Abstract

In this paper we propose a two-way protocol of physical layer security using the method of privacy amplification against eavesdroppers. First we justify our proposed protocol by analyzing the physical layer security provided by the classic wiretap channel model (i.e. one-way protocol). In the Gaussian channels, the classic one-way protocol requires Eve's channel to be degraded w.r.t. Bob's channel. However, this channel degradation condition depends on Eve's location and whether Eve's receiving antenna is more powerful than Bob's. To overcome this limitation, we introduce a two-way protocol inspired in IEEE TIT (1993) that eliminates the channel degradation condition. In the proposed two-way protocol, on a first phase, via Gaussian channel, Bob sends randomness to Alice, which is partially leaked to Eve. Then, on a second phase, Alice transmits information to Bob over a public noiseless channel. We derive the secrecy capacity of the two-way protocol when the channel to Eve is also Gaussian. We show that the capacity of the two-way protocol is always positive. We present numerical values of the capacities illustrating the gains obtained by our proposed protocol. We apply our result to simple yet realistic models of satellite communication channels.

Highlights

  • P HYSICAL layer security for wireless communications has become a major research topic in recent years because it does not need the computational assumption [1]–[3]

  • In this paper, inspired by Maurer’s idea, we propose a two-way protocol with Gaussian wiretap channel and public noiseless feedback, in which, the feedback channel is given as a public noiseless channel with discrete variable

  • We have introduced a two-way protocol for the BPSK modulation to overcome the limitations of the classic wiretap physical layer security protocol

Read more

Summary

INTRODUCTION

P HYSICAL layer security for wireless communications has become a major research topic in recent years because it does not need the computational assumption [1]–[3]. This paper assumes that the noise in the channel of the initial transmission from Bob to Alice is independent of the noise in that to Eve while the paper [29] considers the case when these two noises are correlated Under this assumption, unless the channel of the initial transmission to Eve is noiseless, this protocol always has positive secure transmission rate regardless Eve’s and Bob’s spatial locations. Contribution 2) Our novel two-way protocol greatly outperforms state-of-the-art one-way protocol because our protocol shows always positive secrecy capacity independently of Eve’s location (i.e. it does not require channel degradation condition of one-way wiretap channel) This is our main technical result based on novel and rigorous information theoretical proof.

Signal and Channel Model
Secrecy Capacity With BPSK Modulation and Soft Decision
Secrecy Capacity With BPSK Modulation and Hard Decision
Protocol
Secrecy Capacity When Eve Uses Hard Decision
Secrecy Capacity When Eve Uses Soft Decision
OPTIMIZATION
APPLICATION TO REAL SATELLITE COMMUNICATION
CONCLUSIONS AND FURTHER IMPROVEMENTS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call