An Absolute Secure Wire-Line Communication Method Against Wiretapper

This letter proposes a security method for wire-line point-to-point communication based on the information theory. The proposed system replaces the conventional receiver by a full-duplex node which can, not only, receive the confidential signal, but also deliver artificial noise to impair the channel of wiretapper observation between the two legitimate partners. The power ratio of the signal to the artificial noise is a key factor for guaranteeing absolute secure communication. The theoretical work is carried out in the model of physical layer security on the assumption that the wiretapper can perform the optimum detection, including with colluding structure. Numerical results are presented for demonstrating the effectiveness of the proposed approach.

[1]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[2]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[3]  Mounir Ghogho,et al.  Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.

[4]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[5]  Sachin Katti,et al.  Full duplex radios , 2013, SIGCOMM.

[6]  Chen Wei,et al.  A survey on device-independent quantum communications , 2013, China Communications.

[7]  Hyuncheol Park,et al.  A Spatial-Domain Joint-Nulling Method of Self-Interference in Full-Duplex Relays , 2012, IEEE Communications Letters.

[8]  H. Wang,et al.  Reconstructing Synchronous Scrambler With Robust Detection Capability in the Presence of Noise , 2015, IEEE Transactions on Information Forensics and Security.

[9]  William Stallings,et al.  Data and Computer Communications , 1985 .

[10]  Moe Z. Win,et al.  Wireless physical-layer security: The case of colluding eavesdroppers , 2009, 2009 IEEE International Symposium on Information Theory.

[11]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[12]  Sennur Ulukus,et al.  The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.