Cited time in webofscience Cited time in scopus

Secure Communications for the Two-User Broadcast Channel With Random Traffic

Title
Secure Communications for the Two-User Broadcast Channel With Random Traffic
Author(s)
Mohapatra, P.Pappas, N.Lee, Je MinQuek, T.Q.S.Angelakis, V.
DGIST Authors
Mohapatra, P.Pappas, N.Lee, Je MinQuek, T.Q.S.Angelakis, V.
Issued Date
2018-09
Type
Article
Article Type
Article; Proceedings Paper
Author Keywords
Broadcast channelbursty trafficstability regionsuccessive decodingqueueing
Keywords
MULTIPLE-ACCESSFUNDAMENTAL LIMITSINTERFERENCESTABILITYSECRECYNETWORKSSYSTEMSERROR
ISSN
1556-6013
Abstract
In this work, we study the stability region of the two-user broadcast channel (BC) with bursty data arrivals and security constraints. It is assumed that one of the receivers has a secrecy constraint, i.e., its packets need to be kept secret from the other receiver, which is defined based on SINR. The receiver with secrecy constraint has full-duplex capability to send a jamming signal for improving its service rate. The stability region of the two-user BC with secrecy constraint is characterized for the general decoding case. Then, assuming two different decoding schemes the respective stability regions are derived. The fullduplex operation of receiver results in self-interference, and the effect of imperfect self-interference cancelation on the stability region is also investigated. The stability region of the BC with a secrecy constraint, where the receivers do not have full duplex capability can be obtained as a special case of the results derived in this paper. In addition, the paper considers the problem of maximizing the saturated throughput of the queue for which there is no secrecy constraint under minimum service guarantees for the other queue. The results provide new insights on the effect of the secrecy constraint on the stability region of the BC. It is found that the stability region with secrecy constraint is sensitive to the degree of self-interference cancelation. IEEE
URI
http://hdl.handle.net/20.500.11750/6201
DOI
10.1109/TIFS.2018.2818076
Publisher
Institute of Electrical and Electronics Engineers
Files in This Item:

There are no files associated with this item.

Appears in Collections:
Department of Electrical Engineering and Computer Science ISC(Information Security and Communication) Lab 1. Journal Articles

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE