Capacity results and super-activation for wiretap channels with active wiretappers

@article{Boche2013CapacityRA,
  title={Capacity results and super-activation for wiretap channels with active wiretappers},
  author={Holger Boche and Rafael F. Schaefer},
  journal={IEEE Transactions on Information Forensics and Security},
  year={2013},
  volume={8},
  pages={1482-1496}
}
The classical wiretap channel models secure communication in the presence of a nonlegitimate wiretapper who has to be kept ignorant. Traditionally, the wiretapper is passive in the sense that he only tries to eavesdrop the communication using his received channel output. In this paper, more powerful active wiretappers are studied. In addition to eavesdropping, these wiretappers are able to influence the communication conditions of all users by controlling the corresponding channel states. Since… CONTINUE READING

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 29 CITATIONS

Secure Communication Under Channel Uncertainty and Adversarial Attacks

  • Proceedings of the IEEE
  • 2015
VIEW 6 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

The Arbitrarily Varying Wiretap Channel—Secret Randomness, Stability, and Super-Activation

  • IEEE Transactions on Information Theory
  • 2015
VIEW 10 EXCERPTS
CITES METHODS, RESULTS & BACKGROUND
HIGHLY INFLUENCED

A Model for Adversarial Wiretap Channel

VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Detectability of Denial-of-service Attacks on Communication Systems

  • ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

The Arbitrarily Varying Channel Under Constraints With Side Information at the Encoder

  • IEEE Transactions on Information Theory
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

Identification over Channels with Feedback: Discontinuity Behavior and Super-Activation

  • 2018 IEEE International Symposium on Information Theory (ISIT)
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

Performance Analysis of Secure Communications Over Dual Correlated Rician Fading Channels

  • IEEE Transactions on Communications
  • 2018
VIEW 1 EXCERPT
CITES METHODS

Secrecy Capacity Under List Decoding For A Channel with A Passive Eavesdropper and an Active Jammer

  • 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

The Arbitrarily Varying Relay Channel

  • 2018 IEEE International Symposium on Information Theory (ISIT)
  • 2018