Algorithms and architecture for multiusers, multi-terminal, multi-layer information theoretic security
نویسنده
چکیده
As modern infrastructure systems become increasingly more complex, we are faced with many new challenges in the area of information security. In this thesis we examine some approaches to security based on ideas from information theory. The protocols considered in this thesis, build upon the “wiretap channel,” a model for physical layer security proposed by A. Wyner in 1975. At a higher level, the protocols considered here can strengthen existing mechanisms for security by providing a new location based approach at the physical layer. In the first part of this thesis, we extend the wiretap channel model to the case when there are multiple receivers, each experiencing a time varying fading channel. Both the scenario when each legitimate receiver wants a common message as well as the scenario when they all want separate messages are studied and capacity results are established in several special cases. When each receiver wants a separate independent message, an opportunistic scheme that transmits to the strongest user at each time, and uses Gaussian codebooks is shown to achieve the sum secrecy capacity in the limit of many users. When each receiver wants a common message, a lower bound to the capacity is provided, independent of the number of receivers. In the second part of the thesis the role of multiple antennas for secure communication studied. We establish the secrecy capacity of the multi antenna wiretap channel (MIMOME channel), when the channel matrices of the legitimate receiver and eavesdropper are fixed and known to all the terminals. To establish the capacity, a new computable upper bound on the secrecy capacity of the wiretap channel is developed, which may be of independent interest. It is shown that Gaussian codebooks suffice to attain the capacity for this problem. For the case when the legitimate receiver has a single antenna (MISOME channel) a rank one transmission scheme is shown to attain the capacity. In the high signal-to-noise ratio (SNR) regime, it is shown that a capacity achieving scheme involves simultaneous diagonalization of the channel matrices using the generalized singular value decomposition and independently coding accross the resulting parallel channels. Furthermore a semi-blind masked beamforming scheme is studied, which transmits signal of interest in the subspace of
منابع مشابه
Geomatics and Architectural Heritage: a Multi-layer Interactive Map of Tuscia-Italy
The main aims of this research are the design and implementation of a multilayered and interactive geomatic map of the cultural heritage of Tuscia, one of the richest and most complex cultural areas of Italy, thanks to the presence of different civilizations, from Etruscans and Romans to the Middle Age. Its cultural heritage is very rich, valuable and above all diversified because including tan...
متن کاملA Multi-layer Architecture Based on MCDM Methods to Select the Best E-Readiness Assessment Model According to SWOT Analysis
E-readiness is one of the major prerequisites for effective implementation of e-government. For the correct implementation of e-government, it is needed to accurately assess the state of e-readiness in desired community. In this regard, there are models to assess, but the correct choice of model is one of the most important challenges in this area. The process of evaluating and selecting the ap...
متن کاملMulti-layer Clustering Topology Design in Densely Deployed Wireless Sensor Network using Evolutionary Algorithms
Due to the resource constraint and dynamic parameters, reducing energy consumption became the most important issues of wireless sensor networks topology design. All proposed hierarchy methods cluster a WSN in different cluster layers in one step of evolutionary algorithm usage with complicated parameters which may lead to reducing efficiency and performance. In fact, in WSNs topology, increasin...
متن کاملA Novel Design of a Multi-layer 2:4 Decoder using Quantum- Dot Cellular Automata
The quantum-dot cellular automata (QCA) is considered as an alternative tocomplementary metal oxide semiconductor (CMOS) technology based on physicalphenomena like Coulomb interaction to overcome the physical limitations of thistechnology. The decoder is one of the important components in digital circuits, whichcan be used in more comprehensive circuits such as full adde...
متن کاملSecure Multi-Party Computation (Excerpts of Chapter 2)
3 Secure Multi-Party Computation 2 3.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 3.1.1 Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3.1.2 Security Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3.2 Passively Secure Multi-Party Computation . . . . . . . . . . . . . . . . . . . ...
متن کامل