Article

On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels

Dept. of Electr. & Comput. Eng., Rutgers Univ., Brunswick, NJ
IEEE Transactions on Information Theory (Impact Factor: 2.62). 01/2008; DOI: 10.1109/TIT.2009.2013043
Source: arXiv

ABSTRACT The focus of this paper is an information-theoretic study of retransmission protocols for reliable packet communication under a secrecy constraint. The hybrid automatic retransmission request (HARQ) protocol is revisited for a block-fading wire-tap channel, in which two legitimate users communicate over a block-fading channel in the presence of a passive eavesdropper who intercepts the transmissions through an independent block-fading channel. In this model, the transmitter obtains a 1-bit ACK/NACK feedback from the legitimate receiver via an error-free public channel. Both reliability and confidentiality of secure HARQ protocols are studied by the joint consideration of channel coding, secrecy coding, and retransmission protocols. In particular, the error and secrecy performance of repetition time diversity (RTD) and incremental redundancy (INR) protocols are investigated based on good Wyner code sequences, which ensure that the confidential message is decoded successfully by the legitimate receiver and is kept in total ignorance by the eavesdropper for a given set of channel realizations. This paper first illustrates that there exists a good rate-compatible Wyner code family which ensures a secure INR protocol. Next, two types of outage probabilities, connection outage and secrecy outage probabilities are defined in order to characterize the tradeoff between the reliability of the legitimate communication link and the confidentiality with respect to the eavesdropper's link. For a given connection/secrecy outage probability pair, an achievable throughput of secure HARQ protocols is derived for block-fading channels. Finally, both asymptotic analysis and numerical computations demonstrate the benefits of HARQ protocols to throughput and secrecy.

0 Bookmarks
 · 
95 Views
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: We consider arbitrary Hybrid-Automatic-Repeat-Request (H-ARQ) wireless links over quasi-static Rayleigh fading chan-nels. In this paper, we translate the repeat-request advantage of the intended receiver over potential eavesdroppers to link security. In particular, with statistical-only knowledge of the channel and noise, we find for the first time in the litera-ture the optimal power allocation sequence over the H-ARQ rounds that maximizes the outage probability of eavesdrop-pers for any given target outage probability of the trusted re-ceiver. Simulation studies demonstrate orders of magnitude difference in outage probability between eavesdroppers and intended receiver.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: IEEE802.11 wireless networks have become one of the most widely used networks as users can connect and access the required information anytime and anywhere. Due to open nature of wireless medium, there are many security issues associated with them. In the present work an experimental analysis to study the impact of transmission power of access point on the performance of secure wireless network is analyzed in terms of throughput in roaming scenarios for IEEE802.11n WLAN standard. Three power levels high, medium and low have been considered for access point. Analysis has been done in terms of network through put. From the obtained numerical values, it is found that the security performance of transmission power IEEE802.11 LAN slightly changes on varying the transmit power from high level to medium level for both UDP and TCP traffic but on varying the power from medium to low level, the network throughput performance for UDP and TCP traffic is increased by 3% and 10% respectively.
    Proceedings of the 2014 Fourth International Conference on Advanced Computing & Communication Technologies; 02/2014
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Secure transmission between two agents, Alice and Bob, over block fading channels can be achieved similarly to conventional hybrid automatic repeat request (HARQ) by letting Alice transmit multiple blocks, each containing an encoded version of the secret message, until Bob informs Alice about successful decoding by a public error-free return channel. In existing literature each block is a differently punctured version of a single codeword generated with a Wyner code that uses a common randomness for all blocks. In this paper instead we propose a more general approach where multiple codewords are generated from independent randomnesses. The class of channels for which decodability and secrecy is ensured is characterized, with derivations for the existence of secret codes. We show in particular that the classes are not a trivial subset (or superset) of those of existing schemes, thus highlighting the novelty of the proposed solution. The result is further confirmed by deriving the average achievable secrecy throughput, thus taking into account both decoding and secrecy outage.
    01/2014;

Full-text (2 Sources)

Download
31 Downloads
Available from
May 22, 2014