Secrecy Capacity of Wireless Channels

Authors

  • เกียรติศักดิ์ ใหม่เจริญนุกูล

Keywords:

Information theory, Physical-layer security, Secrecy capacity, Wireless channel

Abstract

As wireless networking has a wide range of applications, its security is an issue of concern. Encryption is traditionally the main route to secure communications. Nevertheless, this security solution may be difficult to implement in some modern wireless networks, e.g., ad hoc and radio-frequency identification (RFID) networks which require large-scale organization and low computational complexity, respectively. An alternative approach is physical-layer security, which leverages the physical properties of radio channels to achieve reliable data transmission without the need of secret keys. Since this kind of security emerged from the information theoretical characterization of secrecy, there has been great interest in secrecy capacity of various wireless channels. This paper provides an overview of such capacity for a single user.

References

[1] E. Tews and M. Beck, “Practical Attacks Against WEP and WPA,” in Proceedings of the Second ACM Conference on Wireless Network Security, New York, NY, 2009, pp. 79-86.
[2] P. Guillemin and P. Friess, “Internet of Things—Strategic Research Roadmap,” European Commission, Brussels, Belgium, Technical Report, September, 2009.
[3] C. E. Shannon, “Communication Theory of Secrecy Systems,” The Bell System Technical Journal, Vol. 28, No. 4, pp. 656-715, October, 1949.
[4] A. D. Wyner, “The Wire-Tap Channel,” The Bell System Technical Journal, Vol. 54, No. 8, pp. 1355-1387, October, 1975.
[5] U. Maurer and S. Wolf, “From Weak to Strong Information-Theoretic Key Agreement,” in Proceedings of International Symposium on Information Theory, Sorrento, Italy, 2000, p. 18.
[6] I. Bjelakovic, H. Boche, and J. Sommerfeld, “Secrecy Results for Compound Wiretap Channels. Problems of Information Transmission, Vol. 49, No. 1, pp. 73-98, January, 2013.
[7] J. L. Massey, “A Simplified Treatment of Wyner’s Wire-Tap Channel,” in Proceedings of the 21st Allerton Conference on Communication, Control and Computing, Monticello, IL, October, 1983, pp. 268-276.
[8] S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian Wire-Tap Channel,” IEEE Transactions on Information Theory, Vol. 24, No. 4, pp. 451-456, July, 1978.
[9] F. Oggier and B. Hassibi, “The Secrecy Capacity of the MIMO Wiretap Channel,” IEEE Transactions on Information Theory, Vol. 57, No. 8, pp. 4961-4972, August, 2011.
[10] A. Khisti and G. W. Wornell, “Secure Transmission with Multiple Antennas—Part I: The MISOME Wiretap Channel,” IEEE Transactions on Information Theory, Vol. 56, No. 7, pp. 3088-3104, July, 2010.
[11] Y. Liang, H. V. Poor, and S. Shamai (Shitz), “Secure Communication over Fading Channels,” IEEE Transactions on Information Theory, Vol. 54, No. 6. pp. 2470-2492, June, 2008.
[12] T. M. Cover and J. A. Thomas, “Elements of Information Theory,” Wiley, New York, NY, Second Edition, 2006.
[13] E. Biglieri, R. Calderbank, A. Constantinides, A. Goldsmith, A. Paulraj, and H. V. Poor, “MIMO Wireless Communications,” Cambridge University Press, New York, NY, 2010.
[14] S. P. Boyd and L. Vandenberghe, “Convex Optimization,” Cambridge University Press, New York, NY, 2004.
[15] G. Golub and C. F. V. Loan, “Matrix Computations,” Johns Hopkins University Press, Baltimore, MD, Third Edition, 1996.
[16] I. Csiszar and J. Korner, “Broadcast Channels with Confidential Message,” IEEE Transactions on Information Theory, Vol. 24, No. 3, pp. 339-348, May, 1978.
[17] Y. Liang and H. V. Poor, “Multiple-Access Channels with Confidential Messages,” IEEE Transactions on Information Theory, Vol. 54, No. 3, pp. 972-1002, March, 2008.
[18] R. Liu, I. Maric, P. Spasojevic, and R. D. Yates, “Discrete Memoryless Interference and Broadcast Channels with Confidential Messages: Secrecy Rate Regions,” IEEE Transactions on Information Theory, Vol. 54, No. 6, pp. 2493-2507, June, 2008.
[19] S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, “Radio-Telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel,” in Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, San Francisco, CA, 2008, pp. 128-139.
[20] A. Sayeed and A. Perrig, “Secure Wireless Communications: Secret Keys through Multipath,” in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, 2008, pp. 3013-3016.
[21] Y. Chen, F. Han, Y.-H. Yang, H. Ma, Y. Han, C. Jiang, H.-Q. Lai, D. Claffey, Z. Safar, and K. J. R. Liu, “Time-Reversal Wireless Paradigm for Green Internet of Things: An Overview,” IEEE Internet of Things Journal, Vol. 1, No. 1, pp. 81-98, February, 2014.
[22] R. Negi and S. Goel, “Guaranteeing Secrecy Using Artificial Noise,” IEEE Transactions on Wireless Communications, Vol. 7, No. 6, pp. 2180-2189, June, 2008.
[23] S. Gollakota and D. Katabi, “Physical Layer Wireless Security Made Fast and Channel Independent,” in Proceedings of IEEE Conference on Computer Communications, Shanghai, China, 2011, pp. 1125-1133.

Downloads

Published

2020-06-22

How to Cite

[1]
ใหม่เจริญนุกูล เ. ., “Secrecy Capacity of Wireless Channels”, Eng. & Technol. Horiz., vol. 34, no. 3, pp. 1–8, Jun. 2020.

Issue

Section

Academic Articles