Security guaranteed wireless communication over common noise attack under spatial assumption

نویسنده

  • Masahito Hayashi
چکیده

We assume that Eve and Bob are connected to Alice with additive white Gaussian noise, and their noises are correlated. We mathematically formulate the correlation between their noises, and optimize Eve’s strategy. We give a necessarily and sufficient condition to generate the agreed secure key between Alice and Bob even with the Eve’s optimal strategy. Further, in this setting, we give a concrete protocol to generate secure final keys whose leaked information is rigorously and quantitatively guaranteed even with finite block-length code. Further, we prepare solutions for two possible attacks by Eve.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

Concurrent Blind Signatures Without Random Oracles

We present a blind signature scheme that is efficient and provably secure without random oracles under concurrent attacks utilizing only four moves of short communication. The scheme is based on elliptic curve groups for which a bilinear map exists and on extractable and equivocable commitments. The unforgeability of the employed signature scheme is guaranteed by the LRSW assumption while the b...

متن کامل

Physical layer security in power line communication networks: an emerging scenario, other than wireless

This chapter digs into the secrecy provided and guaranteed at the physical layer, named physical layer security (PLS), over power line communication (PLC) channels for in-home networks. The PLC scenario peculiarities are briefly discussed in terms of channel characteristics and noise features. The effects of the channel properties on the performance are evaluated, in terms of the achievable sec...

متن کامل

Frequency Rendezvous for Fast and Resilient Key Establishment under Jamming Attack

Jamming attacks have been recently studied as wireless security threats disrupting reliable RF communication in a wireless network. Recently, spread spectrum techniques have been proposed as promising countermeasures to avoid the jamming attacks. However, these solutions require a secure prekey establishment phase before data transmission, which takes considerable time and thus provides limited...

متن کامل

A survey on the wi-fi wireless network systems penetration approaches

Wireless network technology made it possible to communicate easily using the electromagnetic waves leading to removing the biggest barrier in portable communications. As these networks use the air as the communication medium which leads to face with more vulnerabilities. Wireless networks play a vital role in our life in a way that all devices ranging from local modems to organizational equipme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016