SwePub
Sök i LIBRIS databas

  Utökad sökning

WFRF:(Carlsson Niklas 1977 )
 

Sökning: WFRF:(Carlsson Niklas 1977 ) > Delay Performance o...

Delay Performance of a Two-User Broadcast Channel with Security Constraints

Arvanitaki, Antonia, 1991- (författare)
Linköpings universitet,Programvara och system,Tekniska fakulteten
Pappas, Nikolaos, 1982- (författare)
Linköpings universitet,Kommunikations- och transportsystem,Tekniska fakulteten
Mohapatra, Parthajit (författare)
Indian Institute of Technology, Tirupati, India
visa fler...
Carlsson, Niklas, 1977- (författare)
Linköpings universitet,Databas och informationsteknik,Tekniska fakulteten
visa färre...
 (creator_code:org_t)
2019-12-21
2020
Engelska.
Ingår i: SN Computer Science. - : Springer. - 2661-8907 .- 2662-995X. ; 1:1
  • Tidskriftsartikel (refereegranskat)
Abstract Ämnesord
Stäng  
  • In this paper, we consider the two-user broadcast channel with security constraints. We assume that a source broadcasts packets to two receivers, and that one of them has secrecy constraints, i.e., its packets need to be kept secret from the other receiver. The receiver with secrecy constraint has full-duplex capability, allowing it to transmit a jamming signal to increase its secrecy. We derive the average delay per packet and provide simulations and numerical results, where we compare different performance metrics for the cases when both receivers treat interference as noise, when the legitimate receiver performs successive decoding, and when the eavesdropper performs successive decoding. The results show that successive decoding provides better average packet delay for the legitimate user. Furthermore, we define a new metric that characterizes the reduction on the success probability for the legitimate user that is caused by the secrecy constraint. The results show that secrecy poses a significant amount of packet delay for the legitimate receiver when either receiver performs successive decoding. We also formulate an optimization problem, wherein the throughput of the eavesdropper is maximized under delay and secrecy rate constraints at the legitimate receiver. We provide numerical results for the optimization problem, where we show the trade-off between the transmission power for the jamming and the throughput of the non-legitimate receiver. The results provide insights into how channel ordering and encoding differences can be exploited to improve performance under different interference conditions.

Ämnesord

TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Telekommunikation (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Telecommunications (hsv//eng)

Nyckelord

Broadcast channel
Delay
Queueing
Security constraints

Publikations- och innehållstyp

ref (ämneskategori)
art (ämneskategori)

Hitta via bibliotek

Till lärosätets databas

Sök utanför SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy