Loading...

Secrecy Rates in Wiretap Channels

Salimi, Somayeh | 2011

567 Viewed
  1. Type of Document: Ph.D. Dissertation
  2. Language: Farsi
  3. Document No: 42115 (05)
  4. University: Sharif University of Technology
  5. Department: Electrical Engineering
  6. Advisor(s): Salmasizadeh, Mahmoud; Aref, Mohammad Reza
  7. Abstract:
  8. Security has been considered from the information theoretic point of view in different channels such as broadcast, multiple access and relay channels. Due to application of these channels in modern networks such as wireless, sensor and Ad-hoc networks, information theoretic security arguments especially wiretapping, has major significance in these networks. With regard to necessity of confidentiality protection in modern telecommunication services, security from the information theoretic point of view should be considered as well as capacity and achievable rate region considerations in these networks. In this thesis, first, a survey of basic works in the subjects of secrecy capacity and secret key capacity is given. Afterward, leakage rates in source coding and obtaining equivocation rates are discussed and a generalized scenario for secure distributed source coding is presented that includes the previous scenarios and obviates their defects. In this scenario, it is assumed that there is no secure channel and the wiretapper has access to source observations correlated with the others. In this setup, achievable rate-equivocation tuples are investigated and, inner and outer bounds are obtained. Then, secret key agreement is introduced in a novel scenario in which a user can be both a legal user and an eavesdropper. In the basic scenario, each of users 1 and 2 intends to share a secret key with user 3 while keeping it concealed from each other. In this framework, the source and channel common randomness can be exploited for generating and sharing secret keys. The public channel is considered in two situations; forward (from users 1 and 2 to user 3) and backward (from user 3 to users 1 and 2). In the source model of the mentioned scenario, the three users have access to correlated observations. In both forward and backward situations, the inner and outer bounds of the secret key capacity region are investigated and in some special cases, the secret key capacity region is obtained. In the channel model of the secret key agreement scenario, there is a generalized multiple access channel from users 1 and 2 as transmitters to user 3 as the receiver. In both forward and backward situations of the channel model, the inner and outer bounds of the secret key capacity region are presented which result in the secret key capacity region in some special cases. The effect of using the public channel is discussed through the binary and Gaussian examples in the forward and backward situations
  9. Keywords:
  10. Wiretap Channel ; Security Cpacity ; Secure Key Agreement ; Information Theoretic Security ; Multiple Access Relay Channel (MARC) ; Secure Source Coding

 Digital Object List

 Bookmark

No TOC