Skip to main content

Obtaining Secrecy through Intentional Uncertainty

  • Chapter
  • First Online:
  • 1656 Accesses

Abstract

The tremendous popularity of wireless medium for communications is mainly because of the broadcast nature, which allows access to multimedia and information without restriction on the user’s location. However, guaranteeing secure communication in a wireless medium is made difficult by the same broadcast nature, which makes it easy to eavesdrop on an ongoing communication, while making it nearly impossible to detect eavesdropping. The time-varying and unreliable nature of the wireless channels poses further difficulties. However, the same physical properties, which have a detrimental effect on reliability in communication, provide an opportunity to enhance the secrecy of communication, if used carefully.

Portions of the material have appeared in “Guaranteeing Secrecy using Artificial Noise,” IEEE Transactions onWireless Communications, vol. 7, no. 6, June 2008,© IEEE 2008.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, pp. 656–715, 1949.

    MATH  MathSciNet  Google Scholar 

  2. R. L. Rivest, A. Shamir, L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no. 2, pp. 120–126, Feb. 1978.

    Article  MATH  MathSciNet  Google Scholar 

  3. I. Csiszar, J. Korner, “Broadcast Channels with Confidential Messages,” IEEE Trans. Info. Theory, pp. 339–348, May 1978.

    Google Scholar 

  4. A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, 1975.

    MathSciNet  Google Scholar 

  5. S. Leung-Yan-Cheong, M. Hellman, “The Gaussian wire-tap channel,” IEEE Trans. Info. Theory, vol. 24, no. 4, pp. 451–456, July 1978.

    Article  MATH  MathSciNet  Google Scholar 

  6. U. M. Maurer, “Secret Key Agreement by Public Discussion from Common Information,” IEEE Trans. Info. Theory, vol. 39, no. 3, pp. 733–742, May 1993.

    Article  MATH  MathSciNet  Google Scholar 

  7. R. Negi, S. Goel, “Secret Communication using Artificial Noise,” Proc. VTC Fall 2005, vol. 3, pp. 1906–1910, Sept. 2005.

    Article  Google Scholar 

  8. S. Goel, R. Negi, “Secret Communication in Presence of Colluding Eavesdroppers,” Proc. MILCOM, vol. 3, pp. 1501–1506, Nov. 2005.

    Google Scholar 

  9. S. Goel, R. Negi, “Guaranteeing Secrecy using Artificial Noise,” to appear in IEEE Trans. Wireless Comm., June 2008.

    Google Scholar 

  10. J. Proakis, “Digital Communications,” McGraw-Hill, 1989.

    Google Scholar 

  11. G. J. Foschini, M. J. Gans, “On limits of wireless communications in a fading environment when using multiple antennas,” Wireless Personal Commun.: Kluwer Academic Press, no. 6, pp. 311–335, 1998.

    Google Scholar 

  12. X. Li, M. Chen, E. P. Ratazzi “Space-time transmissions for wireless secret-key agreement with information-theoretic secrecy,” Proc. IEEE SPAWC 2005, pp. 811–815, June 2005.

    Google Scholar 

  13. H. Koorapaty, A. A. Hassan, S. Chennakeshu, “Secure Information Transmission for Mobile Radio,” IEEE Trans. Wireless Commun., pp. 52–55, July 2003.

    Google Scholar 

  14. A. E. Hero, “Secure Space-Time Communication,” IEEE Trans. Info. Theory, pp. 3235–3249, Dec. 2003.

    Google Scholar 

  15. U. M. Maurer, S. Wolf, “Unconditionally Secure Key Agreement and the Intrinsic Conditional Information,” IEEE Trans. Info. Theory, vol. 45, no. 2, pp. 499–514, March 1999.

    Article  MATH  MathSciNet  Google Scholar 

  16. Z. Li, W. Trappe, R. Yates, “Secret Communication via Multi-antenna Transmission,” Proc. CISS ’07, pp. 905–910, Mar. 2007, Baltimore, MD.

    Google Scholar 

  17. J. Barros, M. R. D. Rodrigues, “Secrecy capacity of wireless channels,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT) 2006, July 2006.

    Google Scholar 

  18. D. Chizhik, J. Ling, P. W. Wolniansky, R. A. Valenzuela, N. E. Costa, K. Huber, “Multiple-Input-Multiple-Output measurements and modeling in Manhattan,” IEEE J. Select. Areas Commun., vol. 21, no. 3, pp. 321–331, Apr. 2003.

    Article  Google Scholar 

  19. E. Telatar, “Capacity of multi-antenna Gaussian channels,” Eur. Trans. Telecomm. ETT, vol. 10, no. 6, pp. 585–596, Nov. 1999.

    Article  Google Scholar 

  20. G. J. Foschini, D. Chizhik, M. J. Gans, C. Papadias, R. A. Valenzuela, “Analysis and performance of some basic spacetime architectures,” IEEE J. Select. Areas Commun., Special Issue on MIMO Systems, pt. I, vol. 21, pp. 303–320, Apr. 2003.

    Article  Google Scholar 

  21. B. M. Hochwald, T. L. Marzetta, V. Tarokh, “Multiple-antenna channel hardening and its implications for rate feedback and scheduling,” IEEE Trans. Inform. Theory, vol. 50, no. 9, pp. 1893–1909, Sep. 2004.

    Article  MathSciNet  Google Scholar 

  22. J. W. Silverstein, Z. D. Bai, “On the empirical distribution of eigenvalues of a class of large dimensional random matrices,” J. Mult. Anal., vol. 54, pp. 175–192, 1995.

    Article  MATH  MathSciNet  Google Scholar 

  23. U. Maurer, S. Wolf, “Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free,” Lecture Notes in Computer Science, vol. 1807, pp. 352–368, Springer- Verlag, 2000.

    Google Scholar 

  24. J. N. Laneman, D. N. C. Tse, G. W. Wornell, “Cooperative diversity in wireless networks: Efficient protocols and outage behavior,” IEEE Trans. Info. Theory, vol. 50, no. 12, pp. 3062–3080, Dec. 2004.

    Article  MathSciNet  Google Scholar 

  25. Y. Liang, H. V. Poor, S. Shamai, “Secure Communication over Fading Channels,” IEEE Trans. Info. Theory, vol. 54, no. 6, pp. 2470 – 2492, June 2008.

    Article  MathSciNet  Google Scholar 

  26. D. Welch, S. Lathrop, “Wireless security threat taxonomy,” Proc. IEEE Information Assurance Workshop, 2003, pp. 76– 83, Nov. 2006.

    Google Scholar 

  27. F. Oggier, B. Hassibi, “The Secrecy Capacity of the MIMO Wiretap Channel,” Preprint, available at http://arxiv.org/PS cache/arxiv/pdf/0710/0710.1920v1.pdf.

  28. S. Shafiee, S. Ulukus, “Achievable Rates in Gaussian MISO Channels with Secrecy Constraints,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT) 2007, June 2007.

    Google Scholar 

  29. S. Shafiee, N. Liu, S. Ulukus, “Towards the Secrecy Capacity of the Gaussian MIMO Wire-tap Channel: The 2-2-1 Channel,” Preprint, available at http://arxiv.org/PS cache/arxiv/pdf/0709/0709.3541v1.pdf.

  30. A. Khisti, G. W. Wornell, “Secure Transmission with Multiple Antennas: The MISOME Wiretap Channel,” Preprint, available at http://cache/arxiv/pdf/0708/0708.4219v1.pdf.

  31. A. Khisti, G. W. Wornell, “The MIMOME Channel,” Preprint, available at http://arxiv.org/PS cache/arxiv/pdf/0710/0710.1325v1.pdf.

  32. R. Liu, V. Poor, “Multiple Antenna Secure Broadcast over Wireless Networks,” Preprint, available at http://arxiv.org/PS cache/arxiv/pdf/0705/0705.1183v1.pdf.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Satashu Goel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Goel, S., Negi, R. (2009). Obtaining Secrecy through Intentional Uncertainty. In: Liu, R., Trappe, W. (eds) Securing Wireless Communications at the Physical Layer. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-1385-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-1385-2_2

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4419-1384-5

  • Online ISBN: 978-1-4419-1385-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics