liu.seSearch for publications in DiVA
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Secure Communications for the Two-user Broadcast Channel with Random Traffic
G. S. Sanyal School of Telecommunications, Indian Institute of Technology, Kharagpur, India.
Linköping University, Department of Science and Technology, Communications and Transport Systems. Linköping University, Faculty of Science & Engineering. (Mobile Telecommunications)ORCID iD: 0000-0003-4416-7702
Department of Information and Communication Engineering, Daegu Gyeongbuk Institute of Science and Technology (DGIST), Korea.
Information Systems Technology and Design Pillar, Singapore University of Technology and Design, Singapore.
Show others and affiliations
2018 (English)In: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021Article in journal (Refereed) Accepted
Abstract [en]

In this work, we study the stability region of the two-user broadcast channel (BC) with bursty data arrivals and security constraints. It is assumed that one of the receivers has a secrecy constraint, i.e., its packets need to be kept secret from the other receiver, which is defined based on SINR. The receiver with secrecy constraint has full-duplex capability to send a jamming signal for improving its service rate. The stability region of the two-user BC with secrecy constraint is characterized for the general decoding case. Then, assuming two different decoding schemes the respective stability regions are derived. The fullduplex operation of receiver results in self-interference, and the effect of imperfect self-interference cancelation on the stability region is also investigated. The stability region of the BC with a secrecy constraint, where the receivers do not have full duplex capability can be obtained as a special case of the results derived in this paper. In addition, the paper considers the problem of maximizing the saturated throughput of the queue for which there is no secrecy constraint under minimum service guarantees for the other queue. The results provide new insights on the effect of the secrecy constraint on the stability region of the BC. It is found that the stability region with secrecy constraint is sensitive to the degree of self-interference cancelation.

Place, publisher, year, edition, pages
IEEE Signal Processing Society, 2018.
National Category
Communication Systems Telecommunications
Identifiers
URN: urn:nbn:se:liu:diva-146030DOI: 10.1109/TIFS.2018.2818076OAI: oai:DiVA.org:liu-146030DiVA, id: diva2:1192222
Funder
ELLIIT - The Linköping‐Lund Initiative on IT and Mobile Communications
Available from: 2018-03-22 Created: 2018-03-22 Last updated: 2018-03-28Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Authority records BETA

Pappas, NikolaosAngelakis, Vangelis

Search in DiVA

By author/editor
Pappas, NikolaosAngelakis, Vangelis
By organisation
Communications and Transport SystemsFaculty of Science & Engineering
In the same journal
IEEE Transactions on Information Forensics and Security
Communication SystemsTelecommunications

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 35 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf