TY - GEN
T1 - Secrecy when the eavesdropper controls its channel states
AU - He, Xiang
AU - Yener, Aylin
N1 - Copyright:
Copyright 2013 Elsevier B.V., All rights reserved.
PY - 2011
Y1 - 2011
N2 - This work investigates providing information theoretically secure communication in a scenario where the eavesdropper is more powerful as compared to models considered to date. Specifically, we consider the setting where the eavesdropper, based on signals it received in the past, modifies its channel state in order to benefit its reception of the legitimate parties' messages. Natural to this setting is that the legitimate parties do not have any knowledge of the eavesdropper's channel state. In this setting, we study the Gaussian two-way wiretap channel, namely two legitimate nodes connected by a bi-directional link in the presence of an eavesdropper that receives the superposition of signals from both nodes. We show that a positive secrecy rate in the sense of strong secrecy is achievable even under these assumptions. The secrecy rate obtained scales with transmit power. The achievable strategy involves cooperative jamming pointing out to its robustness to the adaptive nature of the eavesdropper channel.
AB - This work investigates providing information theoretically secure communication in a scenario where the eavesdropper is more powerful as compared to models considered to date. Specifically, we consider the setting where the eavesdropper, based on signals it received in the past, modifies its channel state in order to benefit its reception of the legitimate parties' messages. Natural to this setting is that the legitimate parties do not have any knowledge of the eavesdropper's channel state. In this setting, we study the Gaussian two-way wiretap channel, namely two legitimate nodes connected by a bi-directional link in the presence of an eavesdropper that receives the superposition of signals from both nodes. We show that a positive secrecy rate in the sense of strong secrecy is achievable even under these assumptions. The secrecy rate obtained scales with transmit power. The achievable strategy involves cooperative jamming pointing out to its robustness to the adaptive nature of the eavesdropper channel.
UR - http://www.scopus.com/inward/record.url?scp=80054809611&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80054809611&partnerID=8YFLogxK
U2 - 10.1109/ISIT.2011.6034203
DO - 10.1109/ISIT.2011.6034203
M3 - Conference contribution
AN - SCOPUS:80054809611
SN - 9781457705953
T3 - IEEE International Symposium on Information Theory - Proceedings
SP - 618
EP - 622
BT - 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011
T2 - 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011
Y2 - 31 July 2011 through 5 August 2011
ER -