A Secrecy and Security Dilemma in OFDM Communications

Emerging wireless systems will need to address multiple, conflicting objectives: ensuring the secrecy of the communication secrecy (i.e., maximizing the un-eavesdropped throughput at the receiver), and ensuring the “security” of the communication (i.e., minimizing damage that might arise because of the possibility that there is leakage in communication). This problem presents a dilemma for system engineers since the optimal solution for one of objective might be not optimal for the other. This dilemma calls for a need for designing a trade-off solution for these objectives. In this paper, we propose the use of a Kalai-Smorodinsky bargaining solution between secrecy and security for OFDM-style communications, which allows one to select the security level of communication. In particular, this solution allows one to maintain the ratios of maximal gains for cooperative fulfilment of both objectives.

[1]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[2]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[3]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[4]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[5]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[6]  Meejoung Kim,et al.  Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas , 2017, Wirel. Networks.

[7]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[8]  H. Vincent Poor,et al.  Secure Communications over Fading Channels , 2007, ArXiv.

[9]  Andrey Garnaev,et al.  The eavesdropping and Jamming Dilemma in multi-channel communications , 2013, 2013 IEEE International Conference on Communications (ICC).

[10]  H. Vincent Poor,et al.  A Game Theoretic Analysis of Secret and Reliable Communication With Active and Passive Adversarial Modes , 2016, IEEE Transactions on Wireless Communications.

[11]  Xi Fang,et al.  Optimal transmission power control in the presence of a smart jammer , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[12]  Andrey Garnaev,et al.  To Eavesdrop or Jam, That is the Question , 2013, ADHOCNETS.

[13]  Qi Xiong,et al.  An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems , 2015, IEEE Transactions on Information Forensics and Security.

[14]  Roy D. Yates,et al.  Secret Communication with a Fading Eavesdropper Channel , 2007, 2007 IEEE International Symposium on Information Theory.

[15]  H. Vincent Poor,et al.  Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.

[16]  Andrey Garnaev,et al.  Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments , 2013 .

[17]  Reevana Balmahoon,et al.  Information leakage of heterogeneous encoded correlated sequences over an eavesdropped channel , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[18]  Sabrina Engelmann,et al.  Information Leakage Neutralization for the Multi-Antenna Non-Regenerative Relay-Assisted Multi-Carrier Interference Channel , 2012, IEEE Journal on Selected Areas in Communications.

[19]  Zhi Ding,et al.  Optimum Power Allocation against Information Leakage in Wireless Network , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[20]  K. J. Ray Liu,et al.  An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.

[21]  Andrey Garnaev,et al.  Secret Communication When the Eavesdropper Might Be an Active Adversary , 2014, MACOM.

[22]  Jianhua Ge,et al.  An Effective Secure Transmission Scheme for AF Relay Networks with Two-Hop Information Leakage , 2013, IEEE Communications Letters.

[23]  Walid Saad,et al.  Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[24]  E. Kalai,et al.  OTHER SOLUTIONS TO NASH'S BARGAINING PROBLEM , 1975 .

[25]  H. Vincent Poor,et al.  Incorporating Attack-Type Uncertainty Into Network Protection , 2014, IEEE Transactions on Information Forensics and Security.

[26]  Alagan Anpalagan,et al.  Strategic bargaining in wireless networks: basics, opportunities and challenges , 2014, IET Commun..

[27]  Andrey Garnaev,et al.  Anti-jamming Strategies: A Stochastic Game Approach , 2014, MONAMI.

[28]  Andrey Garnaev,et al.  One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious , 2015, IEEE Transactions on Information Forensics and Security.

[29]  Andrey Garnaev,et al.  A Bandwidth Monitoring Strategy Under Uncertainty of the Adversary’s Activity , 2016, IEEE Transactions on Information Forensics and Security.

[30]  Eitan Altman,et al.  Transmission Power Control Game with SINR as Objective Function , 2008, NET-COOP.

[31]  Mário S. Alvim,et al.  Measuring Information Leakage Using Generalized Gain Functions , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.