Secure identification under passive eavesdroppers and active jamming attacks

H Boche, C Deppe - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
IEEE Transactions on Information Forensics and Security, 2018ieeexplore.ieee.org
In next-generation connectivity systems, which rely on robust and low-latency information
exchange, there exists communication tasks in which the Ahlswede/Dueck identification
scheme is much more efficient than Shannon's transmission scheme. We concentrate on the
arbitrarily varying wiretap channel (AVWC) that models jamming attacks. We provide a
coding scheme for secure identification and determine the secrecy capacity of the AVWC.
Furthermore, we analyze important properties of this capacity function, eg, continuity and …
In next-generation connectivity systems, which rely on robust and low-latency information exchange, there exists communication tasks in which the Ahlswede/Dueck identification scheme is much more efficient than Shannon's transmission scheme. We concentrate on the arbitrarily varying wiretap channel (AVWC) that models jamming attacks. We provide a coding scheme for secure identification and determine the secrecy capacity of the AVWC. Furthermore, we analyze important properties of this capacity function, e.g., continuity and super-additivity. These properties are important for the design of robust secure communication design and for the optimization of the medium access control.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果