Lattices for Physical-layer Secrecy: A Computational Perspective
نویسندگان
چکیده
In this paper, we use the hardness of quantization over general lattices as the basis of developing a physical layer secrecy system. Assuming that the channel state observed by the legitimate receiver and the eavesdropper are distinct, this asymmetry is used to develop a cryptosystem that resembles the McEliece cryptosystem, designed to be implemented at the physical layer. We ensure that the legitimate receiver observes a specific lattice over which decoding is known to be possible in polynomial-time. while the eavesdropper observes a lattice over which decoding will prove to have the complexity of lattice quantization over a general lattice.
منابع مشابه
Study of Tomlinson-Harashima Precoding Strategies for Physical-Layer Security in Wireless Networks
In this paper, we propose novel non-linear precoders for the downlink of a multi-user MIMO system with the existence of multiple eavesdroppers. The proposed non-linear precoders are designed to improve the physical-layer secrecy rate. Specifically, we combine the non-linear successive optimization TomlinsonHarashima precoding (SO-THP) with generalized matrix inversion (GMI) technique to maximiz...
متن کاملStudy of Relay Selection for Physical-Layer Security in Buffer-Aided Relay Networks Based on the Secrecy Rate Criterion
In this paper, we investigate an opportunistic relay and jammer scheme along with relay selection algorithms based on the secrecy rate criterion in multiple-input multiple-output buffer-aided down link relay networks, which consist of one source, a number of relay nodes, legitimate users and eavesdroppers, with the constraints of physical layer security. The opportunistic relay and jammer schem...
متن کاملMode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective
This paper investigates from the physical layer security (PLS) perspective the fundamental issues of mode selection and spectrum partition in cellular networks with inband device-to-device (D2D) communication. We consider a mode selection scheme allowing each D2D pair to probabilistically switch between the underlay and overlay modes, and also a spectrum partition scheme where the system spectr...
متن کاملJoint distributed beamforming and jamming schemes in decode-and-forward relay networks for physical layer secrecy
In this paper, we propose joint cooperative beamforming and jamming schemes in decode-and-forward (DF) relay networks for physical layer secrecy. In DF relay networks, only the relays decoding the message from the source correctly have to join in the forwarding phase and the relays with decoding error are not utilized sufficiently. Taking this property into consideration, we let the relays deco...
متن کاملPerformance Study of Untrusted Relay Network Utilizing Cooperative Jammer
Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1109.6276 شماره
صفحات -
تاریخ انتشار 2011