Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2009

Open Access 01.12.2009 | Research Article

Secrecy Capacity of a Class of Orthogonal Relay Eavesdropper Channels

verfasst von: Vaneet Aggarwal, Lalitha Sankar, A. Robert Calderbank, H. Vincent Poor

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2009

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The secrecy capacity of relay channels with orthogonal components is studied in the presence of an additional passive eavesdropper node. The relay and destination receive signals from the source on two orthogonal channels such that the destination also receives transmissions from the relay on its channel. The eavesdropper can overhear either one or both of the orthogonal channels. Inner and outer bounds on the secrecy capacity are developed for both the discrete memoryless and the Gaussian channel models. For the discrete memoryless case, the secrecy capacity is shown to be achieved by a partial decode-and-forward (PDF) scheme when the eavesdropper can overhear only one of the two orthogonal channels. Two new outer bounds are presented for the Gaussian model using recent capacity results for a Gaussian multiantenna point-to-point channel with a multiantenna eavesdropper. The outer bounds are shown to be tight for two subclasses of channels. The first subclass is one in which the source and relay are clustered, and the eavesdropper receives signals only on the channel from the source and the relay to the destination, for which the PDF strategy is optimal. The second is a subclass in which the source does not transmit to the relay, for which a noise-forwarding strategy is optimal.

1. Introduction

In wireless networks for which nodes can benefit from cooperation and packet-forwarding, there is also a need to preserve the confidentiality of transmitted information from untrusted nodes. Information privacy in wireless networks has traditionally been the domain of the higher layers of the protocol stack via the use of cryptographically secure schemes. In his seminal paper on the three-node wiretap channel, Wyner showed that perfect secrecy of transmitted data from the source node can be achieved when the physical channel to the eavesdropper is noisier than the channel to the intended destination, that is, when the channel is a degraded broadcast channel [1]. This work was later extended by Csiszár and Körner to all broadcast channels with confidential messages, in which the source node sends common information to both the destination and the wiretapper and confidential information only to the destination [2].
Recently, the problem of secure communications has also been studied for a variety of multiterminal networks; see, for example, [310], and the references therein. In [11], Lai and El Gamal show that a relay node can facilitate the transmission of confidential messages from the source to the destination in the presence of a wiretapper, often referred to as an eavesdropper in the wireless setting. Lai and El Gamal develop the rate-equivocation region for this four node relay-eavesdropper channel and introduce a noise forwarding scheme in which the relay, even if it is unable to aid the source in its transmissions, transmits codewords independent of the source to confuse the eavesdropper. A special case where the eavesdropper receives a degraded version of the destination's signal is studied in [12]. In contrast, the relay channel with confidential messages in which the relay node acts as both a helper and eavesdropper is studied in [13]. Note that in all the three papers, the relay is assumed to be full-duplex; that is, it can transmit and receive simultaneously over the entire bandwidth.
In this paper, we study the secrecy capacity of a relay channel with orthogonal components in the presence of a passive eavesdropper node. The orthogonality comes from the fact that the relay and destination receive signals from the source on orthogonal channels; furthermore, the destination also receives transmissions from the relay on its (the destination's) channel. The orthogonal model implicitly imposes a half-duplex transmission and reception constraint on the relay. For this channel, in the absence of an eavesdropper, El Gamal and Zahedi showed that a partial decode-and-forward (PDF) strategy, in which the source transmits two messages on the two orthogonal channels and the relay decodes its received signal, achieves the capacity [14].
We study the secrecy capacity of this channel for both the discrete memoryless and Gaussian channel models. As a first step toward this, we develop a PDF strategy for the full-duplex relay eavesdropper channel and extend it to the orthogonal model. Further, since the eavesdropper can receive signals from either orthogonal channel or both, three cases arise in the development of the secrecy capacity. We specialize the outer bounds developed in [11] for the orthogonal case and show that, for the discrete memoryless channel, PDF achieves the secrecy capacity for the two cases where the eavesdropper receives signals in only one of the two orthogonal channels.
For the Gaussian model, we develop two new outer bounds using recent results on the secrecy capacity of the Gaussian multiple-input multiple-output channels in the presence of a multiantenna eavesdropper (MIMOME) in [46]. The first outer bound is a genie-aided bound that allows the source and relay to cooperate perfectly resulting in a Gaussian MIMOME channel for which jointly Gaussian inputs maximize the capacity. We show that these bounds are tight for a subclass of channels in which the multiaccess channel from the source and relay to the destination is the bottleneck link, and the eavesdropper is limited to receiving signals on the channel from the source and the relay to the destination. For a complementary subclass of channels in which the source-relay link is unusable due to noise resulting in a deaf relay, we develop a genie-aided bound where the relay and destination act like a two-antenna receiver. We also show that noise forwarding achieves this bound for this subclass of channels.
In [15], He and Yener study the secrecy rate of the channel studied here under the assumption that the relay is colocated with the eavesdropper, and the eavesdropper is completely cognizant of the transmit and receive signals at the relay. The authors found that using the relay does not increase the secrecy capacity, and hence there is no security advantage to using the relay. In this paper, we consider the eavesdropper as a separate entity and show that using the relay increases the secrecy capacity in some cases. In the model of [15], the eavesdropper can overhear only on the channel to the relay, while we consider three cases in which the eavesdropper can overhear on either or both the channels.
The paper is organized as follows. In Section 2, we present the channel models. In Section 3, we develop the inner and outer bounds on the secrecy capacity of the discrete memoryless model. We illustrate these results with examples in Section 4. In Section 5, we present inner and outer bounds for the Gaussian channel model and illustrate our results with examples. We conclude in Section 6.

2. Channel Models and Preliminaries

2.1. Discrete Memoryless Model

A discrete-memoryless relay eavesdropper channel is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq1_HTML.gif such that the inputs to the channel in a given channel use are https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq2_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq3_HTML.gif at the source and relay, respectively, the outputs of the channel are https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq4_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq5_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq6_HTML.gif , at the relay, destination, and eavesdropper, respectively, and the channel transition probability is given by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq7_HTML.gif [11]. The channel is assumed to be memoryless; that is, the channel outputs at time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq8_HTML.gif depend only on channel inputs at time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq9_HTML.gif . The source transmits a message https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq10_HTML.gif to the destination using the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq11_HTML.gif code consisting of
(1)
a stochastic encoder https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq12_HTML.gif at the source such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq13_HTML.gif
 
(2)
a set of relay encoding functions https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq14_HTML.gif at every time instant https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq15_HTML.gif , and
 
(3)
a decoding function at the destination https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq16_HTML.gif .
 
The average error probability of the code is defined as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ1_HTML.gif
(1)
The equivocation rate at the eavesdropper is defined as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq17_HTML.gif . A perfect secrecy rate of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq18_HTML.gif is achieved if, for any https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq19_HTML.gif , there exists a sequence of codes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq20_HTML.gif and an integer https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq21_HTML.gif such that, for all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq22_HTML.gif , we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ2_HTML.gif
(2)
The secrecy capacity is the maximum rate satisfying (2). The model described above considers a relay that transmits and receives simultaneously in the same orthogonal channel. Inner and outer bounds for this model are developed in [11, Theorem  1].
In this paper, we consider a relay eavesdropper channel with orthogonal components in which the relay receives and transmits on two orthogonal channels. The source transmits on both channels, one of which is received at the relay and the other at the destination. The relay transmits along with the source on the channel received at the destination. Thus, the source signal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq23_HTML.gif consists of two parts https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq24_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq25_HTML.gif , transmitted to the relay and the destination, respectively, such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq26_HTML.gif . The eavesdropper can receive transmissions in one or both orthogonal channels such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq27_HTML.gif denotes the received signal at the eavesdropper in orthogonal channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq28_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq29_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq30_HTML.gif . More formally, the relay eavesdropper channel with orthogonal components is defined as follows.
Definition 1.
A discrete-memoryless relay eavesdropper channel is said to have orthogonal components if the sender alphabet https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq31_HTML.gif and the channel can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ3_HTML.gif
(3)
Definition 1 assumes that the eavesdropper can receive signals in both channels. In general, the secrecy capacity bounds for this channel depend on the receiver capabilities of the eavesdropper. To this end, we explicitly include the following two definitions for the cases in which the eavesdropper can receive signals in only one of the channels.
Definition 2.
The eavesdropper is limited to receiving signals on the channel from the source to the relay, if
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ4_HTML.gif
(4)
Definition 3.
The eavesdropper is limited to receiving signals on the channel from the source and the relay to the destination, if
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ5_HTML.gif
(5)
Remark 4.
In the absence of an eavesdropper, that is, for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq32_HTML.gif , the channels in (3)–(5) simplify to that of a relay channel with orthogonal components.
Thus, depending on the receiver capabilities at the eavesdropper, there are three cases that arise in developing the secrecy capacity bounds. For brevity, we henceforth identify the three cases as Cases 1, 2, and 3, where Cases 1 and 2 correspond to Definitions 2 and 3, respectively, and Case 3 is the general case where the eavesdropper receives signals from both the channels.

2.2. Gaussian Model

For a Gaussian relay eavesdropper channel with orthogonal components, the signals https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq33_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq34_HTML.gif received at the relay and the destination, respectively, in each time symbol https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq35_HTML.gif , are
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ6_HTML.gif
(6)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ7_HTML.gif
(7)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq36_HTML.gif is the channel gain from transmitter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq37_HTML.gif to receiver https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq38_HTML.gif , and where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq39_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq40_HTML.gif are zero mean unit variance Gaussian random variables. The transmitted signals https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq41_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq42_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq43_HTML.gif are subject to average power constraints given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ8_HTML.gif
(8)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq44_HTML.gif denotes expectation of its argument. The signals at the eavesdropper are
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ9_HTML.gif
(9)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq45_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq46_HTML.gif are the channel gains from the source to the eavesdropper in the two orthogonal channels, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq47_HTML.gif is the channel gain from the relay to the eavesdropper, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq48_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq49_HTML.gif are zero-mean unit variance Gaussian random variables assumed to be independent of the source and relay signals, and
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ10_HTML.gif
(10)
Throughout the sequel, we assume that the channel gains are fixed and known at all nodes.
For a relay channel with orthogonal components, El Gamal and Zahedi of show that a strategy where the source uses each channel to send an independent message and the relay decodes the message transmitted in its channel achieves capacity [14]. Due to the fact that the relay has partial access to the source transmissions, this strategy is sometimes also referred to as partial decode and forward (see [16]). The achievable scheme involves block Markov superposition encoding while the converse is developed using the max-flow, min-cut bounds. The following proposition summarizes this result.
Proposition 5 ([14]).
The capacity of a relay channel with orthogonal component is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ11_HTML.gif
(11)
where the maximum is over all input distributions of the form
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ12_HTML.gif
(12)
For the Gaussian model, the bounds in (11) are maximized by jointly Gaussian inputs transmitting at the maximum power and subject to (12).
Remark 6.
While the converse allows for all possible joint distributions of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq50_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq51_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq52_HTML.gif , from the form of the mutual information expressions in (11), it suffices to consider distributions only of the form given by (12).
We use the standard notation for entropy and mutual information [17] and take all logarithms to the base 2 so that our rate units are bits. For ease of exposition, we write https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq53_HTML.gif to denote https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq54_HTML.gif and write https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq55_HTML.gif to denote https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq56_HTML.gif . We also write random variables with uppercase letters (e.g., https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq57_HTML.gif ) and their realizations with the corresponding lowercase letters (e.g., https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq58_HTML.gif ). We drop subscripts on probability distributions if the arguments are lowercase versions of the corresponding random variables. Finally, for brevity, we henceforth refer to the channel studied here as the orthogonal relay eavesdropper channel.

3. Discrete Memoryless Channel: Outer and Inner Bounds

In this section, we develop outer and inner bounds for the secrecy capacity of the discrete-memoryless orthogonal relay eavesdropper channel. The proof of the outer bounds follows along the same lines as that in [11, Theorem  1] for the full-duplex relay-eavesdropper channel and is specialized for the orthogonal model considered here. The following theorem summarizes the bounds for the three cases in which the eavesdropper can receive in either one or both orthogonal channels.
Theorem 7.
An outer bound on the secrecy capacity of the relay eavesdropper channel with orthogonal components is given by the following.
Case 1.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ13_HTML.gif
(13)
Case 2.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ14_HTML.gif
(14)
Case 3.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ15_HTML.gif
(15)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq59_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq60_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq61_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq62_HTML.gif are auxiliary random variables, and the maximum is over all joint distributions satisfying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq63_HTML.gif .
Proof.
The proof is extended from the outer bound in [11, Theorem  1] to include auxiliary random variables corresponding to each of the transmitted signals and is developed in Appendix A.
Following Proposition 5, a natural question for the relay-eavesdropper channel with orthogonal components is whether the PDF strategy can achieve the secrecy capacity. To this end, we first develop the achievable PDF secrecy rates for the class of full-duplex relay-eavesdropper channels and then specialize the result for the orthogonal model. The following theorem summarizes the inner bounds on the secrecy capacity achieved by PDF for the full-duplex (nonorthogonal) relay-eavesdropper channels.
Theorem 8.
An inner bound on the secrecy capacity of a full-duplex relay eavesdropper channel, achieved using partial decode and forward, is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ16_HTML.gif
(16)
for all joint distributions of the form
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ17_HTML.gif
(17)
Proof.
The proof is developed in Appendix B and uses block Markov superposition encoding at the source such that, in each block, the relay decodes a part of the source message while the eavesdropper has access to both source messages.
The following theorem specializes Theorem 8 for the orthogonal relay-eavesdropper channel.
Theorem 9.
An inner bound on the secrecy capacity of the orthogonal relay eavesdropper channel, achieved using partial decode and forward over all joint distributions of the form https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq64_HTML.gif , is given by the following.
Case 1.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ18_HTML.gif
(18)
Case 2.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ19_HTML.gif
(19)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq65_HTML.gif
Case 3.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ20_HTML.gif
(20)
Proof.
The proof is developed in Appendix C and involves specializing the bounds in Theorem 8 for the orthogonal model. It is further shown that the input distribution can be generalized to all joint probability distributions https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq66_HTML.gif .
The bounds in (20) can be generalized by randomizing the channel inputs. We now prove that PDF with randomization achieves the secrecy capacity.
Theorem 10.
The secrecy capacity of the relay channel with orthogonal complements is the following.
Case 1.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ21_HTML.gif
(21)
Case 2.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ22_HTML.gif
(22)
Case 3.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ23_HTML.gif
(23)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq67_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq68_HTML.gif are auxiliary random variables, and the maximum is over all joint distributions satisfying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq69_HTML.gif . Furthermore, for Case 3,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ24_HTML.gif
(24)
for all joint distributions satisfying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq70_HTML.gif .
Proof.
The upper bounds follow from Theorem 7. For the lower bound, we prefix a memoryless channel with inputs https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq71_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq72_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq73_HTML.gif and transition probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq74_HTML.gif (this prefix can potentially increase the achievable secrecy rates as in [2, 11]). The time-sharing random variable https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq75_HTML.gif ensures that the set of achievable rates is convex.
Remark 11.
In contrast to the nonsecrecy case, where the orthogonal channel model simplifies the cut-set bounds to match the inner PDF bounds, for the orthogonal relay-eavesdropper model in which the eavesdropper receives in both channels, that is, when the orthogonal receiver restrictions at the relay and intended destination do not apply to the eavesdropper, in general, the outer bound can be strictly larger than the inner PDF bound.
In the following section, we illustrate these results with three examples.

4. Examples

Example 12.
Consider an orthogonal relay eavesdropper channel with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq76_HTML.gif . The outputs at the relay and destination are given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ25_HTML.gif
(25)
while the output at the eavesdropper is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ26_HTML.gif
(26)
Since the destination can receive at most 1 bit in every use of the channel, the secrecy capacity of this channel is at most https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq77_HTML.gif bit per channel use. We now show that this secrecy capacity can be achieved. In each channel use, let the source send bit https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq78_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq79_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq80_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq81_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq82_HTML.gif , the receiver obtains https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq83_HTML.gif while the eavesdropper receives https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq84_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq85_HTML.gif irrespective of the value of bit https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq86_HTML.gif . Hence, a perfect secrecy capacity of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq87_HTML.gif can be achieved.
The code design in Example 12 did not require randomization. We now present an example where randomization is necessary.
Example 13.
Consider an orthogonal relay eavesdropper channel where all the input and output alphabets are the same and given by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq88_HTML.gif . We write https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq89_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq90_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq91_HTML.gif to denote the vector binary signals at the source and the relay. The outputs of this channel, shown in Figure 2(a), at the relay, destination, and the eavesdropper are given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ27_HTML.gif
(27)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq92_HTML.gif denotes the binary XOR operation. The capacity of this channel is at most 2 bits per channel use as the destination, via https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq93_HTML.gif , can receive at most https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq94_HTML.gif  bits per channel use. We will now show that a secrecy capacity of 2 bits per channel use can be achieved. Consider the following coding scheme. In every channel use, the relay flips an unbiased coin to generate a bit https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq95_HTML.gif such that its transmitted signal is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ28_HTML.gif
(28)
In every use of the channel, the source transmits https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq96_HTML.gif bits, denoted as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq97_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq98_HTML.gif , using
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ29_HTML.gif
(29)
For these transmitted signals, the receiver and eavesdropper receive
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ30_HTML.gif
(30)
Thus, the receiver receives both bits while the eavesdropper is unable to decode any information due to the randomness of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq99_HTML.gif . This is an example where transmitting a random code from the relay is required to achieve the secrecy capacity.
In the above two examples, the source to relay link was completely available to the eavesdropper, and hence the relay could at best be just used to send random bits. In the next example, we show that the secrecy capacity is achieved by the relay transmitting a part of the message as well as a random signal.
Example 14.
Consider an orthogonal relay eavesdropper channel where the input and output signals at the source, relay, and destination are binary two-tuples while https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq100_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq101_HTML.gif at the eavesdropper are binary alphabets. We write https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq102_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq103_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq104_HTML.gif to denote the vector binary signals at the source and the relay. The outputs at the relay, destination, and the eavesdropper are also vector binary signals given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ31_HTML.gif
(31)
as shown in Figure 2(b). As in the previous example, the capacity of this channel is also at most 2 bits per channel use. We now show that a secrecy capacity of 2 bits per channel use can be achieved for this example channel. Consider the following coding scheme: in the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq105_HTML.gif th use of the channel, the source encodes 2 bits, denoted as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq106_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq107_HTML.gif as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ32_HTML.gif
(32)
The relay receives https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq108_HTML.gif in the previous use of the channel. Furthermore, in each channel use, it also generates a uniformly random bit https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq109_HTML.gif , and transmits
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ33_HTML.gif
(33)
With these transmitted signals, the received signals at the receiver and the eavesdropper are
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ34_HTML.gif
(34)
Thus, over https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq110_HTML.gif uses of the channel the destination receives all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq111_HTML.gif bits transmitted by the source. On the other hand, in every use of the channel, the eavesdropper cannot decode either source bit.

5. Gaussian Model

5.1. Inner and Outer Bounds

We now develop inner and outer bounds for the Gaussian orthogonal relay eavesdropper channel. Determining the optimal input distribution for all the auxiliary random variables in the outer bounds in Theorem 10 is not straightforward. To this end, we develop new outer bounds using a recent result on the secrecy capacity of the class of Gaussian multiple input, multiple output, and multiantenna eavesdropper channels (see [46]). The class of MIMOME channels is characterized by a single source with an https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq112_HTML.gif vector input https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq113_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq114_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq115_HTML.gif vector outputs https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq116_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq117_HTML.gif at the intended destination and eavesdropper, respectively, given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ35_HTML.gif
(35)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ36_HTML.gif
(36)
where in every channel use https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq118_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq119_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq120_HTML.gif are zero-mean Gaussian vectors with identity covariance matrices that are independent across time symbols. The channel input satisfies an average transmit power constraint:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ37_HTML.gif
(37)
In applying the multiantenna secrecy capacity results, we develop an outer bound in which the source and relay are modeled jointly as a multiantenna transmitter. However, unlike the average power constraint for the MIMOME channels in (37), our outer bound requires a per antenna power constraint. To this end, we apply the results developed in [5] in which a more general transmitter covariance constraint is considered such that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ38_HTML.gif
(38)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq121_HTML.gif is a positive semidefinite matrix, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq122_HTML.gif denotes that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq123_HTML.gif is a positive semidefinite matrix. The secrecy capacity of this channel is summarized in the following theorem.
Lemma 15 ([5]).
The secrecy capacity of the MIMOME channel of (36) subject to (38) is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ39_HTML.gif
(39)
Remark 16.
The expression in (39) can also be written as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ40_HTML.gif
(40)
where he maximum is over all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq124_HTML.gif
We now present an outer bound on the Gaussian orthogonal relay eavesdropper channel using Lemma 15.
Theorem 17.
An outer bound on the secrecy capacity of the Gaussian orthogonal relay eavesdropper channel is given by the following.
Case 1.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ41_HTML.gif
(41a)
Case 2.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ42_HTML.gif
(41b)
Case 3.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ43_HTML.gif
(41c)
where the maximum is over all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq125_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq126_HTML.gif has diagonal entries that satisfy (8).
Remark 18.
In (41a) and (41c), the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq127_HTML.gif maximizing the outer bound on the secrecy capacity is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq128_HTML.gif . On the other hand, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq129_HTML.gif can be chosen to be arbitrary for (41b).
Proof.
An outer bound on the secrecy capacity of the relay eavesdropper channel results from assuming that the source and relay can cooperate over a noiseless link without causality constraints. Under this assumption, the problem reduces to that of a MIMOME channel. Thus, applying Lemma 15 and using the form in (40), for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq130_HTML.gif , the secrecy capacity can be upper bounded as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ44_HTML.gif
(42)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ45_HTML.gif
(43)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ46_HTML.gif
(44)
where (44) follows from the orthogonal model in (3). Finally, applying the conditions on the eavesdropper receiver for the three cases simplifies the bounds in (44) to (41a), (41b), and (41c).
The PDF inner bounds developed in Section 3 for the discrete memoryless case can be applied to the Gaussian model with Gaussian inputs at the source and relay. In fact, for all three cases, the inner bounds require taking a minimum of two rates, one achieved jointly by the source and relay at the destination and the other achieved by the source at the relay and destination. Comparing the inner bounds in (19) with the outer bounds in for those channels in which the source and relay are clustered close enough that the bottle-neck link is the combined source-relay link to the destination and the eavesdropper overhears only the channel from the source and the relay to the destination, the secrecy capacity can be achieved. This is summarized in the following theorem.
Theorem 19.
For a class of clustered orthogonal Gaussian relay channels with
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ47_HTML.gif
(45)
the secrecy capacity for Case 2 is achieved by PDF and is given by the following.
Case 2.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ48_HTML.gif
(46)
where the maximum is over https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq131_HTML.gif .
For a relay channel without secrecy constraints, the cut-set outer bounds are equivalent to two multiple-input multiple-output (MIMO) bounds, one that results from assuming a noiseless source-relay link and the other that results from assuming a noiseless relay-destination link. Under a secrecy constraint, the outer bound in Theorem 17 is based on the assumption of a noiseless source-relay link. The corresponding bound with a noiseless relay-destination link remains unknown.
We now consider a subclass of Gaussian orthogonal relay eavesdropper channels for which https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq132_HTML.gif For this subclass, the source does not send any messages on channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq133_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq134_HTML.gif . Such a subclass is a subset of a larger subclass of channels with very noisy unreliable links from the source to the relay. We present an upper bound on the secrecy capacity for this subclass and show that the noise-forwarding strategy introduced in [11] achieves this outer bound. Central to our proof is an additional constraint introduced in developing the outer bounds on the eavesdropper that does not decode the relay transmissions. Clearly, limiting the eavesdropper capabilities can only improve the secrecy rates, and thus, an outer bound for this channel with a constrained eavesdropper is also an outer bound for the original channel (with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq135_HTML.gif in both cases) with an unconstrained eavesdropper. We show that the outer bound for the constrained channel can be achieved by the strategy of noise-forwarding developed for the unconstrained channel.
Theorem 20.
The secrecy capacity of a subclass of Gaussian orthogonal relay eavesdropper channels with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq136_HTML.gif for Cases 2 and 3 is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ49_HTML.gif
(47)
Proof.
Outer Bound. Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq137_HTML.gif , it is sufficient to set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq138_HTML.gif . This follows from the fact that due to a lack of a communication link between the source and the relay, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq139_HTML.gif , the relay is oblivious to the source transmissions. Since the relay and the source do not share common randomness, one can set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq140_HTML.gif . Finally, since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq141_HTML.gif depends on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq142_HTML.gif only via https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq143_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq144_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq145_HTML.gif is independent of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq146_HTML.gif .
We now provide two outer bounds for fixed https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq147_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq148_HTML.gif . Thus, the minimum of the two is also an outer bound. Maximizing over https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq149_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq150_HTML.gif will then yield the outer bound as in the statement of Theorem 20.
An outer bound on the secrecy capacity is obtained by applying Theorem 17 for Cases 2 and 3 as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ50_HTML.gif
(48)
where (48) holds because https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq151_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq152_HTML.gif are independent, and the Gaussian signaling is optimal, which follows from Theorem 17.
We develop a second outer bound under the assumption that the relay and the destination have a noiseless channel such that they act like a two-antenna receiver. One can alternately view this as an improved channel that results from having a genie that shares perfectly the transmitted and received signals at the relay with the destination. Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq153_HTML.gif is independent of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq154_HTML.gif , the destination can perfectly cancel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq155_HTML.gif from its received signal, and thus, from (7), the effective received signal at the destination can be written as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ51_HTML.gif
(49)
On the other hand for the constrained eavesdropper, since the relay's signal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq156_HTML.gif acts as interference and is independent of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq157_HTML.gif , the information received at the eavesdropper is minimized when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq158_HTML.gif is the worst case noise, that is, when it is Gaussian distributed [18, Theorem  II.1]. The equivalent signal received at the eavesdropper is then
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ52_HTML.gif
(50)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq159_HTML.gif is Gaussian with zero mean and unit variance. Thus, the constrained eavesdropper channel simplifies to a MIMOME channel with a single-antenna source transmitting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq160_HTML.gif and single-antenna receiver and eavesdropper receiving https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq161_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq162_HTML.gif , respectively. For this channel, from Lemma 15, the secrecy capacity of this constrained eavesdropper channel is upper bounded as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ53_HTML.gif
(51)
Finally, since (51) is an upper bound for the channel with an eavesdropper constrained to ignore https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq163_HTML.gif , it is also an upper bound for the channel in which the eavesdropper is not constrained.
Inner Bound. The lower bound follows from the noise forwarding strategy introduced in [11, Theorem  3]. In this strategy, the relay sends codewords independent of the source message, which helps in confusing the eavesdropper. The noise forwarding strategy transforms the relay-eavesdropper channel into a compound multiple access channel, where the source/relay to the receiver is the first multiple access channel, and the source/relay to the eavesdropper is the second one.

5.2. Illustration of Results

We illustrate our results for the Gaussian model for a class of linear networks in which the source is placed at the origin, and the destination is unit distance from the source at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq164_HTML.gif . The eavesdropper is at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq165_HTML.gif . The channel gain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq166_HTML.gif , between transmitter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq167_HTML.gif and receiver https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq168_HTML.gif , for each https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq169_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq170_HTML.gif , is modeled as a distance dependent path-loss gain given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ54_HTML.gif
(52)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq171_HTML.gif is the path-loss exponent. The maximum achievable PDF secrecy rate is plotted as a function of the relay position along the line connecting the source and the eavesdropper as shown in Figure 3. Furthermore, as a baseline assuming that the relay does not transmit, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq172_HTML.gif , the secrecy capacity of the resulting direct link and the wire-tap channel for Cases 2 and 3, respectively, are included in all three plots in Figure 3. The rates are plotted in separate subfigures for the three cases in which the eavesdropper receives signals in only one or both channels. In all cases, the path loss exponent https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq173_HTML.gif is set to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq174_HTML.gif , and the average power constraint on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq175_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq176_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq177_HTML.gif is set to unity. In addition to PDF, the secrecy rate achieved by noise forwarding (NF) is also plotted.
In Figure 3, for all three cases, the PDF secrecy rates are obtained by choosing the input signal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq185_HTML.gif to be Gaussian distributed and numerically optimizing the rates over the covariance matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq186_HTML.gif (more precisely the three variances of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq187_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq188_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq189_HTML.gif and the pairwise correlation among these three variables). We observe that the numerical results match the theoretical capacity result for Case 2 that PDF is optimal when the relay is close to the source. Further, the upper bounds for Cases 2 and 3 are the same as seen also in (41b)-(41c). On the other hand, when the relay is farther away than the eavesdropper and destination are from the source, there are no gains achieved by using the relay relative to the nonrelay wiretap secrecy capacity. Finally, for Cases 2 and 3, NF performs better than PDF when the relay is closer to the destination.

6. Conclusions

We have developed bounds on the secrecy capacity of relay eavesdropper channels with orthogonal components in the presence of an additional passive eavesdropper for both the discrete memoryless and Gaussian channel models. Our results depend on the capability of the eavesdropper to overhear either or both of the two orthogonal channels that the source uses for its transmissions. For the discrete memoryless model, when the eavesdropper is restricted to receiving in only one of the two channels, we have shown that the secrecy capacity is achieved by a partial decode-and-forward strategy.
For the Gaussian model, we have developed a new outer bound using recent results on the secrecy capacity of Gaussian MIMOME channels. When the eavesdropper is restricted to overhearing on the channel from the source and the relay to the destination, our bound is tight for a subclass of channels where the source and the relay are clustered such that the combined link from the source and the relay to the destination is the bottleneck. Furthermore, for a subclass where the source-relay link is not used, we have developed a new MIMOME-based outer bound that matches the secrecy rate achieved by the noise forwarding strategy.
A natural extension to this model is to study the secrecy capacity of orthogonal relay channels with multiple relays and multiple eavesdroppers (see, e.g., [19]). Also, the problem of developing an additional outer bound that considers a noiseless relay destination link remains open for the channel studied here.

Appendices

A. Proof of Theorem 7

In this section, we will prove the upper bounds on the secrecy capacity for all the three cases. Following a proof similar to that in [11, Theorem  1], we bound the equivocation as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ55_HTML.gif
(A.1)
Now, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq190_HTML.gif be a random variable uniformly distributed over https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq191_HTML.gif and set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq192_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq193_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq194_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq195_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq196_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq197_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq198_HTML.gif . We specialize the bounds in (A.1) separately for each case.
Case 1.
From (A.1), we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ56_HTML.gif
(A.2)
Furthermore,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ57_HTML.gif
(A.3)
This proves the upper bound for Case 1.
Case 2.
From (A.1), we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ58_HTML.gif
(A.4)
Furthermore,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ59_HTML.gif
(A.5)
This proves the upper bound for Case 2.
Case 3.
From (A.1), we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ60_HTML.gif
(A.6)
Furthermore,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ61_HTML.gif
(A.7)
This proves the upper bound for Case 3. For perfect secrecy, setting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq199_HTML.gif yields the upper bound on the secrecy capacity.

B. Proof of Theorem 8: PDF for Relay Eavesdropper Channel

Random Coding.
(1)Generate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq200_HTML.gif independent and identically distributed (i.i.d.) https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq201_HTML.gif 's, each with probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq202_HTML.gif . Label them https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq203_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq204_HTML.gif .
(2)For each https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq205_HTML.gif , generate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq206_HTML.gif i.i.d. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq207_HTML.gif 's, each with probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq208_HTML.gif . Label these https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq209_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq210_HTML.gif .
(3)For every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq211_HTML.gif , generate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq212_HTML.gif i.i.d. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq213_HTML.gif 's, each with probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq214_HTML.gif . Label these https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq215_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq216_HTML.gif .
Random Partition
Randomly partition the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq217_HTML.gif into https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq218_HTML.gif cells https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq219_HTML.gif .
Encoding
Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq220_HTML.gif be the message to be sent in block https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq221_HTML.gif where the total number of messages is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq222_HTML.gif . Further, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq223_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq224_HTML.gif . We can further partition https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq225_HTML.gif into two parts https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq226_HTML.gif of rates https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq227_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq228_HTML.gif , respectively. Assume that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq229_HTML.gif are jointly https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq230_HTML.gif -typical and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq231_HTML.gif . Then the codeword https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq232_HTML.gif will be transmitted in block https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq233_HTML.gif .
Decoding
At the end of block https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq234_HTML.gif , we have the following.
(1)The receiver estimates https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq235_HTML.gif by looking at jointly https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq236_HTML.gif -typical https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq237_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq238_HTML.gif . For sufficiently large https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq239_HTML.gif , this decoding step can be done with arbitrarily small probability of error. Let the estimate of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq240_HTML.gif be https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq241_HTML.gif .
(2)The receiver calculates a set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq242_HTML.gif of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq243_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq244_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq245_HTML.gif are jointly https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq246_HTML.gif -typical. The receiver then declares that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq247_HTML.gif was sent in block https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq248_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq249_HTML.gif . The probability that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq250_HTML.gif with arbitrarily high probability provided that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq251_HTML.gif is sufficiently large and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq252_HTML.gif .
(3)The receiver declares that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq253_HTML.gif was sent in block https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq254_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq255_HTML.gif are jointly https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq256_HTML.gif -typical. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq257_HTML.gif with high probability if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq258_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq259_HTML.gif is sufficiently large.
(4)The relay upon receiving https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq260_HTML.gif declares that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq261_HTML.gif was received if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq262_HTML.gif are jointly https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq263_HTML.gif -typical. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq264_HTML.gif with high probability if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq265_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq266_HTML.gif is sufficiently large. Thus, the relay knows that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq267_HTML.gif .
Thus, we obtain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ62_HTML.gif
(B.8)
Therefore, the rate of transmission from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq268_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq269_HTML.gif is bounded by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ63_HTML.gif
(B.9)
Equivocation Computation
From [11, Theorem  2, equation (41)], we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ64_HTML.gif
(B.10)
Consider https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq270_HTML.gif . Since we know https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq271_HTML.gif , the only uncertainty is the knowledge of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq272_HTML.gif which can be decoded from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq273_HTML.gif with arbitrarily small probability of error since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq274_HTML.gif . Hence,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ65_HTML.gif
(B.11)
thus giving https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq275_HTML.gif , and hence we get perfect secrecy.
Thus, the secrecy rate is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ66_HTML.gif
(B.12)

C. Proof of Theorem 9: PDF for Relay Eavesdropper Channel with Orthogonal Components

From Theorem 8, a secrecy rate of
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ67_HTML.gif
(C.13)
can be achieved by partial decode and forward. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq276_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq277_HTML.gif such that the input distribution is of the form https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq278_HTML.gif . The achievable secrecy rate is then given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ68_HTML.gif
(C.14)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ69_HTML.gif
(C.15)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ70_HTML.gif
(C.16)
The equality in (C.16) follows from the fact that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq279_HTML.gif is a Markov chain. We further specialize the bounds for the three cases based on the receiving capability of the eavesdropper.
Case 1.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ71_HTML.gif
(C.17)
The maximization of the expression to the right of the equality in (C.17) over https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq280_HTML.gif is equivalent to maximizing over the more general distribution https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq281_HTML.gif , and henceforth, without loss of generality we consider the general probability distribution https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq282_HTML.gif .
We now prove that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq283_HTML.gif which completes the proof of this part of the theorem. We have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ72_HTML.gif
(C.18)
Case 2.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ73_HTML.gif
(C.19)
Note that maximization of above term over https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq284_HTML.gif is equivalent to maximizing over general https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq285_HTML.gif , and henceforth, without loss of generality we consider the general probability distribution https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq286_HTML.gif .
We now prove that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq287_HTML.gif which completes the proof of this part of the theorem. We have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ74_HTML.gif
(C.20)
where the last step follows as was shown earlier in (C.18).
Case 3.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ75_HTML.gif
(C.21)
Note that maximization of above term over https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq288_HTML.gif is equivalent to maximizing over general https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq289_HTML.gif .
We now prove that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_IEq290_HTML.gif which completes the proof of this part of the theorem. We have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F494696/MediaObjects/13638_2008_Article_1679_Equ76_HTML.gif
(C.22)
where the last step follows as was shown earlier in (C.18).

Acknowledgments

The authors wish to thank Elza Erkip of Polytechnic Institute of NYU and Lifeng Lai and Ruoheng Liu of Princeton University for useful discussions related to this paper. The work of V. Aggarwal and A. R. Calderbank was supported in part by NSF under Grant 0701226, by ONR under Grant N00173-06-1-G006, and by AFOSR under Grant FA9550-05-1-0443. The work of L. Sankar and H. V. Poor was supported in part by the National Science Foundation under Grant CNS-06-25637. The material in this paper was presented in part at the Information Theory and Applications Workshop, San Diego, CA, 2009 and at the IEEE International Symposium on Information Theory, Seoul, Korea, 2009.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
2.
Zurück zum Zitat Csiszár I, Körner J: Broadcast channels with confidential messages. IEEE Transactions on Information Theory 1978, 24(3):339-348. 10.1109/TIT.1978.1055892CrossRefMathSciNetMATH Csiszár I, Körner J: Broadcast channels with confidential messages. IEEE Transactions on Information Theory 1978, 24(3):339-348. 10.1109/TIT.1978.1055892CrossRefMathSciNetMATH
3.
Zurück zum Zitat Tekin E, Yener A: The general Gaussian multiple-access and two-way wiretap channels: achievable rates and cooperative jamming. IEEE Transactions on Information Theory 2008, 54(6):2735-2751.MathSciNetCrossRefMATH Tekin E, Yener A: The general Gaussian multiple-access and two-way wiretap channels: achievable rates and cooperative jamming. IEEE Transactions on Information Theory 2008, 54(6):2735-2751.MathSciNetCrossRefMATH
4.
Zurück zum Zitat Khisti A, Wornell GW: The MIMOME channel. Proceedings of the 45th Annual Allerton Conference on Communication, Control, and Computing, September 2007, Monticello, Ill, USA Khisti A, Wornell GW: The MIMOME channel. Proceedings of the 45th Annual Allerton Conference on Communication, Control, and Computing, September 2007, Monticello, Ill, USA
5.
Zurück zum Zitat Liu T, Shamai S: A note on the secrecy capacity of the multi-antenna wiretap channel. IEEE Transactions on Information Theory 2009, 55(6):2547-2553.MathSciNetCrossRef Liu T, Shamai S: A note on the secrecy capacity of the multi-antenna wiretap channel. IEEE Transactions on Information Theory 2009, 55(6):2547-2553.MathSciNetCrossRef
6.
Zurück zum Zitat Oggier F, Hassibi B: The secrecy capacity of the MIMO wiretap channel. Proceedings of the IEEE International Symposium on Information Theory, July 2008, Toronto, Canada 524-528. Oggier F, Hassibi B: The secrecy capacity of the MIMO wiretap channel. Proceedings of the IEEE International Symposium on Information Theory, July 2008, Toronto, Canada 524-528.
7.
Zurück zum Zitat Bloch M, Thangaraj A: Confidential messages to a cooperative relay. Proceedings of the IEEE Information Theory Workshop (ITW '08), May 2008, Porto, Portugal 154-158. Bloch M, Thangaraj A: Confidential messages to a cooperative relay. Proceedings of the IEEE Information Theory Workshop (ITW '08), May 2008, Porto, Portugal 154-158.
8.
Zurück zum Zitat Liang Y, Poor HV: Multiple-access channels with confidential messages. IEEE Transactions on Information Theory 2008, 54(3):976-1002.MathSciNetCrossRefMATH Liang Y, Poor HV: Multiple-access channels with confidential messages. IEEE Transactions on Information Theory 2008, 54(3):976-1002.MathSciNetCrossRefMATH
9.
Zurück zum Zitat Liang Y, Poor HV, Shamai S: Secure communication over fading channels. IEEE Transactions on Information Theory 2008, 54(6):2470-2492.MathSciNetCrossRefMATH Liang Y, Poor HV, Shamai S: Secure communication over fading channels. IEEE Transactions on Information Theory 2008, 54(6):2470-2492.MathSciNetCrossRefMATH
10.
Zurück zum Zitat Liang Y, Somekh-Baruch A, Poor HV, Shamai S, Verdú S: Capacity of cognitive interference channels with and without secrecy. IEEE Transactions on Information Theory 2009, 55(2):604-619.CrossRefMathSciNet Liang Y, Somekh-Baruch A, Poor HV, Shamai S, Verdú S: Capacity of cognitive interference channels with and without secrecy. IEEE Transactions on Information Theory 2009, 55(2):604-619.CrossRefMathSciNet
11.
Zurück zum Zitat Lai L, El Gamal H: The relay-eavesdropper channel: cooperation for secrecy. IEEE Transactions on Information Theory 2008, 54(9):4005-4019.MathSciNetCrossRefMATH Lai L, El Gamal H: The relay-eavesdropper channel: cooperation for secrecy. IEEE Transactions on Information Theory 2008, 54(9):4005-4019.MathSciNetCrossRefMATH
12.
Zurück zum Zitat Yuksel M, Erkip E: The relay channel with a wire-tapper. Proceedings of the 41st Annual Conference on Information Sciences and Systems (CISS '07), March 2007 13-18. Yuksel M, Erkip E: The relay channel with a wire-tapper. Proceedings of the 41st Annual Conference on Information Sciences and Systems (CISS '07), March 2007 13-18.
13.
Zurück zum Zitat Oohama Y: Capacity theorems for relay channels with confidential messages. Proceedings of the IEEE International Symposium on Information Theory, June 2007, Nice, France Oohama Y: Capacity theorems for relay channels with confidential messages. Proceedings of the IEEE International Symposium on Information Theory, June 2007, Nice, France
14.
Zurück zum Zitat El Gamal A, Zahedi S: Capacity of a class of relay channels with orthogonal components. IEEE Transactions on Information Theory 2005, 51(5):1815-1817. 10.1109/TIT.2005.846438MathSciNetCrossRefMATH El Gamal A, Zahedi S: Capacity of a class of relay channels with orthogonal components. IEEE Transactions on Information Theory 2005, 51(5):1815-1817. 10.1109/TIT.2005.846438MathSciNetCrossRefMATH
15.
Zurück zum Zitat He X, Yener A: On the equivocation region of relay channels with orthogonal components. Proceedings of the 41st Annual Asilomar Conference on Signals, Systems and Computers, November 2007, Pacific Grove, Calif, USA 883-887. He X, Yener A: On the equivocation region of relay channels with orthogonal components. Proceedings of the 41st Annual Asilomar Conference on Signals, Systems and Computers, November 2007, Pacific Grove, Calif, USA 883-887.
16.
Zurück zum Zitat Kramer G: Models and theory for relay channels with receive constraints. Proceedings of the 42nd Annual Allerton Conference on Communication, Control, and Computing, September 2004, Monticello, Ill, USA Kramer G: Models and theory for relay channels with receive constraints. Proceedings of the 42nd Annual Allerton Conference on Communication, Control, and Computing, September 2004, Monticello, Ill, USA
17.
Zurück zum Zitat Cover TM, Thomas JA: Elements of Information Theory. John Wiley & Sons, New York, NY, USA; 1991.CrossRefMATH Cover TM, Thomas JA: Elements of Information Theory. John Wiley & Sons, New York, NY, USA; 1991.CrossRefMATH
18.
Zurück zum Zitat Diggavi SN, Cover TM: The worst additive noise under a covariance constraint. IEEE Transactions on Information Theory 2001, 47(7):3072-3081. 10.1109/18.959289MathSciNetCrossRefMATH Diggavi SN, Cover TM: The worst additive noise under a covariance constraint. IEEE Transactions on Information Theory 2001, 47(7):3072-3081. 10.1109/18.959289MathSciNetCrossRefMATH
19.
Zurück zum Zitat Aggarwal V, Sankar L, Calderbank AR, Poor HV: Information secrecy from multiple eavesdroppers in orthogonal relay channels. Proceedings of the IEEE International Symposium on Information Theory, June-July 2009, Seoul, Korea Aggarwal V, Sankar L, Calderbank AR, Poor HV: Information secrecy from multiple eavesdroppers in orthogonal relay channels. Proceedings of the IEEE International Symposium on Information Theory, June-July 2009, Seoul, Korea
Metadaten
Titel
Secrecy Capacity of a Class of Orthogonal Relay Eavesdropper Channels
verfasst von
Vaneet Aggarwal
Lalitha Sankar
A. Robert Calderbank
H. Vincent Poor
Publikationsdatum
01.12.2009
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2009/494696

Weitere Artikel der Ausgabe 1/2009

EURASIP Journal on Wireless Communications and Networking 1/2009 Zur Ausgabe