposed scheme outperforms the scheme in [20] when the source-relay channel is weak (i.e., z is large). In other words, each of the two coding schemes has its own advantages, depending on the choices of z. This is mainly because different decoding strategies are utilized in this paper and [20]. Specifically, the scheme in [20] decodes the common part of the source messages (V1) after decoding the interference messages (X2) from the relay, which is beneficial for the receiver to decode the common part of the source message. When the source-relay channel is strong, such a scheme performs well, since most source messages should be allocated to the common part. To the contrary, the proposed scheme decodes these two messages in a reversed order, which is beneficial for the receiver to decode the the interference message. This implies that the proposed scheme can set the rate of the interference message larger to confuse the eavesdropper and, hence, performs better than the comparable one for a weak source-relay channel.

4. Proof of Theorem 1

4.1. Preliminary Results

In the following, we first give a useful lemma with respect to the equivalency of two mutual information.

Lemma 3

For a given joint distribution, p℘, I(X2; Y2|U, X1) = I(X2; Y2|U, V1, X1).

Proof

Refer to Appendix B

Moreover, we define some parameters as follows:

R 12 x I ( U , V 1 ; Y 2 ) - ɛ 1 ,
R 2 min { I ( X 2 ; Y U , V 1 ) , I ( X 2 ; Y 2 U , X 1 ) } - ɛ 1 ,
R 11 x min { I ( X 1 , X 2 ; Y 2 U , V 1 ) - R 2 , I ( X 1 ; Y 2 U , V 1 , X 2 ) + ɛ 1 } - 2 ɛ 1 .

Based on Lemma 3, R 11 x in Equation (24) can be rewritten as:

R 11 x = I ( X 1 ; Y 2 U , V 1 , X 2 ) + min { I ( X 2 ; Y U , V 1 ) , I ( X 2 ; Y 2 U , V 1 ) } - min { I ( X 2 ; Y U , V 1 ) , I ( X 2 ; Y 2 U , X 1 ) } - ɛ 1 .

The proof of the above equality will be provided in Appendix C.

4.2. Proof of Theorem 1

The proposed achievable scheme is based on the careful combination of the partial DF [18] scheme for the relay channel, the NF scheme [12] for the relay-eavesdropper channel and the random binning for the wiretap channel [2]. We first consider the random code generation as follows.

Codebook Generation

  • For a given distribution, p, generate at random 2 n ( R 12 + R 12 x ) independent and identically distributed (i.i.d.) n-sequences, each according to p ( u n ) = i = 1 n p ( u i ). Then, randomly group these codewords into 2nR12 bins, each with 2 n R 12 x codewords, and index them as u n ( w c , 1 , w c , 1 x ), where wc,1 ∈ {1,, 2nR12}, w c , 1 x { 1 , , 2 n R 12 x }. For simplicity, let

    w 0 = ( w c , 1 , w c , 1 x ) .

  • For each un(w0), the relay generates at random 2nR2 i.i.d. n-sequences, each according to p ( x 2 n u n ) = i = 1 n p ( x 2 , i u i ). Index them as x 2 n ( w 0 , w 2 ), where w2 ∈ {1,, 2nR2}.

  • For each un(w0), generate at random 2 n ( R 12 + R 12 x ) i.i.d. n-sequences, each according to p ( v 1 n u n ) = i = 1 n p ( v 1 , i u i ). Then, randomly group these codewords into 2nR12 bins, each with 2 n R 12 x codewords, and index them as v 1 n ( w 0 , w 12 , w 12 x ), where w12 ∈ {1,, 2nR12}, w 12 x { 1 , , 2 n R 12 x }.

  • For each tuple (un(w0), v 1 n ( w 0 , w 12 , w 12 x )), generate at random 2 n ( R 11 + R 11 x )i.i.d. n-sequences each according to p ( x 1 n v 1 n , u n ) = i = 1 n p ( x 1 , i v 1 , i , u i ). Then, randomly group these codewords into 2nR11 bins, each with 2 n R 11 x codewords, and index them as x 1 n ( w 0 , w 12 , w 12 x , w 11 , w 11 x ), where w11 ∈ {1, …, 2nR11}, w 11 x { 1 , , 2 n R 11 x }.

Encoding

The encoder structure of the proposed scheme is roughly illustrated in Figure 2.

At Block 1, the source sends x 1 n ( w 01 , w 121 , w 121 x , w 111 , w 111 x ) and the relay sends x 2 n ( w 01 , w 21 ), where w01 = (1, 1).

At Block b (2 ≤ bB − 1), the source wishes to send the new confidential message w1b Entropy 16 01819f9 = {1,, 2nR1}. It first splits this message into two independent sub-messages, i.e., w1b = (w12b, w11b), where w12b ∈ {1,, 2nR12}, w11b ∈ {1,, 2nR11} and R1 = R12 + R11. Then, randomly choose some dummy messages, w 12 b x { 1 , , 2 n R 12 x } and w 11 b x { 1 , , 2 n R 11 x }, to be mixed with them, respectively, and the source sends the codeword, x 1 n ( w 0 b , w 12 b , w 12 b x , w 11 b , w 11 b x ), where w 0 b = ( w 12 b - 1 , w 12 b - 1 x ). For the relay node, it is assumed to already have a correct estimation of w 0 b = ( w 12 b - 1 , w 12 b - 1 x ) at the end of Block b − 1 (refer to the decoding part), then it randomly selects a dummy message, w2b ∈ {1,, 2nR2}, and sends x 2 n ( w 0 b , w 2 b ).

