Secrecy when the eavesdropper controls its channel states

Xiang He, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations

    Abstract

    This work investigates providing information theoretically secure communication in a scenario where the eavesdropper is more powerful as compared to models considered to date. Specifically, we consider the setting where the eavesdropper, based on signals it received in the past, modifies its channel state in order to benefit its reception of the legitimate parties' messages. Natural to this setting is that the legitimate parties do not have any knowledge of the eavesdropper's channel state. In this setting, we study the Gaussian two-way wiretap channel, namely two legitimate nodes connected by a bi-directional link in the presence of an eavesdropper that receives the superposition of signals from both nodes. We show that a positive secrecy rate in the sense of strong secrecy is achievable even under these assumptions. The secrecy rate obtained scales with transmit power. The achievable strategy involves cooperative jamming pointing out to its robustness to the adaptive nature of the eavesdropper channel.

    Original languageEnglish (US)
    Title of host publication2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011
    Pages618-622
    Number of pages5
    DOIs
    StatePublished - 2011
    Event2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011 - St. Petersburg, Russian Federation
    Duration: Jul 31 2011Aug 5 2011

    Publication series

    NameIEEE International Symposium on Information Theory - Proceedings
    ISSN (Print)2157-8104

    Other

    Other2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011
    Country/TerritoryRussian Federation
    CitySt. Petersburg
    Period7/31/118/5/11

    All Science Journal Classification (ASJC) codes

    • Theoretical Computer Science
    • Information Systems
    • Modeling and Simulation
    • Applied Mathematics

    Fingerprint

    Dive into the research topics of 'Secrecy when the eavesdropper controls its channel states'. Together they form a unique fingerprint.

    Cite this