Obtaining Secrecy through Intentional Uncertainty
The tremendous popularity of wireless medium for communications is mainly because of the broadcast nature, which allows access to multimedia and information without restriction on the user’s location. However, guaranteeing secure communication in a wireless medium is made difficult by the same broadcast nature, which makes it easy to eavesdrop on an ongoing communication, while making it nearly impossible to detect eavesdropping. The time-varying and unreliable nature of the wireless channels poses further difficulties. However, the same physical properties, which have a detrimental effect on reliability in communication, provide an opportunity to enhance the secrecy of communication, if used carefully.
KeywordsOutage Probability Multiple Input Multiple Output Channel Gain Secret Message Multiple Input Multiple Output
Unable to display preview. Download preview PDF.
- 3.I. Csiszar, J. Korner, “Broadcast Channels with Confidential Messages,” IEEE Trans. Info. Theory, pp. 339–348, May 1978.Google Scholar
- 8.S. Goel, R. Negi, “Secret Communication in Presence of Colluding Eavesdroppers,” Proc. MILCOM, vol. 3, pp. 1501–1506, Nov. 2005.Google Scholar
- 9.S. Goel, R. Negi, “Guaranteeing Secrecy using Artificial Noise,” to appear in IEEE Trans. Wireless Comm., June 2008.Google Scholar
- 10.J. Proakis, “Digital Communications,” McGraw-Hill, 1989.Google Scholar
- 11.G. J. Foschini, M. J. Gans, “On limits of wireless communications in a fading environment when using multiple antennas,” Wireless Personal Commun.: Kluwer Academic Press, no. 6, pp. 311–335, 1998.Google Scholar
- 12.X. Li, M. Chen, E. P. Ratazzi “Space-time transmissions for wireless secret-key agreement with information-theoretic secrecy,” Proc. IEEE SPAWC 2005, pp. 811–815, June 2005.Google Scholar
- 13.H. Koorapaty, A. A. Hassan, S. Chennakeshu, “Secure Information Transmission for Mobile Radio,” IEEE Trans. Wireless Commun., pp. 52–55, July 2003.Google Scholar
- 14.A. E. Hero, “Secure Space-Time Communication,” IEEE Trans. Info. Theory, pp. 3235–3249, Dec. 2003.Google Scholar
- 16.Z. Li, W. Trappe, R. Yates, “Secret Communication via Multi-antenna Transmission,” Proc. CISS ’07, pp. 905–910, Mar. 2007, Baltimore, MD.Google Scholar
- 17.J. Barros, M. R. D. Rodrigues, “Secrecy capacity of wireless channels,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT) 2006, July 2006.Google Scholar
- 23.U. Maurer, S. Wolf, “Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free,” Lecture Notes in Computer Science, vol. 1807, pp. 352–368, Springer- Verlag, 2000.Google Scholar
- 26.D. Welch, S. Lathrop, “Wireless security threat taxonomy,” Proc. IEEE Information Assurance Workshop, 2003, pp. 76– 83, Nov. 2006.Google Scholar
- 27.F. Oggier, B. Hassibi, “The Secrecy Capacity of the MIMO Wiretap Channel,” Preprint, available at http://arxiv.org/PS cache/arxiv/pdf/0710/0710.1920v1.pdf.
- 28.S. Shafiee, S. Ulukus, “Achievable Rates in Gaussian MISO Channels with Secrecy Constraints,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT) 2007, June 2007.Google Scholar
- 29.S. Shafiee, N. Liu, S. Ulukus, “Towards the Secrecy Capacity of the Gaussian MIMO Wire-tap Channel: The 2-2-1 Channel,” Preprint, available at http://arxiv.org/PS cache/arxiv/pdf/0709/0709.3541v1.pdf.
- 30.A. Khisti, G. W. Wornell, “Secure Transmission with Multiple Antennas: The MISOME Wiretap Channel,” Preprint, available at http://cache/arxiv/pdf/0708/0708.4219v1.pdf.
- 31.A. Khisti, G. W. Wornell, “The MIMOME Channel,” Preprint, available at http://arxiv.org/PS cache/arxiv/pdf/0710/0710.1325v1.pdf.
- 32.R. Liu, V. Poor, “Multiple Antenna Secure Broadcast over Wireless Networks,” Preprint, available at http://arxiv.org/PS cache/arxiv/pdf/0705/0705.1183v1.pdf.