Wireless physical-layer security: The challenges ahead

The issues of privacy and security in wireless communication networks have taken on an increasingly important role as these networks continue to flourish worldwide. Traditionally, security is viewed as an independent feature addressed above the physical-layer and all widely used cryptographic protocols are designed and implemented assuming the physical-layer has already been established and provides an error free link. However, with the emergence of ad-hoc and decentralized networks, higher-layer techniques, such as encryption, are complex and hard to be implemented. Therefore, there has been a recent attention on studying the fundamental ability of the physical-layer to provide secure wireless communications. In this contribution, we discuss the challenges ahead in implementing wireless physical-layer security.

[1]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[2]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.

[3]  A. Robert Calderbank,et al.  Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.

[4]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[5]  Shlomo Shamai,et al.  Secured Communication over Frequency-Selective Fading Channels: A Practical Vandermonde Precoding , 2009, EURASIP J. Wirel. Commun. Netw..

[6]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[7]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[8]  Kai-Kit Wong,et al.  Three-receiver broadcast channel with confidential messages , 2008 .

[9]  Shlomo Shamai,et al.  An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009, 2009 IEEE International Symposium on Information Theory.

[10]  Roy D. Yates,et al.  Secrecy capacity of independent parallel channels , 2009 .

[11]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[12]  Amitabh Mishra Security and Quality of Service in Ad Hoc Wireless Networks , 2008 .

[13]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[14]  Amir K. Khandani,et al.  Secrecy capacity region of Gaussian broadcast channel , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[15]  Richard E. Blahut,et al.  Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[16]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[17]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[18]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[19]  Ami Wiesel,et al.  On the Gaussian MIMO Wiretap Channel , 2007, 2007 IEEE International Symposium on Information Theory.

[20]  Amir K. Khandani,et al.  The Secrecy Rate Region of the Broadcast Channel , 2008, ArXiv.

[21]  Gregory W. Wornell,et al.  Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.

[22]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[23]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[24]  Sennur Ulukus,et al.  Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper , 2009, EURASIP J. Wirel. Commun. Netw..

[25]  Shlomo Shamai,et al.  MIMO Gaussian broadcast channels with confidential messages , 2009, 2009 IEEE International Symposium on Information Theory.

[26]  Zixiang Xiong,et al.  Compression of binary sources with side information at the decoder using LDPC codes , 2002, IEEE Communications Letters.

[27]  David Tse,et al.  Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels , 2007 .

[28]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[29]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[30]  M. Debbah,et al.  Mobile Flexible Networks: The challenges ahead , 2008, 2008 International Conference on Advanced Technologies for Communications.

[31]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[32]  H. Vincent Poor,et al.  Nested codes for secure transmission , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.

[33]  Gregory W. Wornell,et al.  The MIMOME Channel , 2007, ArXiv.

[34]  Sennur Ulukus,et al.  The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.

[35]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[36]  Yingbin Liang,et al.  MIMO broadcasting with common, private and confidential messages , 2008, 2008 International Symposium on Information Theory and Its Applications.

[37]  David Tse,et al.  Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.

[38]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[39]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[40]  R. A. McDonald,et al.  Noiseless Coding of Correlated Information Sources , 1973 .

[41]  Xiaodai Dong,et al.  Secure Key Generation and Agreement in UWB Communication , 2009 .

[42]  Vinod M. Prabhakaran,et al.  The secrecy capacity of a class of parallel Gaussian compound wiretap channels , 2008, 2008 IEEE International Symposium on Information Theory.

[43]  Renato Renner,et al.  New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction , 2003, EUROCRYPT.