Abstract
The tremendous popularity of wireless medium for communications is mainly because of the broadcast nature, which allows access to multimedia and information without restriction on the user’s location. However, guaranteeing secure communication in a wireless medium is made difficult by the same broadcast nature, which makes it easy to eavesdrop on an ongoing communication, while making it nearly impossible to detect eavesdropping. The time-varying and unreliable nature of the wireless channels poses further difficulties. However, the same physical properties, which have a detrimental effect on reliability in communication, provide an opportunity to enhance the secrecy of communication, if used carefully.
Portions of the material have appeared in “Guaranteeing Secrecy using Artificial Noise,” IEEE Transactions onWireless Communications, vol. 7, no. 6, June 2008,© IEEE 2008.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, pp. 656–715, 1949.
R. L. Rivest, A. Shamir, L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no. 2, pp. 120–126, Feb. 1978.
I. Csiszar, J. Korner, “Broadcast Channels with Confidential Messages,” IEEE Trans. Info. Theory, pp. 339–348, May 1978.
A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, 1975.
S. Leung-Yan-Cheong, M. Hellman, “The Gaussian wire-tap channel,” IEEE Trans. Info. Theory, vol. 24, no. 4, pp. 451–456, July 1978.
U. M. Maurer, “Secret Key Agreement by Public Discussion from Common Information,” IEEE Trans. Info. Theory, vol. 39, no. 3, pp. 733–742, May 1993.
R. Negi, S. Goel, “Secret Communication using Artificial Noise,” Proc. VTC Fall 2005, vol. 3, pp. 1906–1910, Sept. 2005.
S. Goel, R. Negi, “Secret Communication in Presence of Colluding Eavesdroppers,” Proc. MILCOM, vol. 3, pp. 1501–1506, Nov. 2005.
S. Goel, R. Negi, “Guaranteeing Secrecy using Artificial Noise,” to appear in IEEE Trans. Wireless Comm., June 2008.
J. Proakis, “Digital Communications,” McGraw-Hill, 1989.
G. J. Foschini, M. J. Gans, “On limits of wireless communications in a fading environment when using multiple antennas,” Wireless Personal Commun.: Kluwer Academic Press, no. 6, pp. 311–335, 1998.
X. Li, M. Chen, E. P. Ratazzi “Space-time transmissions for wireless secret-key agreement with information-theoretic secrecy,” Proc. IEEE SPAWC 2005, pp. 811–815, June 2005.
H. Koorapaty, A. A. Hassan, S. Chennakeshu, “Secure Information Transmission for Mobile Radio,” IEEE Trans. Wireless Commun., pp. 52–55, July 2003.
A. E. Hero, “Secure Space-Time Communication,” IEEE Trans. Info. Theory, pp. 3235–3249, Dec. 2003.
U. M. Maurer, S. Wolf, “Unconditionally Secure Key Agreement and the Intrinsic Conditional Information,” IEEE Trans. Info. Theory, vol. 45, no. 2, pp. 499–514, March 1999.
Z. Li, W. Trappe, R. Yates, “Secret Communication via Multi-antenna Transmission,” Proc. CISS ’07, pp. 905–910, Mar. 2007, Baltimore, MD.
J. Barros, M. R. D. Rodrigues, “Secrecy capacity of wireless channels,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT) 2006, July 2006.
D. Chizhik, J. Ling, P. W. Wolniansky, R. A. Valenzuela, N. E. Costa, K. Huber, “Multiple-Input-Multiple-Output measurements and modeling in Manhattan,” IEEE J. Select. Areas Commun., vol. 21, no. 3, pp. 321–331, Apr. 2003.
E. Telatar, “Capacity of multi-antenna Gaussian channels,” Eur. Trans. Telecomm. ETT, vol. 10, no. 6, pp. 585–596, Nov. 1999.
G. J. Foschini, D. Chizhik, M. J. Gans, C. Papadias, R. A. Valenzuela, “Analysis and performance of some basic spacetime architectures,” IEEE J. Select. Areas Commun., Special Issue on MIMO Systems, pt. I, vol. 21, pp. 303–320, Apr. 2003.
B. M. Hochwald, T. L. Marzetta, V. Tarokh, “Multiple-antenna channel hardening and its implications for rate feedback and scheduling,” IEEE Trans. Inform. Theory, vol. 50, no. 9, pp. 1893–1909, Sep. 2004.
J. W. Silverstein, Z. D. Bai, “On the empirical distribution of eigenvalues of a class of large dimensional random matrices,” J. Mult. Anal., vol. 54, pp. 175–192, 1995.
U. Maurer, S. Wolf, “Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free,” Lecture Notes in Computer Science, vol. 1807, pp. 352–368, Springer- Verlag, 2000.
J. N. Laneman, D. N. C. Tse, G. W. Wornell, “Cooperative diversity in wireless networks: Efficient protocols and outage behavior,” IEEE Trans. Info. Theory, vol. 50, no. 12, pp. 3062–3080, Dec. 2004.
Y. Liang, H. V. Poor, S. Shamai, “Secure Communication over Fading Channels,” IEEE Trans. Info. Theory, vol. 54, no. 6, pp. 2470 – 2492, June 2008.
D. Welch, S. Lathrop, “Wireless security threat taxonomy,” Proc. IEEE Information Assurance Workshop, 2003, pp. 76– 83, Nov. 2006.
F. Oggier, B. Hassibi, “The Secrecy Capacity of the MIMO Wiretap Channel,” Preprint, available at http://arxiv.org/PS cache/arxiv/pdf/0710/0710.1920v1.pdf.
S. Shafiee, S. Ulukus, “Achievable Rates in Gaussian MISO Channels with Secrecy Constraints,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT) 2007, June 2007.
S. Shafiee, N. Liu, S. Ulukus, “Towards the Secrecy Capacity of the Gaussian MIMO Wire-tap Channel: The 2-2-1 Channel,” Preprint, available at http://arxiv.org/PS cache/arxiv/pdf/0709/0709.3541v1.pdf.
A. Khisti, G. W. Wornell, “Secure Transmission with Multiple Antennas: The MISOME Wiretap Channel,” Preprint, available at http://cache/arxiv/pdf/0708/0708.4219v1.pdf.
A. Khisti, G. W. Wornell, “The MIMOME Channel,” Preprint, available at http://arxiv.org/PS cache/arxiv/pdf/0710/0710.1325v1.pdf.
R. Liu, V. Poor, “Multiple Antenna Secure Broadcast over Wireless Networks,” Preprint, available at http://arxiv.org/PS cache/arxiv/pdf/0705/0705.1183v1.pdf.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Goel, S., Negi, R. (2009). Obtaining Secrecy through Intentional Uncertainty. In: Liu, R., Trappe, W. (eds) Securing Wireless Communications at the Physical Layer. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-1385-2_2
Download citation
DOI: https://doi.org/10.1007/978-1-4419-1385-2_2
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-1384-5
Online ISBN: 978-1-4419-1385-2
eBook Packages: EngineeringEngineering (R0)