On information-theoretic secrecy for wireless networks
نویسندگان
چکیده
In this paper we summarize our recent work on information-theoretically secure wireless relay network communication. In such communication, the goal is to send information between two special nodes (“source” and “destination”) in a (memoryless) network with authenticated relays, where the secrecy is with respect to a class of eavesdroppers. We develop achievable secrecy rates when authenticated relays also help increase secrecy rate by inserting noise into the network.
منابع مشابه
Secrecy capacity of wireless channels subject to log-normal fading
In this paper, the information-theoretic secrecy for the log-normal fading channel is investigated. In particular, the closed-form expressions of the probability of strictly positive secrecy capacity are derived for two wireless communication systems, with single eavesdropper and double eavesdroppers, respectively. Keywords-Information-theoretic secrecy, log-normal fading, secrecy capacity.
متن کاملSecrecy Capacity Region of a Multi-Antenna Gaussian Broadcast Channel with Confidential Messages
In wireless data networks, communication is particularly susceptible to eavesdropping due to its broadcast nature. Security and privacy systems have become critical for wireless providers and enterprise networks. This paper considers the problem of secret communication over the Gaussian broadcast channel, where a multi-antenna transmitter sends independent confidential messages to two users wit...
متن کاملInformation-Theoretic Secrecy for Wireless Networks
The aim of information-theoretic secrecy is to ensure that an eavesdropper who listens to the wireless transmission of a message can only collect an arbitrarily small number of information bits about this message. In contrast to cryptography, there are no assumptions on the computational power of the eavesdropper. Information-theoretically secret communication has been studied for many particul...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملSecure Communication in Stochastic Wireless Networks
Information-theoretic security – widely accepted as the strictest notion of security – relies on channel coding techniques that exploit the inherent randomness of the propagation channels to significantly strengthen the security of digital communications systems. Motivated by recent developments in the field, this paper aims at a characterization of the fundamental secrecy limits of wireless ne...
متن کامل