PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Secrecy Rate Region Enhancement in Multiple Access Wiretap Channel

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
It is commonly known that physical layer security is achieved with a trade-off in terms of the achievable rate. Hence, security constraints generate rate losses in wiretap channels. To mitigate such rate losses in multi-user channels, we propose a coding/decoding scheme for multi-user multiple access wiretap channel (MAC-WT), where previously transmitted messages are used as a secret key to enhance the secrecy rates of the transmitting users, until the usual Shannon capacity region of a multiple access channel (MAC) is achieved without the secrecy constraint. With this coding scheme, all messages transmitted in the recent past are secure with respect to all the information of the eavesdropper till now. To achieve this goal, we introduce secret key buffers at both the users and the legitimate receiver. Finally, we consider a fading MAC-WT and show that with this coding/decoding scheme, we can achieve the capacity region of a fading MAC channel (in the ergodic sense).
Rocznik
Tom
Strony
14--25
Opis fizyczny
Bibliogr. 27 poz., rys.
Twórcy
  • Communication Control & Learning Lab, Department of Electronics and Communication Engineering, National Institute of Technology, Srinagar, Jammu and Kashmir, India
Bibliografia
  • [1] A. D. Wyner, „The wire-tap channel", Bell Syst. Techn. J., vol. 54, no. 8, pp. 1355-1387, 1975 (DOI: 10.1002/j.1538-7305.1975.tb02040.x).
  • [2] P. K. Gopala, L. Lai, and H. El Gamal, „On the secrecy capacity of fading channels", IEEE Trans. on Inform. Theory, vol. 54, no. 10, pp. 4687-4698, 2008 (DOI: 10.1109/TIT.2008.928990).
  • [3] M. Bloch, J. Barros, M. R. Rodrigues, and S.W. McLaughlin, „Wireless information-theoretic security", IEEE Trans. on Inform. Theory, vol. 54, no. 6, pp. 2515-2534, 2008 (DOI: 10.1109/TIT.2008.921908).
  • [4] O. Gungor, J. Tan, C. E. Koksal, H. El-Gamal, and N. B. Shroff, „Secrecy outage capacity of fading channels", IEEE Trans. on Inform. Theory, vol. 59, no. 9, pp. 5379-5397, 2013 (DOI: 10.1109/TIT.2013.2265691).
  • [5] Y. Liang and H. V. Poor, „Multiple-access channels with confidential messages", IEEE Trans. on Inform. Theory, vol. 54, no. 3, pp. 976-1002, 2008 (DOI: 10.1109/TIT.2007.915978).
  • [6] E. Tekin and A. Yener, „The Gaussian multiple access wire-tap channel", IEEE Trans. on Inform. Theory, vol. 54, no. 12, pp. 5747-5755, 2008 (DOI: 10.1109/TIT.2008.2006422).
  • [7] S. M. Shah, V. Kumar, and V. Sharma, „Achievable secrecy sumrate in a fading MAC-WT with power control and without CSI of eavesdropper", in Proc. of Int. Conf. on Sig. Process. and Commun. SPCOM 2012, Bangalore, India, 2012 (DOI: 10.1109/SPCOM.2012.6290033).
  • [8] Y. Liang et al., „Information theoretic security", Foundations and Trends in Commun. and Inform. Theory, vol. 5, no. 4-5, pp. 355-580, 2009 (DOI: 10.1561/0100000036).
  • [9] M. Bloch and J. Barros, Physical-Layer Security: From Information Theory to Security Engineering. Cambridge University Press, 2011 (ISBN: 9780511977985).
  • [10] R. Liu and W. Trappe (Ed.), Securing Wireless Communications AT the Physical Layer. Boston, MA: Springer, 2010 (ISBN: 9781441913852).
  • [11] U. M. Maurer, „Secret key agreement by public discussion from common information", IEEE Trans. on Inform. Theory, vol. 39, no. 3, pp. 733-742, 1993 (DOI: 10.1109/18.256484).
  • [12] I. Devetak, „The private classical capacity and quantum capacity of a quantum channel", IEEE Trans. on Inform. Theory, vol. 51, no. 1, pp. 44-55, 2005 (DOI: 10.1109/TIT.2004.839515).
  • [13] I. Csiszar and J. Körner, Information Theory: Coding Theorems for Discrete Memoryless Systems. Cambridge University Press, 2011 (ISBN: 9780511921889).
  • [14] M. Bloch and N. Laneman, „Strong secrecy from channel resolvability", IEEE Trans. on Inform. Theory, vol. 51, no. 1, pp. 44-55, 2011 (DOI: 10.1109/TIT.2013.2283722).
  • [15] M. Wiese and H. Boche, „Strong secrecy for multiple access channels", in Information Theory, Combinatorics, and Search Theory, H. Aydinian, F. Cicalese, and C. Deppe, Eds. LNCS, vol. 7777, pp. 71-122. Berlin, Heidelberg: Springer, 2013 (DOI: 10.1007/978-3-642-36899-8 4).
  • [16] M. H. Yassaee and M. R. Aref, „Multiple access wiretap channel with strong secrecy", in Proc. Inform. Theory Worksh. ITW 2010. Dublin, Ireland, 2010 (DOI: 10.1109/CIG.2010.5592953).
  • [17] S. Leung-Yan-Cheong and M. E. Hellman, „The Gaussian wir etap channel", IEEE Trans. on Inform. Theory, vol. 24, no. 4, pp. 451-456, 1978 (DOI: 10.1109/TIT.1978.1055917).
  • [18] E. Ardestanizadeh, M. Franceschetti, T. Javidi, and Y.-H. Kim, „Wiretap channel with secure rate-limited feedback", IEEE Trans. on Inform. Theory, vol. 55, no. 12, pp. 5353-5361, 2009 (DOI: 10.1109/TIT.2009.2032814).
  • [19] L. Lai, H. El Gamal, and H. V. Poor, „The wiretap channel with feedback: Encryption over the channel", IEEE Trans. on Inform. Theory, vol. 54, no. 11, pp. 5059-5067, 2008 (DOI: 10.1109/TIT.2008.929914).
  • [20] W. Kang and N. Liu, „Wiretap channel with shared key", in Proc. 2010 IEEE Informa. Theory Worksh., Dublin, Ireland, 2010 (DOI: 10.1109/CIG.2010.5592665).
  • [21] D. Kobayashi, H. Yamamoto, and T. Ogawa, „Secure multiplex coding attaining channel capacity in wiretap channels", IEEE Trans. On Inform. Theory, vol. 59, no. 12, pp. 8131-8143 (DOI: 10.1109/TIT.2013.2282673).
  • [22] S. M. Shah, S. Parameswaran, and V. Sharma, „Previous messages provide the key to achieve Shannon capacity in a wiretap channel", in Proc. IEEE Int. Conf. on Commun. Workshops ICC 2013, Budapest, Hungary, 2013, pp. 697-701 (DOI: 10.1109/ICCW.2013.6649323).
  • [23] S. M. Shah and V. Sharma, „Achieving Shannon capacity region as secrecy rate region in a multiple access wiretap channel", in Proc. IEEE Wireless Commun. and Network. Conf. WCNC 2015, New Orleans, LA, USA, 2015 (DOI: 10.1109/WCNC.2015.7127565).
  • [24] R. Ahlswede, „Multi-way communication channels", in Second International Symposium on Information Theory: Tsahkadsor, Armenia, U. S. S. R., September 2-8, 1971, F. Csáki, B. N. Petrov, Eds. Budapest: Akademiai Kiado, 1973 [Online]. Available: https://pub.uni-bielefeld.de/download/1780371/2312888/Ahlswede 12.pdf
  • [25] H. H.-J. Liao, „Multiple access channels", DTIC Document, Defense Tech. Inform. Center, Fort Belvoir, VA, Tech. Rep., 1972 [Online]. Available: http://www.dtic.mil/docs/citations/AD0753127
  • [26] U. Maurer and S. Wolf, „Information-theoretic key agreement: From weak to strong secrecy for free", in Advances in Cryptology - EUROCRYPT 2000. International Conference on the Theory and Application of Cryptographic Techniques Bruges, Belgium, 2000, Proceedings, B. Preneel, Ed. LNCS, vol. 1807, pp. 351-368. Springer, 2000 (DOI: 10.1007/3-540-45539-6 24).
  • [27] E. Tekin and A. Yener, „Secrecy sum-rates for the multiple-access wire-tap channel with ergodic block fading", in Proc. of 45th Ann. Allerton Conf. on Commun., Control and Comput., Monticello, IL, USA, 2007, vol. 2, pp. 856-863 (ISBN: 9781605600864).
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2024).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-7e10b6eb-8aec-455a-86ae-bf12d6aec12d
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.