Strong Secrecy in Wireless Network Coding Systems from Structured Interference

نویسندگان

  • David A. Karpuk
  • Arsenia Chorti
چکیده

Wireless network coding (WNC) has been proposed for next generation networks. In this contribution, we investigate WNC schemes with embedded strong secrecy by exploiting structured interference in relay networks with two users and a single relay. In a practical scenario where both users employ finite, uniform signal input distributions we compute the corresponding strong secrecy capacity, and make this explicit when PAM modems are used. We then describe a simple triple binning encoder that can provide strong secrecy close to capacity with respect to an untrustworthy relay in the single antenna and single relay setting. An explicit encoder construction is described when M -PAM or M -QAM modulators are employed at the users’ transmitters. Lastly we generalize to a MIMO relay channel where the relay has more antennas than the users, and optimal precoding matrices are studied. Our results establish that the design of WNC transmission schemes with enhanced throughput and guaranteed data confidentiality is feasible in next generation systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Achievable Secrecy Rate Regions of State Dependent Causal Cognitive Interference Channel

In this paper, the secrecy problem in the state dependent causal cognitive interference channel is studied. The channel state is non-causally known at the cognitive encoder. The message of the cognitive encoder must be kept secret from the primary receiver. We use a coding scheme which is a combination of compress-and-forward strategy with Marton coding, Gel’fand-Pinsker coding and Wyner’s wire...

متن کامل

A survey on the wi-fi wireless network systems penetration approaches

Wireless network technology made it possible to communicate easily using the electromagnetic waves leading to removing the biggest barrier in portable communications. As these networks use the air as the communication medium which leads to face with more vulnerabilities. Wireless networks play a vital role in our life in a way that all devices ranging from local modems to organizational equipme...

متن کامل

Interference Alignment with Imperfect Channel Knowledge and Secrecy Constraints pdfsubject=Doctoral Thesis

In this thesis, the degrees of freedom (DOF) of wireless networks are studied with imperfect channel state information at transmitters (CSIT) and/or secrecy constraints. Different interference alignment schemes are proposed to establish the DOF lower bound for a variety of wireless networks. For the imperfections of CSIT, we mainly have two practical concerns. The first concern is the long dela...

متن کامل

Information-Theoretic Secrecy for Wireless Networks

The aim of information-theoretic secrecy is to ensure that an eavesdropper who listens to the wireless transmission of a message can only collect an arbitrarily small number of information bits about this message. In contrast to cryptography, there are no assumptions on the computational power of the eavesdropper. Information-theoretically secret communication has been studied for many particul...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1507.01098  شماره 

صفحات  -

تاریخ انتشار 2015