At Block B, the source sends x 1 n ( w 0 B , 1 , 1 , 1 , 1 ), and the relay sends x 2 n ( w 0 B , 1 ), where w 0 B = ( w 12 B - 1 , w 12 B - 1 x ).

Decoding

At the end of Block b, assume that the relay has already decoded w 0 b = ( w 12 b - 1 , w 12 b - 1 x ), which was transmitted at Block b − 1. Then, it will find a unique pair (ŵ12b, w ^ 12 b x), such that

( u n ( w 0 b ) , v 1 n ( w 0 b , w ^ 12 b , w ^ 12 b x ) , x 2 n ( w 0 b , w 2 b ) , y 1 n ( b ) ) A ɛ ( n ) ( U , V 1 , X 2 , Y 1 ) .

If there exist more than one or none such pairs, an error occurs. It is not difficult to prove that the error probability goes to zero, if the rates, R12 and R 12 x, satisfy:

R 12 + R 12 x < I ( V 1 ; Y 1 U , X 2 ) .

The destination performs backward decoding. At the end of Block b (2 ≤ bB − 1), assume that the destination has already correctly decoded w 0 b + 1 = ( w 12 b , w 12 b x ) at the end of Block b + 1. Then, the destination will perform separated decoding to decode w0b, w2b and (w11b, w 11 b x), respectively. First, it finds a unique ŵ0b, such that

( u n ( w ^ 0 b ) , v 1 n ( w ^ 0 b , w 12 b , w 12 b x ) , y n ( b ) ) A ɛ ( n ) ( U , V 1 , Y ) .

The error probability goes to zeros if:

R 12 + R 12 x < I ( U , V 1 ; Y )

Second, knowing w0b, the destination finds a unique ŵ2b, such that

( u n ( w 0 b ) , v 1 n ( w 0 b , w 12 b , w 12 b x ) , x 2 n ( w 0 b , w ^ 2 b ) , y n ( b ) ) A ɛ ( n ) ( U , V 1 , X 2 , Y ) .

The error probability goes to zero, since we have fixed R2 to satisfy R2 < I(X2; Y |U, V1) in Equation (23).

Third, knowing w0b and w2b, the destination finds a unique pair (ŵ11b, w ^ 11 b x), such that:

( u n ( w 0 b ) , v 1 n ( w 0 b , w 12 b , w 12 b x ) , x 1 n ( w 0 b , w 12 b , w 12 b x , w ^ 11 b , w ^ 11 b x ) , x 2 n ( w 0 b , w 2 b ) , y n ( b ) ) A ɛ ( n ) ( U , V 1 , X 1 , X 2 , Y ) .

The error probability goes to zeros if:

R 11 + R 11 x < I ( X 1 ; Y U , V 1 , X 2 ) .

Equivocation Computation

We let XBn denote the set, {Xn(1), Xn(2),, Xn(B)}. Xbn and Xn(]b [) denote the set, {Xn(i), 1 ≤ ib}, and the set, {Xn(i), 1 ≤ i < b or b < iB}, respectively. The equivocation over the total B Markov blocks can be bounded as:

H ( W 1 B - 1 Y 2 B n ) = H ( W 1 B - 1 , Y 2 B n ) - H ( Y 2 B n ) = H ( W 1 B - 1 , Y 2 B n , U B n , V 1 B n , X 1 B n , X 2 B n ) - H ( U B n , V 1 B n , X 1 B n , X 2 B n W 1 B - 1 , Y 2 B n ) - H ( Y 2 B n ) = H ( U B n , V 1 B n , X 1 B n , X 2 B n ) + H ( W 1 B - 1 , Y 2 B n U B n , V 1 B n , X 1 B n , X 2 B n ) - H ( U B n , V 1 B n , X 1 B n , X 2 B n W 1 B - 1 , Y 2 B n ) - H ( Y 2 B n ) = H ( U B n , V 1 B n , X 1 B n , X 2 B n ) - I ( U B n , V 1 B n , X 1 B n , X 2 B n , Y 2 B n ) - H ( U B n , V 1 B n , X 1 B n , X 2 B n W 1 B - 1 , Y 2 B n ) .

The first term in Equation (29) is:

H ( U B n , V 1 B n , X 1 B n , X 2 B n ) = n ( B - 1 ) ( R 12 + R 12 x + R 11 + R 11 x + R 2 ) .

