Skip to main content

Abstract

This chapter provides a brief overview of information-theoretic physical layer secrecy, including the fundamental limits and the key aspects that may affect the secrecy performance. The measure of secrecy as well as the notions of secrecy capacity and secrecy outage probability are introduced. Explicit expressions for the secrecy capacity and the secrecy outage probability are given for certain scenarios. These results motivate the development of the signal processing techniques to be introduced in later chapters.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wyner AD (1975) The wire-tap channel. Bell Syst Tech J 54(8):1355–1387

    Article  MathSciNet  MATH  Google Scholar 

  2. Csiszàr I, Körner J (1978) Broadcast channels with confidential messages. IEEE Trans Inf Theory 24(3):339–348

    Article  MATH  Google Scholar 

  3. Liu R, Maric I, Spasojević P, Yates RD (2008) Discrete memoryless interference and broadcast channels with confidential messages-secrecy rate regions. IEEE Trans Inf Theory 54(6):1–14

    Article  Google Scholar 

  4. Liang Y, Somekh-Baruch A, Poor HV, Shamai S, Verdu S (2009) Capacity of cognitive interference channels with and without secrecy. IEEE Trans Inf Theory 55(2):604–619

    Article  MathSciNet  Google Scholar 

  5. Liu R, Poor HV (2009) Secrecy capacity region of a multiple-antenna gaussian broadcast channel with confidential messages. IEEE Trans Inf Theory 55(3):1235–1249

    Article  MathSciNet  Google Scholar 

  6. Tekin E, Yener A (2008) The Gaussian multiple access wire-tap channel. IEEE Trans Inf Theory 54(12):5747–5755

    Article  MathSciNet  Google Scholar 

  7. Liang Y, Poor HV (2008) Multiple-access channels with confidential messages. IEEE Trans Inf Theory 54(3):976–1002

    Article  MathSciNet  Google Scholar 

  8. Liang Y, Poor HV, Shamai (Shitz) S (2008) Information theoretic security. Found Trends Commun Inf Theory 5(4–5):355–580 (Now Publishers, Hanover)

    Google Scholar 

  9. Thangaraj A, Dihidar S, Calderbank AR, McLaughlin SW, Merolla J-M (2007) Applications of LDPC codes to the wiretap channel. IEEE Trans Inf Theory 53(8):2933–2945

    Article  MathSciNet  Google Scholar 

  10. Mahdavifar H, Vardy A (2011) Achieving the secrecy capacity of wiretap channels using polar codes. IEEE Trans Inf Theory 57(10):6428–6443

    Article  MathSciNet  Google Scholar 

  11. Klinc D, Ha J, McLaughlin SW, Barros J, Kwak B-J (2011) LDPC codes for the gaussian wiretap channel. IEEE Trans Inf Forensics Secur 6(3):532–540

    Article  Google Scholar 

  12. Leung-Yan-Cheong SK, Hellman ME (1978) The Gaussian wire-tap channel. IEEE Trans Inf Theory IT–24(4):451–456

    Google Scholar 

  13. Khisti A, Wornell G (2010) Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans Inf Theory 56(7):3088–3104

    Article  MathSciNet  Google Scholar 

  14. Khisti A, Wornell G (2010) Secure transmission with multiple antennas II: the MIMOME wiretap channel. IEEE Trans Inf Theory 56(11):5515–5532

    Article  MathSciNet  Google Scholar 

  15. Oggier F, Hassibi B (2011) The secrecy capacity of the MIMO wiretap channel. IEEE Trans Inf Theory 57(8):4961–4972

    Article  MathSciNet  Google Scholar 

  16. Bustin R, Liu R, Poor HV, Shamai (Shitz) S (2009) An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel. EURASIP J Wirel Commun Netw

    Google Scholar 

  17. Liang Y, Kramer G, Poor HV, Shamai (Shitz) S (2009) Compound wiretap channels. EURASIP J Wirel Commun Netw 2009:1–12

    Google Scholar 

  18. Liu T, Prabhakaran V, Vishwanath S (2008) The secrecy capacity of a class of parallel Gaussian compound wiretap channels. In: Proceedings of IEEE International Symposium on Information Theory (ISIT)

    Google Scholar 

  19. Liang Y, Poor HV, Shamai (Shitz) S (2008) Secure communication over fading channels. IEEE Trans Inf Theory 54(6):2470–2492

    Google Scholar 

  20. Gopala PK, Lai L, El Gamal H (2008) On the secrecy capacity of fading channels. IEEE Trans Inf Theory 54(10):4687–4698

    Article  MATH  Google Scholar 

  21. Li J, Petropulu AP (2011) On ergodic secrecy rate for Gaussian MISO wiretap channels. IEEE Trans Wirel Commun 10(4):1176–1187

    Article  Google Scholar 

  22. Lin S-C, Lin P-H (2013) On secrecy capacity of fast fading multiple-input wiretap channels with statistical CSIT. IEEE Trans Inf Forensics Secur 8(2):414–419

    Article  Google Scholar 

  23. Bloch M, Barros J, Rodrigues MRD (2008) Wireless information-theoretic security. IEEE Trans Inf Theory 54(6):2515–2534

    Article  MathSciNet  Google Scholar 

  24. Prabhu VU, Rodrigues MRD (2011) On wireless channels with M-antenna eavesdroppers: characterization of the outage probability and \(\epsilon \)-outage secrecy capacity. IEEE Trans Inf Forensics Secur 6(3):853–860

    Article  Google Scholar 

  25. Chrysikos T, Dagiuklas T, Kotsopoulos S (2009) A closed-form expression for outage secrecy capacity in wireless information-theoretic security. In: Lecture Notes of the Institute for Computer Sciences. Social Informatics and Telecommunications Engineering

    Google Scholar 

  26. Gerbracht S, Scheunert C, Jorswieck EA (2012) Secrecy outage in MISO systems with partial channel information. IEEE Trans Inf Forensics Secur 7(2):704–716

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Y.-W. Peter Hong .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 The Author(s)

About this chapter

Cite this chapter

Hong, YW.P., Lan, PC., Kuo, CC.J. (2014). Background on Information-Theoretic Physical Layer Secrecy. In: Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems. SpringerBriefs in Electrical and Computer Engineering(). Springer, Singapore. https://doi.org/10.1007/978-981-4560-14-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-4560-14-6_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-4560-13-9

  • Online ISBN: 978-981-4560-14-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics