Information Theoretic Security in Interference Networks
نویسنده
چکیده
This work focuses on interference networks with secrecy constraints. For the two user channel, a scheme that allows users to cooperatively inject (decodable and undecodable) randomness is proposed. The results unveil the role of interference in secure network design. Next, the focus is shifted to arbitrarily high (but finite) number of users with asymptotically high signal to noise ratios. Utilizing the interference alignment scheme, a non-zero secure degrees of freedom is shown to be achievable at each user. Finally, random networks with large number of users is considered. Using tools from the percolation theory, a multi-hop scheme, where independent randomization is added at every hop, is shown to achieve the optimal scaling law under certain assumptions.
منابع مشابه
Joint scheduling & jamming for data secrecy in wireless networks
The broadcast nature of the wireless medium jeopardizes secure transmissions. Cryptographic measures fail to ensure security when eavesdroppers have superior computational capability; however, it can be assured from information theoretic security approaches. We use physical layer security to guarantee nonzero secrecy rate in single source, single destination multi-hop networks with eavesdropper...
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملOn the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کاملAnalysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks
Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot co...
متن کاملAn Information-Theoretic Discussion of Convolutional Bottleneck Features for Robust Speech Recognition
Convolutional Neural Networks (CNNs) have been shown their performance in speech recognition systems for extracting features, and also acoustic modeling. In addition, CNNs have been used for robust speech recognition and competitive results have been reported. Convolutive Bottleneck Network (CBN) is a kind of CNNs which has a bottleneck layer among its fully connected layers. The bottleneck fea...
متن کامل