Sökning: onr:"swepub:oai:DiVA.org:liu-179795" >
Delay Performance o...
Delay Performance of a Two-User Broadcast Channel with Security Constraints
-
- Arvanitaki, Antonia, 1991- (författare)
- Linköpings universitet,Programvara och system,Tekniska fakulteten
-
- Pappas, Nikolaos, 1982- (författare)
- Linköpings universitet,Kommunikations- och transportsystem,Tekniska fakulteten
-
- Mohapatra, Parthajit (författare)
- Indian Institute of Technology, Tirupati, India
-
visa fler...
-
- Carlsson, Niklas, 1977- (författare)
- Linköpings universitet,Databas och informationsteknik,Tekniska fakulteten
-
visa färre...
-
(creator_code:org_t)
- 2019-12-21
- 2020
- Engelska.
-
Ingår i: SN Computer Science. - : Springer. - 2661-8907 .- 2662-995X. ; 1:1
- Relaterad länk:
-
https://link.springe...
-
visa fler...
-
https://urn.kb.se/re...
-
https://doi.org/10.1...
-
visa färre...
Abstract
Ämnesord
Stäng
- In this paper, we consider the two-user broadcast channel with security constraints. We assume that a source broadcasts packets to two receivers, and that one of them has secrecy constraints, i.e., its packets need to be kept secret from the other receiver. The receiver with secrecy constraint has full-duplex capability, allowing it to transmit a jamming signal to increase its secrecy. We derive the average delay per packet and provide simulations and numerical results, where we compare different performance metrics for the cases when both receivers treat interference as noise, when the legitimate receiver performs successive decoding, and when the eavesdropper performs successive decoding. The results show that successive decoding provides better average packet delay for the legitimate user. Furthermore, we define a new metric that characterizes the reduction on the success probability for the legitimate user that is caused by the secrecy constraint. The results show that secrecy poses a significant amount of packet delay for the legitimate receiver when either receiver performs successive decoding. We also formulate an optimization problem, wherein the throughput of the eavesdropper is maximized under delay and secrecy rate constraints at the legitimate receiver. We provide numerical results for the optimization problem, where we show the trade-off between the transmission power for the jamming and the throughput of the non-legitimate receiver. The results provide insights into how channel ordering and encoding differences can be exploited to improve performance under different interference conditions.
Ämnesord
- TEKNIK OCH TEKNOLOGIER -- Elektroteknik och elektronik -- Telekommunikation (hsv//swe)
- ENGINEERING AND TECHNOLOGY -- Electrical Engineering, Electronic Engineering, Information Engineering -- Telecommunications (hsv//eng)
Nyckelord
- Broadcast channel
- Delay
- Queueing
- Security constraints
Publikations- och innehållstyp
- ref (ämneskategori)
- art (ämneskategori)
Hitta via bibliotek
Till lärosätets databas