Abstract
This chapter provides a brief overview of information-theoretic physical layer secrecy, including the fundamental limits and the key aspects that may affect the secrecy performance. The measure of secrecy as well as the notions of secrecy capacity and secrecy outage probability are introduced. Explicit expressions for the secrecy capacity and the secrecy outage probability are given for certain scenarios. These results motivate the development of the signal processing techniques to be introduced in later chapters.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wyner AD (1975) The wire-tap channel. Bell Syst Tech J 54(8):1355–1387
Csiszà r I, Körner J (1978) Broadcast channels with confidential messages. IEEE Trans Inf Theory 24(3):339–348
Liu R, Maric I, Spasojević P, Yates RD (2008) Discrete memoryless interference and broadcast channels with confidential messages-secrecy rate regions. IEEE Trans Inf Theory 54(6):1–14
Liang Y, Somekh-Baruch A, Poor HV, Shamai S, Verdu S (2009) Capacity of cognitive interference channels with and without secrecy. IEEE Trans Inf Theory 55(2):604–619
Liu R, Poor HV (2009) Secrecy capacity region of a multiple-antenna gaussian broadcast channel with confidential messages. IEEE Trans Inf Theory 55(3):1235–1249
Tekin E, Yener A (2008) The Gaussian multiple access wire-tap channel. IEEE Trans Inf Theory 54(12):5747–5755
Liang Y, Poor HV (2008) Multiple-access channels with confidential messages. IEEE Trans Inf Theory 54(3):976–1002
Liang Y, Poor HV, Shamai (Shitz) S (2008) Information theoretic security. Found Trends Commun Inf Theory 5(4–5):355–580 (Now Publishers, Hanover)
Thangaraj A, Dihidar S, Calderbank AR, McLaughlin SW, Merolla J-M (2007) Applications of LDPC codes to the wiretap channel. IEEE Trans Inf Theory 53(8):2933–2945
Mahdavifar H, Vardy A (2011) Achieving the secrecy capacity of wiretap channels using polar codes. IEEE Trans Inf Theory 57(10):6428–6443
Klinc D, Ha J, McLaughlin SW, Barros J, Kwak B-J (2011) LDPC codes for the gaussian wiretap channel. IEEE Trans Inf Forensics Secur 6(3):532–540
Leung-Yan-Cheong SK, Hellman ME (1978) The Gaussian wire-tap channel. IEEE Trans Inf Theory IT–24(4):451–456
Khisti A, Wornell G (2010) Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans Inf Theory 56(7):3088–3104
Khisti A, Wornell G (2010) Secure transmission with multiple antennas II: the MIMOME wiretap channel. IEEE Trans Inf Theory 56(11):5515–5532
Oggier F, Hassibi B (2011) The secrecy capacity of the MIMO wiretap channel. IEEE Trans Inf Theory 57(8):4961–4972
Bustin R, Liu R, Poor HV, Shamai (Shitz) S (2009) An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel. EURASIP J Wirel Commun Netw
Liang Y, Kramer G, Poor HV, Shamai (Shitz) S (2009) Compound wiretap channels. EURASIP J Wirel Commun Netw 2009:1–12
Liu T, Prabhakaran V, Vishwanath S (2008) The secrecy capacity of a class of parallel Gaussian compound wiretap channels. In: Proceedings of IEEE International Symposium on Information Theory (ISIT)
Liang Y, Poor HV, Shamai (Shitz) S (2008) Secure communication over fading channels. IEEE Trans Inf Theory 54(6):2470–2492
Gopala PK, Lai L, El Gamal H (2008) On the secrecy capacity of fading channels. IEEE Trans Inf Theory 54(10):4687–4698
Li J, Petropulu AP (2011) On ergodic secrecy rate for Gaussian MISO wiretap channels. IEEE Trans Wirel Commun 10(4):1176–1187
Lin S-C, Lin P-H (2013) On secrecy capacity of fast fading multiple-input wiretap channels with statistical CSIT. IEEE Trans Inf Forensics Secur 8(2):414–419
Bloch M, Barros J, Rodrigues MRD (2008) Wireless information-theoretic security. IEEE Trans Inf Theory 54(6):2515–2534
Prabhu VU, Rodrigues MRD (2011) On wireless channels with M-antenna eavesdroppers: characterization of the outage probability and \(\epsilon \)-outage secrecy capacity. IEEE Trans Inf Forensics Secur 6(3):853–860
Chrysikos T, Dagiuklas T, Kotsopoulos S (2009) A closed-form expression for outage secrecy capacity in wireless information-theoretic security. In: Lecture Notes of the Institute for Computer Sciences. Social Informatics and Telecommunications Engineering
Gerbracht S, Scheunert C, Jorswieck EA (2012) Secrecy outage in MISO systems with partial channel information. IEEE Trans Inf Forensics Secur 7(2):704–716
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 The Author(s)
About this chapter
Cite this chapter
Hong, YW.P., Lan, PC., Kuo, CC.J. (2014). Background on Information-Theoretic Physical Layer Secrecy. In: Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems. SpringerBriefs in Electrical and Computer Engineering(). Springer, Singapore. https://doi.org/10.1007/978-981-4560-14-6_2
Download citation
DOI: https://doi.org/10.1007/978-981-4560-14-6_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-4560-13-9
Online ISBN: 978-981-4560-14-6
eBook Packages: EngineeringEngineering (R0)