The second term can be bounded as:

I ( U B n , V 1 B n , X 1 B n , X 2 B n ; Y 2 B n ) = b = 1 B I ( U B n , V 1 B n , X 1 B n , X 2 B n ; Y 2 n ( b ) Y 2 ( b - 1 ) n ) ( a ) b = 1 B [ H ( Y 2 n ( b ) ) - H ( Y 2 n ( b ) U B n , V 1 B n , X 1 B n , X 2 B n , Y 2 ( b - 1 ) n ) ] = ( b ) b = 1 B [ H ( Y 2 n ( b ) ) - H ( Y 2 n ( b ) U n ( b ) , V 1 n ( b ) , X 1 n ( b ) , X 2 n ( b ) ) ] = b = 1 B I ( U n ( b ) , V 1 n ( b ) , X 1 n ( b ) , X 2 n ( b ) ; Y 2 n ( b ) )

where (a) follows by the fact that conditioning does not increase entropy. (b) follows from the fact that Y 2 n ( b ) - ( U n ( b ) , V 1 n ( b ) , X 1 n ( b ) , X 2 n ( b ) ) - ( U n ( ] b [ ) , V 1 n ( ] b [ ) , X 1 n ( ] b [ ) , X 2 n ( ] b [ ) , Y 2 ( b - 1 ) n ) is a Markov chain. Such a Markov chain is due to the memoryless channel and can be observed from encoding process in which Y 2 n ( b ) depends on ( U n ( ] b [ ) , V 1 n ( ] b [ ) , X 1 n ( ] b [ ) , X 2 n ( ] b [ ) , Y 2 ( b - 1 ) n ) only through U n ( b ) , V 1 n ( b ) , X 1 n ( b ) , X 2 n ( b ).

Furthermore, for ∀b ∈ [1 : B], we have:

I ( U n ( b ) , V 1 n ( b ) , X 1 n ( b ) , X 2 n ( b ) ; Y 2 n ( b ) ) ( c ) n [ I ( U , V 1 , X 1 , X 2 ; Y 2 ) + ɛ 2 ] = n [ I ( U , V 1 ; Y 2 ) + I ( X 1 , X 2 ; Y 2 U , V 1 ) + ɛ 2 ] ,

and:

and :             I ( U n ( b ) , V 1 n ( b ) , X 1 n ( b ) , X 2 n ( b ) ; Y 2 n ( b ) ) = I ( U n ( b ) , V 1 n ( b ) ; Y 2 n ( b ) ) + I ( X 1 n ( b ) , X 2 n ( b ) ; Y 2 n ( b ) U n ( b ) , V 1 n ( b ) ) ( d ) n [ I ( U , V 1 ; Y 2 ) + ɛ 1 ] + I ( X 1 n ( b ) ; Y 2 n ( b ) U n ( b ) , V 1 n ( b ) , X 2 n ( b ) ) + I ( X 2 n ( b ) ; Y 2 n ( b ) U n ( b ) , V 1 n ( b ) ) ( e ) n [ I ( U , V 1 ; Y 2 ) + I ( X 1 ; Y 2 U , V 1 , X 2 ) + ɛ 1 + ɛ 2 ] + H ( X 2 n ( b ) U n ( b ) ) = n [ I ( U , V 1 ; Y 2 ) + I ( X 1 ; Y 2 U , V 1 , X 2 ) + R 2 + ɛ 1 + ɛ 2 ] ,

where (c), (d) and (e) can be obtained using the same approach in [10] (Lemma 3). According to the above two inequalities, I ( U B n , V 1 B n , X 1 B n , X 2 B n , Y 2 B n ) in Equation (31) can be bounded as:

I ( U B n , V 1 B n , X 1 B n , X 2 B n ; Y 2 B n ) n B [ I ( U , V 1 ; Y 2 ) + min  { I ( X 1 , X 2 ; Y 2 U , V 1 ) , I ( X 1 ; Y 2 U , V 1 , X 2 ) + R 2 + ɛ 1 } + ɛ 2 ] .

To bound the third term, H ( U B n , V 1 B n , X 1 B n , X 2 B n W 1 B - 1 , Y 2 B n ), we will prove that the eavesdropper can correctly decode (UBn, V 1 B n , X 1 B n , X 2 B n) with the side information, W 1 B - 1. Note that (UBn, V 1 B n , X 1 B n , X 2 B n) is determined by the message tuple (w12b, w 12 b x, w11b, w 11 b x, w2b) for ∀b ∈ [1 : B]. Thus, with the knowledge of W1(b) = w1b = (w12b, w11b) for ∀b ∈ [1 : B], the eavesdropper only needs to utilize backward decoding to decode ( w 12 b - 1 x, w2b, w 11 b x) at the end of Block b. Then, the eavesdropper can determine the message tuple (w12b, w 12 b x, w11b, w 11 b x, w2b) for ∀b ∈ [1 : B]. Let λ ( w 1 B - 1 ) denote the average error probability of decoding ( w 12 b - 1 x, w2b, w 11 b x) for ∀b ∈ [1 : B] at the eavesdropper. The following lemma shows that λ ( w 1 B - 1 ) is arbitrarily small.

Lemma 4. λ ( w 1 B - 1 ) ɛ 0 for sufficiently large n.

Proof

Refer to Appendix D.

