Secrecy and reliable byzantine detection in a gaussian untrusted two-hop link

Xiang He, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)

    Abstract

    We consider a Gaussian two-hop link where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine attacker. Both the source and the destination have transmission capability, and the relay node receives a superposition of their transmitted signals plus noise. The proposed coding scheme ensures that the probability of an undetected Byzantine attack decreases exponentially fast with respect to the number of channel uses NT while the loss in the secrecy rate can be made arbitrarily small. This improves our previous result where this probability only decreased exponentially with respect to √NT.

    Original languageEnglish (US)
    Title of host publicationIEEE Information Theory Workshop 2010, ITW 2010
    DOIs
    StatePublished - Jul 27 2010
    EventIEEE Information Theory Workshop 2010, ITW 2010 - Cairo, Egypt
    Duration: Jan 6 2010Jan 8 2010

    Publication series

    NameIEEE Information Theory Workshop 2010, ITW 2010

    Other

    OtherIEEE Information Theory Workshop 2010, ITW 2010
    CountryEgypt
    CityCairo
    Period1/6/101/8/10

    Fingerprint

    Relay
    Vertex of a graph
    Superposition
    Coding
    Attack
    Decrease

    All Science Journal Classification (ASJC) codes

    • Computational Theory and Mathematics
    • Theoretical Computer Science

    Cite this

    He, X., & Yener, A. (2010). Secrecy and reliable byzantine detection in a gaussian untrusted two-hop link. In IEEE Information Theory Workshop 2010, ITW 2010 [5503151] (IEEE Information Theory Workshop 2010, ITW 2010). https://doi.org/10.1109/ITWKSPS.2010.5503151
    He, Xiang ; Yener, Aylin. / Secrecy and reliable byzantine detection in a gaussian untrusted two-hop link. IEEE Information Theory Workshop 2010, ITW 2010. 2010. (IEEE Information Theory Workshop 2010, ITW 2010).
    @inproceedings{280e0d144d684bfb85377e65b97b6611,
    title = "Secrecy and reliable byzantine detection in a gaussian untrusted two-hop link",
    abstract = "We consider a Gaussian two-hop link where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine attacker. Both the source and the destination have transmission capability, and the relay node receives a superposition of their transmitted signals plus noise. The proposed coding scheme ensures that the probability of an undetected Byzantine attack decreases exponentially fast with respect to the number of channel uses NT while the loss in the secrecy rate can be made arbitrarily small. This improves our previous result where this probability only decreased exponentially with respect to √NT.",
    author = "Xiang He and Aylin Yener",
    year = "2010",
    month = "7",
    day = "27",
    doi = "10.1109/ITWKSPS.2010.5503151",
    language = "English (US)",
    isbn = "9781424463725",
    series = "IEEE Information Theory Workshop 2010, ITW 2010",
    booktitle = "IEEE Information Theory Workshop 2010, ITW 2010",

    }

    He, X & Yener, A 2010, Secrecy and reliable byzantine detection in a gaussian untrusted two-hop link. in IEEE Information Theory Workshop 2010, ITW 2010., 5503151, IEEE Information Theory Workshop 2010, ITW 2010, IEEE Information Theory Workshop 2010, ITW 2010, Cairo, Egypt, 1/6/10. https://doi.org/10.1109/ITWKSPS.2010.5503151

    Secrecy and reliable byzantine detection in a gaussian untrusted two-hop link. / He, Xiang; Yener, Aylin.

    IEEE Information Theory Workshop 2010, ITW 2010. 2010. 5503151 (IEEE Information Theory Workshop 2010, ITW 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    TY - GEN

    T1 - Secrecy and reliable byzantine detection in a gaussian untrusted two-hop link

    AU - He, Xiang

    AU - Yener, Aylin

    PY - 2010/7/27

    Y1 - 2010/7/27

    N2 - We consider a Gaussian two-hop link where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine attacker. Both the source and the destination have transmission capability, and the relay node receives a superposition of their transmitted signals plus noise. The proposed coding scheme ensures that the probability of an undetected Byzantine attack decreases exponentially fast with respect to the number of channel uses NT while the loss in the secrecy rate can be made arbitrarily small. This improves our previous result where this probability only decreased exponentially with respect to √NT.

    AB - We consider a Gaussian two-hop link where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine attacker. Both the source and the destination have transmission capability, and the relay node receives a superposition of their transmitted signals plus noise. The proposed coding scheme ensures that the probability of an undetected Byzantine attack decreases exponentially fast with respect to the number of channel uses NT while the loss in the secrecy rate can be made arbitrarily small. This improves our previous result where this probability only decreased exponentially with respect to √NT.

    UR - http://www.scopus.com/inward/record.url?scp=77954826381&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=77954826381&partnerID=8YFLogxK

    U2 - 10.1109/ITWKSPS.2010.5503151

    DO - 10.1109/ITWKSPS.2010.5503151

    M3 - Conference contribution

    AN - SCOPUS:77954826381

    SN - 9781424463725

    T3 - IEEE Information Theory Workshop 2010, ITW 2010

    BT - IEEE Information Theory Workshop 2010, ITW 2010

    ER -

    He X, Yener A. Secrecy and reliable byzantine detection in a gaussian untrusted two-hop link. In IEEE Information Theory Workshop 2010, ITW 2010. 2010. 5503151. (IEEE Information Theory Workshop 2010, ITW 2010). https://doi.org/10.1109/ITWKSPS.2010.5503151