Digitale Kommunikationssysteme


Information Theoretic Security


 

 


 

Beschreibung


The central question to which this topic is addressed is whether it is possible to transmit a signal/message in a way that makes it impossible for a third party to ‘eves-drop’. In the case of mobile communication systems, where there is a signal transmitter which transmits a coded message and a signal receiver, which then decodes and interprets that message, the main focus would be the optimization of the transmission strategy so as to retain the ultimate secrecy of the message i.e. prevent the signal content from being intercepted and decoded by a third party.
Measures to improve information theoretic security lie in methods such as ‘Wyner’s Degraded Wire-Tap Channel’ which ensures that even if a third party were able to intercept the transmitted message, he only receives a degraded or noisy signal, thereby preventing him from decoding it. Another example of a counter-measure to ‘eves-dropping’ is end-to-end cryptography where the message is assigned a key only known by the signal transmitter and receiver and without which a third party is unable to decipher the transmitted message.

 

 


 

Relevante Arbeiten


A. D. Wyner
The Wire-Tap Channel
Bell Syst. Tech. J., vol. 54, pp. 1355–1387, Oct. 1975.

Y. Liang, H. V. Poor, S. Shamai (Shitz)
Information Theoretic Security
Foundations and Trends in Communications and Information Theory, vol. 5, no. 4-5, pp. 355–580, 2009.

E. A. Jorswieck, A. Wolf, S. Gerbracht
Secrecy on the Physical Layer in Wireless Networks
Trends in Telecommunications Technologies, pp. 413–435, Mar. 2010.

I. Csiszár, J. Körner
Broadcast Channels with Confidential Messages
IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339–348, May 1978.

 

 


 

 

Our contributions


Author / Editor / Organization Titel Year Download / Bibtex
2017
1 H. Vogt , Z. Awan , A. Sezgin On the Capacity Region of Deterministic Strong IC with Multicast and Secure Unicast Messages Link
BibTeX
2016
1 H. Vogt , Z. Awan , A. Sezgin On deterministic IC with common and private message under security constraints Link
BibTeX
2 Christian Zenger , H. Vogt , Jan Zimmer , A. Sezgin , Christof Paar The Passive Eavesdropper Affects My Channel: Secret-Key Rates under Real-World Conditions Link
BibTeX
3 Z. Awan , Abdellatif Zaidi , A. Sezgin On SDoF of Multi-Receiver Wiretap Channel With Alternating CSIT Download
BibTeX
4 Z. Awan , Abdellatif Zaidi , A. Sezgin On SDoF of Multi-Receiver Wiretap Channel With Alternating CSIT Link
BibTeX
5 Y. Chen , O. Ozan Koyluoglu , A. Sezgin Individual Secrecy for Broadcast Channels with Receiver Side Information Link
BibTeX
6 Z. Awan , A. Sezgin MISO Wiretap Channel With Strictly Causal CSI: A Topological Viewpoint
7 H. Vogt , K. Ramm , A. Sezgin Practical Secret-Key Generation by Full-Duplex Nodes with Residual Self-Interference BibTeX
8 H. Vogt , Z. Awan , A. Sezgin Full-Duplex vs. Half-Duplex Secret-Key Generation BibTeX
2015
1 Y. Chen , O Ozan Koyluoglu , A. Sezgin Individual Secrecy for the Broadcast Channel Link
BibTeX
2 H. Vogt , A. Sezgin Full-duplex vs. half-duplex secret-key generation BibTeX
3 E.A. Jorswieck , S. Tomasin , A. Sezgin Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing BibTeX
4 Z. Awan , A. Sezgin Interplay Between Delayed CSIT and Network Topology for Secure MISO BC BibTeX
5 Y. Chen , O. Ozan Koyluoglu , A. Sezgin On the individual secrecy rate region for the degraded broadcast channel BibTeX
6 Y. Chen , O. Ozan Koyluoglu , A. Sezgin On the Individual Secrecy for Gaussian Broadcast Channels with Receiver Side Information Download
BibTeX
7 Z. Awan , A. Sezgin Fundamental Limits of Caching in D2D Networks With Secure Delivery Download
BibTeX
8 Z. Awan , A. Sezgin On MISO Wiretap Channel with Delayed CSIT and Alternating Topology Download
BibTeX
2014
1 Chao Qi , Y. Chen , A. J. Han Vinck , Xiaohu Tang Binary Transmissions over Gaussian Wiretap Channel under Soft/Hard Decision Decoding Download
BibTeX
2 Z. Awan , Abdellatif Zaidi , A. Sezgin Achievable Secure Degrees of Freedom of MISO Broadcast Channel With Alternating CSIT Download
BibTeX
3 Y. Chen , O. Ozan Koyluoglu , A. Sezgin On the Achievable Individual-Secrecy Rate Region for Broadcast Channels with Receiver Side Information Download
BibTeX
4 Y. Chen , H. Vogt , A. Sezgin Gaussian Wiretap Channels with Correlated Sources: Approaching Capacity Region Within a Constant Gap Download
BibTeX
5 H. Vogt , A. Sezgin Secret-key generation from wireless channels: Mind the reflections BibTeX
6 Y. Chen , Ning Cai , A. Sezgin Wiretap Channel with Correlated Sources Download
BibTeX
7 O. Ozan Koyluoglu , Y. Chen , A. Sezgin Broadcast Channel with Receiver Side Information: Achieving Individual Secrecy Link
BibTeX
2011
1 R. Wyrembelski , A. Sezgin , H. Boche Secrecy in Broadcast Channels with Receiver Side Information BibTeX
2010
1 S. Al-Sayed , A. Sezgin Secrecy in Gaussian MIMO Bidirectional Broadcast Wiretap Channels: Transmit Strategies BibTeX