Opportunistic Secrecy with a Strict Delay Constraint

We investigate the delay limited secrecy capacity of the flat fading channel under two different assumptions on the available transmitter channel state information (CSI). The first scenario assumes perfect prior knowledge of both the main and eavesdropper channel gains. Here, upper and lower bounds on the delay limited secrecy capacity are derived, and shown to be tight in the high signal-to-noise ratio (SNR) regime. In the second scenario, only the main channel CSI is assumed to be available at the transmitter where, remarkably, we establish the achievability of a non-zero delay-limited secure rate, for a wide class of channel distributions, with a high probability. In the two cases, our achievability arguments are based on a novel two-stage key-sharing approach that overcomes the secrecy outage phenomenon observed in earlier works.

[1]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[2]  Aylin Yener,et al.  The role of channel states in secret key generation , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[3]  Vinod M. Prabhakaran,et al.  Secrecy via sources and channels — A secret key - Secret message rate tradeoff region , 2008, 2008 IEEE International Symposium on Information Theory.

[4]  Giuseppe Caire,et al.  Optimum power control over fading channels , 1999, IEEE Trans. Inf. Theory.

[5]  Moustafa Youssef,et al.  ARQ secrecy: From theory to practice , 2009, 2009 IEEE Information Theory Workshop.

[6]  A. Agrawala,et al.  On the Optimality of WLAN Location Determination Systems , 2003 .

[7]  Ness B. Shroff,et al.  Joint Power and Secret Key Queue Management for Delay Limited Secure Communication , 2010, 2010 Proceedings IEEE INFOCOM.

[8]  George T. Amariucai,et al.  Active eavesdropping in fast fading channels: A Block-Markov Wyner secrecy encoding scheme , 2010, ISIT.

[9]  Shlomo Shamai,et al.  Information theoretic considerations for cellular mobile radio , 1994 .

[10]  Rudi van Drunen,et al.  Wireless Networks , 2007, USENIX Annual Technical Conference.

[11]  Thomas M. Cover,et al.  Elements of information theory (2. ed.) , 2006 .

[12]  Thomas M. Cover,et al.  Elements of Information Theory: Cover/Elements of Information Theory, Second Edition , 2005 .

[13]  Mohamed F. Younis,et al.  Overlapping Multihop Clustering for Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[14]  David Tse,et al.  Multiaccess Fading Channels-Part II: Delay-Limited Capacities , 1998, IEEE Trans. Inf. Theory.

[15]  Juyul Lee,et al.  Energy-efficient scheduling of delay constrained traffic over fading channels , 2008, 2008 IEEE International Symposium on Information Theory.

[16]  Sriram Vishwanath,et al.  State amplification under masking constraints , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[17]  Daniel Gatica-Perez,et al.  International Conference on Mobile and Ubiquitous Multimedia , 2015 .

[18]  Reem Elkhouly,et al.  POSTER IPS: A Ubiquitous Indoor Positioning System , 2011, MobiQuitous.

[19]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[20]  Moustafa Youssef,et al.  A Probabilistic Clustering-Based Indoor Location Determination System , 2002 .

[21]  Gregory W. Wornell,et al.  Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.

[22]  Moustafa Youssef,et al.  Energy-Aware TDMA-Based MAC for Sensor Networks , 2002 .

[23]  Marco Gruteser Indoor localization: ready for primetime? , 2013, MobiCom.

[24]  Michail Matthaiou,et al.  International Wireless Communications and Mobile Computing Conference , 2008 .

[25]  Moustafa Youssef,et al.  Analyzing the Point Coordination Function of the IEEE 802.11 WLAN Protocol using a Systems of Commun , 2002 .

[26]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[27]  Moustafa Youssef,et al.  Handling samples correlation in the Horus system , 2004, IEEE INFOCOM 2004.

[28]  Moustafa Youssef,et al.  On the delay limited secrecy capacity of fading channels , 2009, 2009 IEEE International Symposium on Information Theory.

[29]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[30]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[31]  Moustafa Youssef,et al.  Automatic Generation of Radio Maps for Localization Systems , 2010, MobiQuitous.

[32]  Suhas N. Diggavi,et al.  Secret-Key Agreement With Channel State Information at the Transmitter , 2010, IEEE Transactions on Information Forensics and Security.

[33]  G. S. Vernam,et al.  Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications , 1926, Transactions of the American Institute of Electrical Engineers.

[34]  Suhas N. Diggavi,et al.  Secret-key generation with correlated sources and noisy channels , 2008, 2008 IEEE International Symposium on Information Theory.