Obtaining Secrecy through Intentional Uncertainty

作者: Satashu Goel , Rohit Negi

DOI: 10.1007/978-1-4419-1385-2_2

关键词:

摘要: The tremendous popularity of wireless medium for communications is mainly because the broadcast nature, which allows access to multimedia and information without restriction on user’s location. However, guaranteeing secure communication in a made difficult by same makes it easy eavesdrop an ongoing communication, while making nearly impossible detect eavesdropping. time-varying unreliable nature channels poses further difficulties. physical properties, have detrimental effect reliability provide opportunity enhance secrecy if used carefully.

参考文章(33)
S. Goel, R. Negi, Secret communication in presence of colluding eavesdroppers military communications conference. pp. 1501- 1506 ,(2005) , 10.1109/MILCOM.2005.1605889
H. Vincent Poor, Ruoheng Liu, Multiple Antenna Secure Broadcast over Wireless Networks arXiv: Information Theory. ,(2007)
Gregory W. Wornell, Ashish Khisti, The MIMOME Channel arXiv: Information Theory. ,(2007)
G.J. Foschini, M.J. Gans, On Limits of Wireless Communications in a Fading Environment when UsingMultiple Antennas Wireless Personal Communications. ,vol. 6, pp. 311- 335 ,(1998) , 10.1023/A:1008889222784
Xiaohua Li, Mo Chen, E.P. Ratazzi, Space-time transmissions for wireless secret-key agreement with information-theoretic secrecy international workshop on signal processing advances in wireless communications. pp. 811- 815 ,(2005) , 10.1109/SPAWC.2005.1506252
Ueli Maurer, Stefan Wolf, Information-theoretic key agreement: from weak to strong secrecy for free theory and application of cryptographic techniques. pp. 351- 368 ,(2000) , 10.1007/3-540-45539-6_24
Zang Li, Wade Trappe, Roy Yates, Secret Communication via Multi-antenna Transmission conference on information sciences and systems. pp. 905- 910 ,(2007) , 10.1109/CISS.2007.4298439
Shabnam Shafiee, Sennur Ulukus, Achievable Rates in Gaussian MISO Channels with Secrecy Constraints international symposium on information theory. pp. 2466- 2470 ,(2007) , 10.1109/ISIT.2007.4557589
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017
Satashu Goel, Rohit Negi, Guaranteeing Secrecy using Artificial Noise IEEE Transactions on Wireless Communications. ,vol. 7, pp. 2180- 2189 ,(2008) , 10.1109/TWC.2008.060848