Reliability and Security Functions of the Wiretap Channel under Cost Constraint
نویسندگان
چکیده
The wiretap channel has been devised and studied first by Wyner, and subsequently extended to the case with non-degraded general wiretap channels by Csiszár and Körner. Focusing mainly on the Poisson wiretap channel with cost constraint, we newly introduce the notion of reliability and security functions as a fundamental tool to analyze and/or design the performance of an efficient wiretap channel system. Compact formulae for those functions are explicitly given for stationary memoryless wiretap channels. It is also demonstrated that, based on such a pair of reliability and security functions, we can control the tradeoff between reliability and security (usually conflicting), both with exponentially decreasing rates as block length n becomes large. Two ways to do so are given on the basis of concatenation and rate exchange. In this framework, the notion of the δ secrecy capacity is defined and shown to attain the strongest security standard among others. The maximized vs. averaged security measures is also discussed.
منابع مشابه
Transmitter Optimization in Slow Fading MISO Wiretap Channel
In this paper, we consider the transmitter optimization problem in slow fading multiple-input-single-output (MISO) wiretap channel. The source transmits a secret message intended for K users in the presence of J non-colluding eavesdroppers, and operates under a total power constraint. The channels between the source and all users and eavesdroppers are assumed to be slow fading, and only statist...
متن کاملAchieving Shannon Capacity in a Fading Wiretap Channel
Reliable communication imposes an upper limit on the achievable rate, namely the Shannon capacity. Wyner’s wiretap coding, which ensures a security constraint also, in addition to reliability, results in decrease of the achievable rate. To mitigate the loss in the secrecy rate, we propose a coding scheme where we use sufficiently old messages as key and for this scheme prove that multiple messa...
متن کاملA Model for Adversarial Wiretap Channel
In wiretap model of secure communication, the goal is to provide (asymptotic) perfect secrecy and reliability over a noisy channel that is eavesdropped by an adversary with unlimited computational power. This goal is achieved by taking advantage of the channel noise and without requiring a shared key. The model has attracted considerable attention in recent years because it captures eavesdroppi...
متن کاملAchieving both positive secrecy rates of the users in two-way wiretap channel by individual secrecy
In this paper, the individual secrecy of two-way wiretap channel is investigated, where two legitimate users’ messages are separately guaranteed secure against an external eavesdropper. For one thing, in some communication scenarios, the joint secrecy is impossible to achieve both positive secrecy rates of two users. For another, the individual secrecy satisfies the secrecy demand of many pract...
متن کاملOptimal Design of Open Channel Sections Using PSO Algorithm
This paper applies an evolutionary algorithm, the particle swarm optimization (PSO), to design the optimum open channel section. Depth, channel side slope and bottom width are considered as the variables for rectangular, triangular and trapezoidal channels, respectively. The objective function is minimizing the construction cost of the channel section. MATLAB software is used for programming an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1307.0608 شماره
صفحات -
تاریخ انتشار 2013