Then, based on Fano’s inequality, it can be easily obtained that:

1 n B H ( U n B , V 1 n B , X 1 n B , X 2 n B W 1 B - 1 = w 1 B - 1 , Y 2 n B ) 1 n B [ 1 + λ ( w 1 B - 1 ) log  ( W 12 x B - 1 × W 11 x B - 1 × W 2 B - 1 ) ] 1 n B [ 1 + n ( B - 1 ) ɛ 0 ( R 12 x + R 11 x + R 2 ) ] ɛ 3 .

Hence, the third term in Equation (29) can be bounded as:

1 n B H ( U n B , V 1 n B , X 1 n B , X 2 n B W 1 B - 1 , Y 2 n B ) = w 1 B - 1 p ( w 1 B - 1 ) 1 n B H ( U n B , V 1 n B , X 1 n B , X 2 n B W 1 B - 1 = w 1 B - 1 , Y 2 n B ) ɛ 3 .

Now, according to the definitions in Equations (22)(24) and by combining Equation (29) with Equations (30), (34) and (35), we have:

1 n B H ( W 1 B - 1 Y 2 n B ) B - 1 B ( R 12 + R 11 ) - 1 B ( R 12 x + R 11 x + R 2 ) - 3 ɛ 1 - ɛ 2 - ɛ 3 .

Let B →∞; the secret constraint is satisfied. Furthermore, according to Equations (26), (27) and (28), one can verify that the secrecy rate, R11(p) + R12(p) (defined in Equations (4) and (5)), is achievable by using the conversion of R 11 x in Equation (25).

5. Conclusions

In this paper, we have proposed a hybrid cooperative coding scheme, which enables the relay to integrate the explicit cooperation strategy and the implicit cooperation strategy by forwarding source messages and additional interference at the same time. The basic idea is to combine the partial DF scheme [18], the NF [12] scheme and random binning [2]. The derived achievable secrecy rate shows that the proposed scheme outperforms some existing works. Then, the achievable secrecy rate is extended to the memoryless Gaussian channel using Gaussian codebooks, and a power policy is developed in the high power region. The result shows that the secrecy rate achieved by the proposed scheme is sufficiently large in the high power region, even if the source-relay link is weak. This is benefited from the fact that the transmissions from the source to the relay can be protected by the interference generated at the relay. Finally, some numerical results have been carried out to demonstrate that the proposed scheme outperforms the comparable ones, especially in the high power region.

Due to the advantages of the hybrid cooperative coding schemes, a future direction of interest is to study the hybrid cooperative coding schemes for more complicated scenarios with more than one confidential message. One can also design more excellent coding schemes, such as combing the channel prefixing techniques [3] and utilizing a more general joint decoding approaches. For simplicity, the proposed scheme uses a separated decoding approach to decode the interference messages, as shown in Section 4, but it is worth pointing out that coding schemes associated with joint decoding may further enhance the security level.

Acknowledgment

The work of Peng Xu and Xuchu Dai was supported by the National Basic Research Program of China (973 Program: 2013CB329004), the National Natural Science Foundation of China (mo. 61271272) and the Intercollegiate Key Project of Nature Science of Anhui Province under Grant No. KJ2012A283. The authors are also grateful to the anonymous reviewers for their helpful suggestions.

Appendix

A. Proof of Lemma 2

A.1. Simplified Expression of the Secrecy Rate

Here, we will simplify the expression of the secrecy rate in Equation (15). Specifically, let: 1 = |hsd|2P1, P ¯ 1 = h s d 2 P 1 , P ¯ 1 u = h s d 2 P 1 u , P ¯ 1 v 0 = h s d 2 P 1 v 0 , P ¯ 1 x 0 = h s d 2 P 1 x 0 and 2 = |hre|2P2, P ¯ 2 u = h r e 2 P 2 u , P ¯ 2 x 0 = h r e 2 P 2 x 0. Then, the power allocation set in Equation (14) becomes:

A ¯ = { ( P ¯ 1 u , P ¯ 1 v 0 , P ¯ 1 x 0 , P ¯ 2 u , P ¯ 2 x 0 ) P ¯ 1 u , P ¯ 1 v 0 , P ¯ 1 x 0 , P ¯ 2 u , P ¯ 2 x 0 0 P ¯ 1 u + P ¯ 1 v 0 + P ¯ 1 x 0 P ¯ 1 , P ¯ 2 u + P ¯ 2 x 0 P ¯ 2 } .

Using the above conversions and the definitions of a, b, c in Lemma 2, for a Ā Entropy 16 01819f18, R 11 G and R 12 G in Equations (16) and (17) can be rewritten as:

R 11 G ( r , A ¯ ) = C ( P ¯ 1 x 0 ) + min  { C ( b P ¯ 2 x 0 1 + P ¯ 1 x 0 ) , C ( P ¯ 2 x 0 ) } - min  { C ( b P ¯ 2 x 0 1 + P ¯ 1 x 0 ) , C ( P ¯ 2 x 0 1 + a P ¯ 1 x 0 ) } - C ( a P ¯ 1 x 0 ) ,
R 12 G ( r , A ¯ ) = min  { C ( P ¯ 1 u + r b P ¯ 2 u 2 + P ¯ 1 v 0 1 + P ¯ 1 x 0 + b P ¯ 2 x 0 ) , C ( c P ¯ 1 v 0 1 + c P ¯ 1 x 0 ) } - C ( a P ¯ 1 u + r P ¯ 2 u 2 + a P ¯ 1 v 0 1 + a P ¯ 1 x 0 + P ¯ 2 x 0 ) .

