Information-Theoretic Security in Wireless Networks
This paper summarizes recent contributions of the authors and their co-workers in the area of information-theoretic security.
Authors: Yingbin Liang, H. Vincent Poor, Shlomo Shamai (Shitz)
Inf ormation-Theor etic Security in Wir eless Netw orks Y ingbin Liang, H. V i ncen t Poor and Shlomo Sh amai (Shitz) S U M M A R Y Security in wireless networks has traditionally been con- sidered to be an application layer issue. Ho wever , with the emergence of ad hoc and other less c entralized networking en viron ments, there h as bee n an increase in inter est in the potential of the wireless physical la yer to provide co m- munication s security . Infor mation theor y provides a natural framework for the study of this issue, and consequently there has been a r esurgence of interest in information- theoretic security in recent years, particu larly for wireless channel models. Of cou rse, the use of in formatio n th eoretic conce pts to chara cterize communicatio ns security dates to Shannon’ s earliest w ork, and the importan t work on the wire-tap channel by W yner an d by Csisz ´ ar an d K ¨ orner in the 1970’ s addressed security issues for broadcast co mmunica tions. But, recent work has taken th ese early ideas and e xpan ded o n them considerab ly , by examining mu ltiple access channels, cog ni- ti ve c ommun ications, comp ound c hannels, fading, multiple- antenna (MI MO) transmission, co de design for secure tra ns- mission, feedb ack, authentication, secure network coding, and m any other issues. This paper will review recent contributions of th e authors and their co-workers in this general area. In p articular, a n ew channel mo del f or wireless m ultiple access comm unication will be introduced. F or this channel, in wh ich security issues arise natur ally , recent results characterizing reliable com- munication rates unde r secrecy constraints ( possibly perfe ct secrecy) will be presented. Th en, gener al design principles that ar e essential to achieve secure com municatio n w ill be postulated. Finally , add itional recent research o n the topic of information -theor etic secur ity will be discussed briefly as time p ermits. These re sults include the secrecy cap acity region of fading br oadcast chan nels, coding design fo r wire- tap channels, an d the impact of feedback on secrecy ra te. The talk will touch on the work of a number of col- leagues an d co -workers, including Hesham El Gamal (Ohio State Univ ersity), Jared Grub b (University of T exas, Austin), Gerhard Kram er (Alcatel-L ucent Bell Labs), Lifeng Lai (Princeton ), Ruoheng L iu ( Princeton) , Pedrag Spasojevic (Rutgers WINLAB), Anelia So mekh- Baruch (Princeton), Xi- aojun T ang (Rutgers WINLAB), Sergio V erd ´ u ( Princeton) and Sriram V ishwanath (Univ ersity of T e xas, Austin), the This w ork was prep ared under the support of the U. S. National Scienc e Founda tion under Grants ANI-03-38807 and CNS-06-25637. Y . Liang and H. V . Poor are with the Department of Elec- trical Engineering, Princeto n Univ ersity , Princet on, NJ 08544 USA { yingbinl,poor } @prin ceton.edu . S. Shamai (Shitz) is with the Department of Elect rical Engine ering, T echnion-I srael Institute of T echnology , T echnion City , Haifa 32000, Israel sshlomo@ee.tec hnion.ac.il . details of wh ich can be found in the publications cited in the referenc es. R E F E R E N C E S [1] J. Grubb, S. V ishwanath , Y . Liang and H. V . Poor , “Secre cy Capacit y for Semi-det erministic W ire-tap Channe ls, ” Pro ceedings of the 2007 IEEE Information T heory W ork shop on Information Theory for W ire- less Networks , Bergen , Norway , July 1 - 6, 2007. [2] L. Lai, H. El G amal and H. V . Poor , “ Authe nticat ion ov er Noisy Channel s, ” Proc eedings of the 45th Annual Allert on Confe renc e on Communicat ion, Contr ol and Computing , Monticel lo, IL, September 26 - 28, 2007. [3] L. Lai, H. El Gamal a nd H. V . Poor , “ Secrec y Capa city of the Wire tap Channel with Noisy Feed back, ” Pr oceedings of th e 45t h Annua l Allerton Conferen ce on Communicati on, Contr ol and Computing , Montice llo, IL, September 26 - 28, 2007. [4] Y . L iang, G. Kramer , H. V . Poor and S. Shamai, “Compound Wire- tap Channels, ” Proc eedings of the 45th Annual Allerton Confer ence on Communicat ion, Contr ol and Computing , Monticel lo, IL, September 26 - 28, 2007. [5] Y . Lian g and H. V . Poor,“ Generaliz ed Multiple Access Channe ls with Confidenti al Messages, ” Pro ceedings of the 2006 IEEE Internat ional Symposium on Information Theory , Seattle , W A, July 9 - 14, 2006. [6] Y . Liang and H. V . Poor , “Secrec y Capac ity Re gion of Binary and Gaussian Multip le Access Channe ls, ” Pr oceedi ngs of the 44t h Annual Allerton Conferen ce on Communicati on, Contr ol and Computing , Uni versit y of Illinois, Montice llo, IL, September 27 - 29, 2006. [7] Y . Liang and H. V . Poor , “Secure Communica tion over F ading Channel s, ” Proc eedings of the 44th Annual Allert on Confe renc e on Communicat ion, Contr ol and Computi ng , Univ ersity of Illinoi s, Mon- ticel lo, IL, September 27 - 29, 2006. [8] Y . Liang, H. V . Poor and S. Shamai, “Secrecy Capacit y Region of Fadi ng Broadcast Channels, ” Pr oceedings of the 2007 IEEE Interna- tional Symposi um on Information Theory , Nice, France, June 24 - 29, 2007. [9] Y . Liang, H. V . Poor and S. Shamai, “Secrecy Capacit y Region of Paral lel Broadca st Channels, ” Pr oceedin gs of the Sec ond W orksho p of the Center for Information Theory and Its Applicat ions , Uni versity of Califor nia - San Diego, La Jolla, CA, January 29 - February 2, 2007. [10] Y . L iang, A. Somekh-Baruc h, H. V . Poor, S. Shamai and S. V e rd ´ u, “The Cogniti ve Interferenc e Channe l with Confident ial Messages, ” Pr oceedin gs of the 45th Annual Allerton Confer ence on Communi- cation, Contr ol and Computing , Monticello, IL, September 26 - 28, 2007. [11] R. Liu, Y . Liang, H. V . Poor and P . Spasoj ev ic, “Secure Nested Codes for T ype II Wiret ap Channels, ” P r oceedi ngs of the 2007 IEEE Informatio n Theory W orkshop on F r ontier s in Coding Theory , Lake T ahoe, CA, September 2 - 6, 2007. [12] R. Liu and H. V . Poor , “Multiple Antenna Secure Broadcast over W ireless Networks, ” Proce edings of the Fir st Internationa l W orkshop on Informat ion Theory for Sensor Networks (WITS 2007) , Santa Fe, NM, June 18 - 20, 2007. [13] X . T ang, R. Liu, P . Spasoje vic and H. V . Poor , “Multipl e Access Channel s with Gene ralized Feedba ck and Confidential Message s, ” Pr oceedin gs of the 2007 IEEE Information The ory W orkshop on F ront iers in Coding Theory , Lake T ahoe, CA, Septe mber 2 - 6, 2007.
Original Paper
Loading high-quality paper...
Comments & Academic Discussion
Loading comments...
Leave a Comment