Go to:
Logótipo
Você está em: Start » Publications » View » Wireless Information-Theoretic Security
Publication

Wireless Information-Theoretic Security

Title
Wireless Information-Theoretic Security
Type
Article in International Scientific Journal
Year
2008
Authors
M. Bloch
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
M. R. D. Rodrigues
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
S. W. McLaughlin
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Journal
Vol. 54 No. 6
Pages: 2515-2534
ISSN: 0018-9448
Publisher: IEEE
Indexing
Publicação em ISI Web of Science ISI Web of Science
INSPEC
COMPENDEX
Scientific classification
FOS: Engineering and technology > Electrical engineering, Electronic engineering, Information engineering
CORDIS: Technological sciences
Other information
Abstract (EN): This paper considers the transmission of confidential data over wireless channels. Based on an information-theoretic formulation of the problem, in which two legitimates partners communicate over a quasi-static fading channel and an eavesdropper observes their transmissions through a second independent quasi-static fading channel, the important role of fading is characterized in terms of average secure communication rates and outage probability. Based on the insights from this analysis, a practical secure communication protocol is developed, which uses a four-step procedure to ensure wireless information-theoretic security: (i) common randomness via opportunistic transmission, (ii) message reconciliation, (iii) common key generation via privacy amplification, and (iv) message protection with a secret key. A reconciliation procedure based on multilevel coding and optimized low-density parity-check (LDPC) codes is introduced, which allows to achieve communication rates close to the fundamental security limits in several relevant instances. Finally, a set of metrics for assessing average secure key generation rates is established, and it is shown that the protocol is effective in secure key renewal-even in the presence of imperfect channel state information
Language: English
Type (Professor's evaluation): Scientific
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same scientific areas

E3.1 – Relatório: “Interfaces: Identificação e caracterização de necessidades/oportunidades de integração/interoperabilidade” (2021)
Technical Report
Hipólito Sousa; Joaquim Moreira; Jorge Teixeira; José Ferreira; Yanh Ribeiro
Image Processing and Analysis in Biomechanics (2010)
Another Publication in an International Scientific Journal
João Manuel R. da Silva Tavares; Renato M. Natal Jorge

See all (99)

Of the same journal

The Commitment Capacity of the Gaussian Channel is infinite (2008)
Article in International Scientific Journal
Anderson C. A. Nascimento; João Barros; Stefan Skludarek; Hideki Ima
On the Weight Hierarchy of Codes Coming From Semigroups With Two Generators (2014)
Article in International Scientific Journal
delgado, m; farran, ji; garcia-sanchez, pa; llena, d
On the derivation of the exact, closed-form capacity formulas for receiver-sided correlated MIMO channels (2008)
Article in International Scientific Journal
Pedro Manuel Martins Marques; Sílvio Almeida Abrantes Moreira
On Coding for Delay - Network Coding for Time Division Duplexing (2012)
Article in International Scientific Journal
Daniel E. Lucani; Muriel Médard; Milica Stojanovic
Network Information Flow with Correlated Sources (2006)
Article in International Scientific Journal
João Barros; S. D. Servetto

See all (9)

Recommend this page Top
Copyright 1996-2024 © Faculdade de Medicina da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z  I Guest Book
Page created on: 2024-11-05 at 23:42:20
Acceptable Use Policy | Data Protection Policy | Complaint Portal | Política de Captação e Difusão da Imagem Pessoal em Suporte Digital