Secure Identification for Gaussian Channels

New applications in modern communications are demanding robust and ultra-reliable low latency information exchange such as machine-to-machine and human-to-machine communications. For many of these applications, the identification approach of Ahlswede and Dueck is much more efficient than the classical transmission scheme proposed by Shannon. Previous studies concentrate mainly on identification over discrete channels. We focus on Gaussian channels for their known practical relevance. We deal with secure identification over Gaussian channels. In particular, we provide a suitable coding scheme for the Gaussian wiretap channel (GWC) and determine the corresponding secure identification capacity.

[1]  Holger Boche,et al.  Secrecy results for compound wiretap channels , 2011, Probl. Inf. Transm..

[2]  H. S. Varsha,et al.  The tactile Internet , 2017, 2017 International Conference on Innovative Mechanisms for Industry Applications (ICIMIA).

[3]  Holger Boche,et al.  Secure Storage for Identification; Random Resources and Privacy Leakage , 2019, IEEE Transactions on Information Forensics and Security.

[4]  Himanshu Tyagi,et al.  Universal Hashing for Information-Theoretic Security , 2014, Proceedings of the IEEE.

[5]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[6]  Holger Boche,et al.  Secure Identification for Wiretap Channels; Robustness, Super-Additivity and Continuity , 2018, IEEE Transactions on Information Forensics and Security.

[7]  Rudolf Ahlswede,et al.  New directions in the theory of identification via channels , 1995, IEEE Trans. Inf. Theory.

[8]  Rudolf Ahlswede,et al.  Identification via channels , 1989, IEEE Trans. Inf. Theory.

[9]  M. V. Burnashev On method of "types", approximation of output measures and ID-capacity for channels with continuous alphabets , 1999, Proceedings of the 1999 IEEE Information Theory and Communications Workshop (Cat. No. 99EX253).

[10]  Moritz Wiese,et al.  Semantic Security and the Second-Largest Eigenvalue of Biregular Graphs , 2018, ArXiv.

[11]  Hiroki Koga,et al.  Information-Spectrum Methods in Information Theory , 2002 .

[12]  Holger Boche,et al.  Secure Identification Under Passive Eavesdroppers and Active Jamming Attacks , 2019, IEEE Transactions on Information Forensics and Security.