Half-Duplex Active Eavesdropping in Fast-Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme

@article{Amariucai2010HalfDuplexAE,
  title={Half-Duplex Active Eavesdropping in Fast-Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme},
  author={George T. Amariucai and Shuangqing Wei},
  journal={IEEE Transactions on Information Theory},
  year={2010},
  volume={58},
  pages={4660-4677}
}
In this paper, we study the problem of half-duplex active eavesdropping in fast-fading channels. The active eavesdropper is a more powerful adversary than the classical eavesdropper. It can choose between two functional modes: eavesdropping the transmission between the legitimate parties (Ex mode), and jamming it (Jx mode)-the active eavesdropper cannot function in full duplex mode. We consider a conservative scenario, when the active eavesdropper can choose its strategy based on the legitimate… 
Active eavesdropping in fast fading channels: A Block-Markov Wyner secrecy encoding scheme
TLDR
A novel encoding scheme, based on very limited and unprotected feedback - the Block-Markov Wyner (BMW) encoding scheme - which outperforms any schemes currently available.
Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary
TLDR
A robust resource allocation framework to improve the physical layer security in the presence of an active eavesdropper and takes advantage of FD capability of the receiver to send jamming signals against the eavesdroppers, which eliminates the need for external helpers.
Secure Robust Resource Allocation in the Presence of Active Eavesdroppers Using Full-Duplex Receivers
TLDR
The proposed self-protection scheme eliminates the need for external helpers and provides system robustness and robustness against channel state information uncertainty is investigated, and optimal power allocation is obtained under legitimate transmitter power constraint in the presence of an active eavesdropper.
On the Secrecy Capacity of Block Fading Channels With a Hybrid Adversary
We consider a block fading wiretap channel, where a transmitter attempts to send messages securely to a receiver in the presence of a hybrid half-duplex adversary, which arbitrarily decides to either
Pilot Contamination for Active Eavesdropping
TLDR
A new security attack is derived from the pilot contamination phenomenon, which targets at systems using reverse training to obtain the CSI at the transmitter for precoder design to improve the eavesdropping performance of an active eavesdropper.
Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper
This paper investigates reliable and covert transmission strategies in a multiple-input multiple-output (MIMO) wiretap channel with a transmitter, receiver and an adversarial wiretapper, each
The Gaussian multiple access wiretap channel when the eavesdropper can arbitrarily jam
  • Rémi A. Chou, A. Yener
  • Computer Science
    2017 IEEE International Symposium on Information Theory (ISIT)
  • 2017
TLDR
This work studies the Gaussian multiple access channel in presence of an adversary, who is simultaneously able to eavesdrop and jam, i.e., an active wiretapper, and derives inner and outer bounds on the secrecy rate region of the model.
Jamming-Assisted Eavesdropping Over Parallel Fading Channels
TLDR
This paper proposes cognitive jamming for the monitor to change the suspicious link’s long-term belief on the parallel channels’ distributions and thereby induce it to transmit more likely over a smaller subset of unjammed channels with a lower transmission rate.
Secrecy Outage of Proactive Relay Selection by Eavesdropper
TLDR
It is shown that the relay selection by the proactive eavesdropper is most detrimental to the system as not only the SOP increases with the increase in the number of relays, but its diversity also remains unchanged.
Guaranteeing secure communication in OFDM network with an active eavesdropper
  • M. Javan
  • Computer Science
    7'th International Symposium on Telecommunications (IST'2014)
  • 2014
TLDR
The problem of resource allocation for OFDM user to guarantee secure communication is considered and the proposed scheme, assuming that attacker chooses between jamming and eavesdropping based on the achievable rate of user in each case to minimize the secrecy rate of legitimate user, is considered.
...
...

References

SHOWING 1-10 OF 35 REFERENCES
Active eavesdropping in fast fading channels: A Block-Markov Wyner secrecy encoding scheme
TLDR
A novel encoding scheme, based on very limited and unprotected feedback - the Block-Markov Wyner (BMW) encoding scheme - which outperforms any schemes currently available.
Active eavesdropping in fast fading channels
TLDR
It is shown that, even under these most optimistic assumptions, an active eavesdropper can induce moderate to severe degradation of the achievable secrecy rate.
On the Secrecy Capacity of Fading Channels
TLDR
The positive impact of fading on the secrecy capacity is revealed and the critical role of rate adaptation, based on the main channel CSI, in facilitating secure communications over slow fading channels is established.
Opportunistic Secrecy with a Strict Delay Constraint
TLDR
This work establishes the achievability of a non-zero delay-limited secure rate, for a wide class of channel distributions, with a high probability, in the high signal-to-noise ratio (SNR) regime.
The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming
TLDR
Overall, the results show that in multiple-access scenarios, users can help each other to collectively achieve positive secrecy rates, and cooperation among users can be invaluable for achieving secrecy for the system.
Secure Broadcasting Over Fading Channels
TLDR
It is shown that, using a suitable binning strategy, a common message can be reliably and securely transmitted at a rate independent of the number of receivers, and that a simple opportunistic transmission strategy is optimal for the reliable and secure transmission of independent messages in the limit of large number of receiver.
Secret Communication with a Fading Eavesdropper Channel
TLDR
It is shown that even if the main channel channel gain is arbitrarily worse than the eavesdropper's average channel gain, positive secrecy rate can still be achieved with artificial noise injection and a burst signaling strategy.
The Gaussian Multiple Access Wire-Tap Channel
We consider the Gaussian multiple access wire-tap channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and informed wire-tapper
The wire-tap channel
  • A. Wyner
  • Computer Science
    The Bell System Technical Journal
  • 1975
TLDR
This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Capacity of multiple access channels with correlated jamming
  • S. Shafiee, S. Ulukus
  • Computer Science
    MILCOM 2005 - 2005 IEEE Military Communications Conference
  • 2005
We investigate the behavior of two users and one jammer in an AWGN channel with and without fading when they participate in a non-cooperative zero-sum game, with the channel's input/output mutual
...
...