From Quantum to Wireless: A Step Towards Physical-Layer Security

نویسنده

  • João Barros
چکیده

Quantum information theory is widely recognized as an arguably powerful paradigm for physically secure communications. In general, any attack that an eavesdropper, say Eve, perpetrates in order to gain access to messages or keys exchanged by the legitimate parties, say Alice and Bob, will result in disturbances to quantum states that can be detected with overwhelming probability — security is guaranteed by exploiting the fundamental laws of quantum physics. Once a quantum channel is established, Alice and Bob can generate common randomness and use a mix of public communication and privacy amplification to distill a secret key from the correlated random bit strings they possess. Consider now a common wireless communications scenario in which Alice and Bob exchange messages by sending electromagnetic signals over the ether. Since the laws of physics governing such a communication system belong to the realm of classical physics, Eve may listen to the transmitted signals without being detected and it is not immediately clear how Alice and Bob can exploit the physical properties of the wireless channel to ensure secure communication. Answering this question requires us to go back to the foundations of information-theoretic security, which builds on Shannon’s notion of perfect secrecy [1]. In seminal papers, Wyner [2] and later Csiszár and Körner [3] prove that (quite remarkably) there exist channel codes guaranteeing both robustness to transmission errors and a prescribed degree of data confidentiality. A general setup for the so called wiretap channel is shown in Figure 1. In the original version, proposed by Wyner in [2], two legitimate users communicate over a main channel and an eavesdropper has access to degraded versions of the channel outputs that reach the legitimate receiver. In [4] it was shown that if both the main channel and the wiretap channel are additive white Gaussian noise (AWGN) channels, and the latter has less capacity than the former, the secrecy capacity (i.e. the maximum transmission rate at which the eavesdropper is unable to decode any information) is equal to the difference between the two channel capacities. Consequently, confidential communication is not possible unless the Gaussian main channel has a better signal-to-noise ratio (SNR) than the Gaussian wiretap channel. In the seventies and eighties, the impact of these works was limited, partly because practical wiretap codes were not available, but mostly due to the fact that a strictly positive secrecy capacity in the classical wiretap channel setup requires the legitimate sender and receiver to have some advantage (a better SNR) over the attacker. Moreover, almost at the same time, Diffie and Hellman [5] published the basic principles of public-key cryptography, which was to be adopted by nearly all contemporary security schemes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security

Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper&rsqu...

متن کامل

Soft Computing - A step towards building Secure Cognitive WLAN

Wireless Networks rendering varied services has not only become the order of the day but the demand of a large pool of customers as well. Thus, security of wireless networks has become a very essential design criterion. This paper describes our research work focused towards creating secure cognitive wireless local area networks using soft computing approaches. The present dense Wireless Local A...

متن کامل

Editorial: Special Issue on "Wireless Innovation for Inter-dynamic Technology (WIDTH)" (Selected Topics from the Strategic Workshop, May 15-17, 2009, Rebild, Denmark)

The 11th Edition of the closed-door Strategic Workshop was held in Rebild, Denmark, from 15th to 17th ofMay, 2009. The focus during the active two-day discussions of the participating major stakeholders, was on wireless innovation for inter-dynamic technology. Inter-dynamic technology is the next step on the road towards converged next generation communication infrastructures. The main characte...

متن کامل

A Physical Layer Key Negotiation Mechanism to Secure Wireless Networks

The rapid technological developments in computing technology and the proliferation of wireless network nodes with light infrastructure, have emerged large quantities of security requirements of informational privacy in cyberspace. Due to the inherent nature of open medium, diversity and variability of network topology, wireless networks are greatly difficult to secure by traditional methods. A ...

متن کامل

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

Physical Layer Security of Generalised Pre-coded Spatial Modulation with Antenna Scrambling

In the last decade or so, physical layer security had been an active research area drawing substantial attentions and collaborative efforts across different societies. Complementary to the conventional application layer security approach dominantly based on cryptography that is potentially vulnerable to quantum computationally capable eavesdropper, physical layer security was envisioned of prov...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007