A.2. Proof of Lemma 2

From Equation (39), obviously, we have:

R 12 G ( r , A ¯ ) min  { C ( P ¯ 1 u + r b P ¯ 2 u 2 + P ¯ 1 v 0 1 + P ¯ 1 x 0 + b P ¯ 2 x 0 ) , C ( c P ¯ 1 v 0 1 + c P ¯ 1 x 0 ) } - C ( a P ¯ 1 v 0 1 + a P ¯ 1 x 0 + P ¯ 2 x 0 )

When P1 = P2 = P → ∞, let P ¯ 1 v 0 P β , P ¯ 2 x 0 P γ and P ¯ 1 x 0 P η with 0 ≤ β, γ, η ≤ 1. Then, the three terms at the right-hand of Equation (40) can be upper bounded as:

lim P 1 log  P C ( P ¯ 1 u + r b P ¯ 2 u 2 + P ¯ 1 v 0 1 + P ¯ 1 x 0 + b P ¯ 2 x 0 ) 1 2 ( 1 - max { γ , η } )
lim P 1 log  P C ( c P ¯ 1 v 0 1 + c P ¯ 1 x 0 ) = 1 2 [ β - η ] +
lim P 1 log  P C ( a P ¯ 1 v 0 1 + a P ¯ 1 x 0 + P ¯ 2 x 0 ) = 1 2 [ β - max { γ , η } ] +

where Equation (41) holds, since it is maximized by P ¯ 1 u P 1 and P ¯ 2 u P 1.

Now, for r = ±1 and ∀Ā Entropy 16 01819f18, combining Equation (40) with the above three relationships, we have:

lim P R 12 G ( r , A ¯ ) log  P 1 2 ( min  { 1 - max { γ , η } , [ β - η ] + } - [ β - max { γ , η } ] + )
= 1 2 min  { 1 - max { γ , η } - [ β - max { γ , η } ] + , [ β - η ] + - [ β - max { γ , η } ] + }
1 2 min { 1 - γ - [ β - γ + ] , β - [ β - γ ] + }
1 4 ,

where Equation (46) holds, since η = 0 maximizes Equation (45); Equation (47) holds, since β = γ = 1 2 maximizes Equation (46). This can be seen from the following proof steps.

If 0 ≤ γβ ≤ 1, we have:

min { 1 - γ - [ β - γ ] + , β - [ β - γ ] + } = min { 1 - β , γ } ( a ) min { 1 - β , β } ( b ) 1 2 ,

where “≤” in both (a) and (b) can be replaced by “=” by choosing β = γ = 1 2 in this case.

On the other hand, if 0 ≤ βγ ≤ 1, we have:

min { 1 - γ - [ β - γ ] + , β - [ β - γ ] + } = min { 1 - γ , β } ( c ) min { 1 - γ , γ } ( d ) 1 2 ,

where “≤” in both (c) and (d) can be replaced by “=” by choosing β = γ = 1 2 in this case.

In addition, according to Equation (38) and [14] (Lemma 2), max A ¯ R 11 G becomes a constant when P →∞, i.e., lim P max A ¯ R 11 G log  P = 0. Therefore, the achievable secrecy rate in Equation (15) satisfies

lim P R s G log  P = max r , A ¯ R 12 G log  P 1 4 .

On the other hand, one can verify that lim P R 12 G log  P = 1 4 can be achieved by setting r = −1, P ¯ 2 u = a P ¯ 1 u and ( P 1 u , P 1 v 0 , P 1 x 0 , P 2 u , P 2 x 0 ) ( P 1 , P 1 2 , P 0 , P 1 , P 1 2 ). Thus, the power policy in Lemma 2 is optimal, and this lemma has been proven.

B. Proof of Lemma 3

Before the proof of the equivalency, we first prove that V1 − (U, X1) − Y2 forms a Markov chain for a joint distribution, p (defined in Definition 1). Specifically,

p ( y 2 v 1 , u , x 1 ) = x 2 X 2 p ( x 2 , y 2 u , v 1 , x 1 ) = x 2 X 2 p ( x 2 u , v 1 , x 1 ) p ( y 2 u , v 1 , x 1 , x 2 ) = ( a ) x 2 X 2 p ( x 2 u ) p ( y 2 x 1 , x 2 ) = ( b ) x 2 X 2 p ( x 2 u , x 1 ) p ( y 2 u , x 1 , x 2 ) = p ( y 2 u , x 1 ) ,

where (a) is due to the two Markov chains: (V1, X1) − UX2 and (U, V1) − (X1, X2) − Y2, as shown in Definition 1; (b) is due to the two Markov chains: X1UX2 and U − (X1, X2) − Y2.

Based on such a Markov chain, we have:

I ( X 2 ; Y 2 U , V 1 , X 1 ) = H ( Y 2 U , V 1 , X 1 ) - H ( Y 2 U , V 1 , X 1 , X 2 ) = H ( Y 2 U , X 1 ) - H ( Y 2 X 1 , X 2 ) = H ( Y 2 U , X 1 ) - H ( Y 2 U , X 1 , X 2 ) = I ( X 2 ; Y 2 U , X 1 ) .

C. Proof of Equation (25)

Before the proof steps, for a given p, we first show that I(X2; Y2|U, X1) ≥ I(X2; Y2|U, V1) as follows:

I ( X 2 ; Y 2 U , X 1 ) = ( a ) I ( X 2 ; Y 2 U , V 1 , X 1 ) = ( b ) H ( X 2 U ) - H ( X 2 Y 2 , U , V 1 , X 1 ) = ( c ) H ( X 2 U , V 1 ) - H ( X 2 Y 2 , U , V 1 , X 1 ) H ( X 2 U , V 1 ) - H ( X 2 Y 2 , U , V 1 ) = I ( X 2 ; Y 2 U , V 1 ) ,

where (a) is due to Lemma 3; (b) is due to the Markov chain: (V1, X1) − UX2; (c) is due to the Markov chain: V1UX2.

Now, from Equation (24), we can rewrite R 11 x as:

R 11 x = I ( X 1 ; Y 2 U , V 1 , X 2 ) + min { I ( X 2 ; Y 2 U , V 1 ) - R 2 - ɛ 1 , 0 } - ɛ 1 .

According to the definition of R2 in Equation (23) and the relationship I(X2; Y2|U, X1) ≥ I(X2; Y2|U, V1) in Equation (52), R 11 x can be further expressed as:

R 11 x = { I ( X 1 ; Y 2 U , V 1 , X 2 ) - ɛ 1 , if  I ( X 2 ; Y 2 U , V 1 ) > I ( X 2 ; Y U , V 1 ) I ( X 1 ; Y 2 U , V 1 , X 2 ) + I ( X 2 ; Y 2 U , V 1 ) - R 2 - 2 ɛ 1 , if  I ( X 2 ; Y 2 U , V 1 ) I ( X 2 ; Y U , V 1 ) = I ( X 1 ; Y 2 U , V 1 , X 2 ) + min { I ( X 2 ; Y U , V 1 ) , I ( X 2 ; Y 2 U , V 1 ) } - min { I ( X 2 ; Y U , V 1 ) , I ( X 2 ; Y 2 U , X 1 ) } - ɛ 1 .

D. Proof of Lemma 4

With the knowledge of W1(b) = w1b = (w12b, w11b) for ∀b ∈ [1 : B − 1], the eavesdropper utilizes backward decoding to decode ( w 12 b - 1 x, w2b, w 11 b x) at the end of Block b. Assume that the eavesdropper has correctly decoded w 0 b + 1 = ( w 12 b , w 12 b x ) at the end of Block b + 1; then, it first finds a unique w ^ 0 b = ( w 12 b - 1 , w ^ 12 b - 1 x ), such that:

( u n ( w ^ 0 b ) , v 1 n ( w ^ 0 b , w 0 b + 1 ) , y 2 n ( b ) ) A ɛ ( n ) ( U , V 1 , Y 2 ) .

Since the eavesdropper knows w12b−1, it only needs to find a unique w ^ 12 b - 1 x.

After decoding w0b, the eavesdropper finds a unique pair (ŵ2b, w ^ 11 b x), such that:

( u n ( w 0 b ) , v 1 n ( w 0 b , w 0 b + 1 ) , x 1 n ( w 0 b , w 0 b + 1 , w 11 b , w ^ 11 b x ) , x 2 n ( w 0 b , w ^ 2 b ) , y 2 n ( b ) ) A ɛ ( n ) ( U , V 1 , X 1 , X 2 , Y 2 ) .

Analysis of error probability

With out loss of generality, assume that the transmitted message tuple is ( w 12 b - 1 x , w 2 b , w 11 b x ) = ( 1 , 1 , 1 ) at Block b. The decoding process discussed above contains the following error events:

  • E1: w 12 b - 1 x = 1 does not satisfy Equation (55) or w 12 b - 1 x 1 satisfies Equation (55);

  • E2: ( w 2 b , w 11 b x ) = ( 1 , 1 ) does not satisfy Equation (56);

  • E31: ( w 2 b , w 11 b x ) = ( i , 1 ) satisfies Equation (56), where i ≠ 1.

  • E32: ( w 2 b , w 11 b x ) = ( 1 , j ) satisfies Equation (56), where j ≠ 1.

  • E33: ( w 2 b , w 11 b x ) = ( i , j ) satisfies Equation (56), where i, j ≠ 1.

Then, the average error probability at Block b can be upper bounded as:

P E ( n ) = P { E 1 E 2 ( k = 1 3 E 3 k ) } = P { E 1 } + P { E 1 c ( E 2 ( k = 1 3 E 3 k ) ) } = P { E 1 } + P { ( E 1 c E 2 ) ( k = 1 3 ( E 1 c E 3 k ) ) } P { E 1 } + P { E 1 c E 2 } + k = 1 3 P { E 1 c E 3 k } P { E 1 } + P { E 21 E 1 c } + k = 1 3 P { E 3 k E 1 c }

Now, we will calculate each term in the Equation (57). According to Equation (22), since R 12 x < I ( U , V 1 ; Y 2 ), it is not difficult to prove that P{E1} ≤ 1 for sufficiently large n. When E 1 c occurs, the eavesdropper can correctly decode w 12 b - 1 x = 1. In this case, it is obvious that P { E 21 E 1 c } ɛ 1, according to the asymptotic equipartition property (AEP) [21]. Next, we will calculate P { E 3 k E 1 c } for κ = 1, 2, 3 according to the properties of the joint typicality [21].

P { E 31 E 1 c } = P { ( u n ( w 0 b ) , v 1 n ( w 0 b , w 0 b + 1 ) , x 1 n ( w 0 b , w 0 b + 1 , w 11 b , 1 ) , x 2 n ( w 0 b , i ) , y 2 n ( b ) ) A ɛ ( n ) , i 1 } 2 n R 2 ( u n , v 1 n , x 1 n , x 2 n , y 2 n ) A ɛ ( n ) p ( u n ) p ( v 1 n , x 1 n u n ) p ( x 2 n u n ) p ( y 2 n x 1 n , v 1 n , u n ) 2 n R 2 2 n ( H ( U , V 1 , X 1 , X 2 , Y 2 ) + ɛ ) 2 - n ( H ( U ) - ɛ ) 2 - n ( H ( V 1 , X 1 U ) - ɛ ) × 2 - n ( H ( X 2 U ) - ɛ ) 2 - n ( H ( Y 2 U , V 1 , X 1 ) - ɛ ) = 2 - n ( I ( X 2 ; Y 2 , V 1 , X 1 U ) - R 2 - 5 ɛ ) = 2 - n ( I ( X 2 ; Y 2 U , V 1 , X 1 ) - R 2 - 5 ɛ ) = 2 - n ( I ( X 2 ; Y 2 U , X 1 ) - R 2 - 5 ɛ )

where the last relationship is due to Lemma 3. Similarly, we have:

P { E 32 E 1 c } 2 - n ( I ( X 1 ; Y 2 U , V 1 , X 2 ) - R 11 x - 5 ɛ )

and:

P { E 33 E 1 c } 2 - n ( I ( X 1 , X 2 ; Y 2 U , V 1 ) - R 2 - R 11 x - 5 ɛ )

Since we have set the rate pair (R2, R 11 x) in Equations (23) and (24) to satisfy:

{ R 2 < I ( X 2 ; Y 2 U , X 1 ) R 11 x < I ( X 1 ; Y 2 U , V 1 , X 2 ) R 2 + R 11 x < I ( X 1 , X 2 ; Y 2 U , V 1 ) ,

the probability of P ( E 3 k E 1 c ) is arbitrarily small for ∀κ ∈ {1, 2, 3}, as long as n is sufficiently large.

Thus, P E ( n ) in Equation (57) satisfies P E ( n ) ɛ 2 for sufficiently large n. Consequently, λ ( w 1 B - 1 ) in Lemma 4 can be arbitrarily small, and this lemma has been proven.

Conflicts of Interest

The authors declare no conflict of interest.

  • Author ContributionsAll the authors contributed to the design, analysis, numerical results and presentation of the paper. All the three authors discussed, read and approved this manuscript.

References

  1. Shannon, C. Communication theory of secrecy systems. Bell Syst. Tech. J 1949, 28, 656–715. [Google Scholar]
  2. Wyner, A. The wire-tap channel. Bell Syst. Tech. J 1975, 54, 1355–1387. [Google Scholar]
  3. Csiszár, I.; Körner, J. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 1978, IT-24, 339–348. [Google Scholar]
  4. Chen, Y.; Han Vinck, A. Wiretap channel with side information. IEEE Trans. Inf. Theory 2008, 54, 395–402. [Google Scholar]
  5. Dai, B.; Luo, Y. Some New Results on the Wiretap Channel with Side Information. Entropy 2012, 14, 1671–1702. [Google Scholar]
  6. Tekin, E.; Yener, A. The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming. IEEE Trans. Inf. Theory 2008, 54, 2735–2751. [Google Scholar]
  7. Xu, P.; Ding, Z.; Dai, X. Rate Regions for Multiple Access Channel with Conference and Secrecy Constraints. IEEE Trans. Inf. Forensics Secur 2013, 8, 1961–1974. [Google Scholar]
  8. Liang, Y.; Poor, H. Multiple-access channels with confidential messages. IEEE Trans. Inf. Theory 2008, 54, 976–1002. [Google Scholar]
  9. Liu, R.; Maric, I.; Yates, R.; Spasojevic, P. The discrete memoryless multiple access channel with confidential messages. Proceedings of 2006 IEEE International Symposium on Information Theory, Seattle, WA, USA, 9–14 July 2006; pp. 957–961.
  10. Liu, R.; Maric, I.; Spasojevic, P.; Yates, R. Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions. IEEE Trans. Inf. Theory 2008, 54, 2493–2507. [Google Scholar]
  11. Ekrem, E.; Ulukus, S. Secrecy in cooperative relay broadcast channels. IEEE Trans. Inf. Theory 2011, 57, 137–155. [Google Scholar]
  12. Lai, L.; El Gamal, H. The relay-eavesdropper channel: Cooperation for secrecy. IEEE Trans. Inf. Theory 2008, 54, 4005–4019. [Google Scholar]
  13. Vaneet, A.; Lalitha, S.; Robert, A. C.; Vincent, H. P. Secrecy capacity of a class of orthogonal relay eavesdropper channels. EURASIP J. Wirel. Commun. Netw 2009, 2009. [Google Scholar] [CrossRef]
  14. Tang, X.; Liu, R.; Spasojevic, P.; Poor, H. Interference Assisted Secret Communication. IEEE Trans. Inf. Theory 2011, 57, 3153–3167. [Google Scholar]
  15. Awan, Z.H.; Zaidi, A.; Vandendorpe, L. Multiaccess Channel with Partially Cooperating Encoders and Security Constraints. IEEE Trans. Inf. Forensics Secur 2013, 8, 1243–1254. [Google Scholar]
  16. Oohama, Y. Relay channels with confidential messages 2007. arXiv:cs/0611125 [cs.IT].
  17. He, X.; Yener, A. Cooperation with an untrusted relay: A secrecy perspective. IEEE Trans. Inf. Theory 2010, 56, 3807–3827. [Google Scholar]
  18. Cover, T.; Gamal, A. Capacity theorems for the relay channel. IEEE Trans. Inf. Theory 1979, 25, 572–584. [Google Scholar]
  19. Awan, Z.H.; Zaidi, A.; Vandendorpe, L. Secure communication over parallel relay channel. IEEE Trans. Inf. Forensics Secur 2013, 7, 359–371. [Google Scholar]
  20. Sonee, A.; Salimi, S. A new achievable rate-equivocation region for the relay-eavesdropper channel. Proceedings of 18th Iranian Conference on Electrical Engineering (ICEE), Isfahan, Iran, 11–13 May 2010; pp. 188–193.
  21. Cover, T.; Thomas, J. Elements of Information Theory, 2nd ed; Wiley: New York, NY, USA, 2006. [Google Scholar]
Figure 1. Relay-eavesdropper channel.
Figure 1. Relay-eavesdropper channel.
Entropy 16 01819f1 1024
Figure 2. The encoder structure in Block b, 2 ≤ bB, where the common message w 0 b = ( w 12 b - 1 , w 12 b - 1 x ), which is transmitted by the source in the previous block, and “SP” is the abbreviation of the word “superposition”.
Figure 2. The encoder structure in Block b, 2 ≤ bB, where the common message w 0 b = ( w 12 b - 1 , w 12 b - 1 x ), which is transmitted by the source in the previous block, and “SP” is the abbreviation of the word “superposition”.
Entropy 16 01819f2 1024
Figure 3. The considered Gaussian network topology.
Figure 3. The considered Gaussian network topology.
Entropy 16 01819f3 1024
Figure 4. Achievable secrecy rates of various coding schemes versus the location of the relay (i.e., the value of z), where the relay is in Track 1.
Figure 4. Achievable secrecy rates of various coding schemes versus the location of the relay (i.e., the value of z), where the relay is in Track 1.
Entropy 16 01819f4 1024
Figure 5. Achievable secrecy rates of various coding schemes versus the location of the relay (i.e., the value of z), where the relay is in Track 2.
Figure 5. Achievable secrecy rates of various coding schemes versus the location of the relay (i.e., the value of z), where the relay is in Track 2.
Entropy 16 01819f5 1024
Figure 6. Achievable secrecy rates of two coding schemes versus the location of the relay (i.e., the value of z), where the relay is in Track 1 in Figure 3.
Figure 6. Achievable secrecy rates of two coding schemes versus the location of the relay (i.e., the value of z), where the relay is in Track 1 in Figure 3.
Entropy 16 01819f6 1024

Share and Cite

MDPI and ACS Style

Xu, P.; Ding, Z.; Dai, X. A Hybrid Cooperative Coding Scheme for the Relay-Eavesdropper Channel. Entropy 2014, 16, 1819-1841. https://doi.org/10.3390/e16031819

AMA Style

Xu P, Ding Z, Dai X. A Hybrid Cooperative Coding Scheme for the Relay-Eavesdropper Channel. Entropy. 2014; 16(3):1819-1841. https://doi.org/10.3390/e16031819

Chicago/Turabian Style

Xu, Peng, Zhiguo Ding, and Xuchu Dai. 2014. "A Hybrid Cooperative Coding Scheme for the Relay-Eavesdropper Channel" Entropy 16, no. 3: 1819-1841. https://doi.org/10.3390/e16031819

Article Metrics

Back to TopTop