Opportunistic Secrecy with a Strict Delay Constraint

Reading time: 6 minute
...

📝 Original Info

  • Title: Opportunistic Secrecy with a Strict Delay Constraint
  • ArXiv ID: 0907.3341
  • Date: 2016-11-17
  • Authors: Researchers from original ArXiv paper

📝 Abstract

We investigate the delay limited secrecy capacity of the flat fading channel under two different assumptions on the available transmitter channel state information (CSI). The first scenario assumes perfect prior knowledge of both the main and eavesdropper channel gains. Here, upper and lower bounds on the delay limited secrecy capacity are derived, and shown to be tight in the high signal-to-noise ratio (SNR) regime. In the second scenario, only the main channel CSI is assumed to be available at the transmitter where, remarkably, we establish the achievability of a non-zero delay-limited secure rate, for a wide class of channel distributions, with a high probability. In the two cases, our achievability arguments are based on a novel two-stage key-sharing approach that overcomes the secrecy outage phenomenon observed in earlier works.

💡 Deep Analysis

Deep Dive into Opportunistic Secrecy with a Strict Delay Constraint.

We investigate the delay limited secrecy capacity of the flat fading channel under two different assumptions on the available transmitter channel state information (CSI). The first scenario assumes perfect prior knowledge of both the main and eavesdropper channel gains. Here, upper and lower bounds on the delay limited secrecy capacity are derived, and shown to be tight in the high signal-to-noise ratio (SNR) regime. In the second scenario, only the main channel CSI is assumed to be available at the transmitter where, remarkably, we establish the achievability of a non-zero delay-limited secure rate, for a wide class of channel distributions, with a high probability. In the two cases, our achievability arguments are based on a novel two-stage key-sharing approach that overcomes the secrecy outage phenomenon observed in earlier works.

📄 Full Content

arXiv:0907.3341v1 [cs.IT] 20 Jul 2009 1 Opportunistic Secrecy with a Strict Delay Constraint Karim Khalil, O. Ozan Koyluoglu, Hesham El Gamal, and Moustafa Youssef Abstract We investigate the delay limited secrecy capacity of the flat fading channel under two different assumptions on the available transmitter channel state information (CSI). The first scenario assumes perfect prior knowledge of both the main and eavesdropper channel gains. Here, upper and lower bounds on the delay limited secrecy capacity are derived, and shown to be tight in the high signal-to-noise ratio (SNR) regime. In the second scenario, only the main channel CSI is assumed to be available at the transmitter where, remarkably, we establish the achievability of a non-zero delay-limited secure rate, for a wide class of channel distributions, with a high probability. In the two cases, our achievability arguments are based on a novel two-stage key-sharing approach that overcomes the secrecy outage phenomenon observed in earlier works. I. INTRODUCTION Many wireless applications are limited by different forms of delay constraints. These applications range from the most basic voice communication to the more demanding multimedia streaming. However, due to its broadcast nature, the wireless channel is vulnerable to eavesdropping and other security threats. Therefore, techniques that satisfy both the delay limitation and the confidentiality requirement are of definite interest. This motivates our analysis of the fundamental (information theoretic) limits of secure communication over fading channels subject to strict deadlines. Recent works on information theoretic security have been largely inspired by the wire-tap channel model of Wyner [1]. In this seminal work, Wyner established the achievability of non-zero secrecy capacity when the wiretapper channel is a degraded version of the main one, by exploiting the noise to create an advantage for the legitimate receiver. More recently, the effect of fading on the secrecy capacity was studied in [2] in the ergodic setting. The main insight offered by this work is the achievability of a non-zero secrecy capacity, by opportunistically This work is submitted to the IEEE Transactions on Information Theory. Karim Khalil and Moustafa Youssef are with the Wireless Intelligent Networks Center (WINC), Nile University, Cairo, Egypt. Email: {kareem.makarem,mayoussef}@nileu.edu.eg. O. Ozan Koyluoglu and Hesham El Gamal are with the Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH 43210 USA. Email: {koyluogo,helgamal}@ece.osu.edu. This work is supported in part by an NPRP grant from the QNRF, the Egyptian NTRA, and the National Science Foundation (NSF). The material in this paper was presented in part at the IEEE International Symposium on Information Theory, Seoul, Korea in July 2009. October 30, 2018 DRAFT 2 exploiting the multi-path channel fluctuations, even when the eavesdropper channel is better than the legitimate one on the average. On the other side, delay limited transmission over fading channels has been well studied in different network settings and using various traffic models. For example, in [3], the delay limited capacity notion was introduced and the optimal power control policies were characterized in several interesting scenarios. In [4], the strict delay limitation of [3] was relaxed by allowing for buffering the packets at the transmitter. In this setup, the asymptotic behavior of the power-delay trade-off curve was characterized yielding valuable insights on the structure of the optimal resource allocation strategies [4]. More recently, the scheduling problem of data transmission over a finite delay horizon assuming perfect CSI was considered in [5]. Our work can be viewed as a generalization of [3] whereby a secrecy constraint is imposed on the problem. The delay limited transmission of secure data over fading channels was considered previously in [6]. In that work, the authors attempted to send the secure information using binning techniques inspired by the wiretap channel results. The drawback of this approach is that it fails to secure the information in the particular instants where the eavesdropper channel gain is larger than that of the main channel. This results in the so-called secrecy outage phenomenon (as defined in [6]). Unfortunately, in the delay limited setting, the secrecy outage can not be made to vanish by increasing the transmission power, since it does not offer a relative advantage to the legitimate receiver, leading to the conclusion that the delay limited secure rate achieved by this approach is equal to zero for most channel distributions of interest [6]. This obstacle is overcome by our two-stage approach. Here, the delay sensitive data is secured via Vernam’s one time pad approach [7] (see also [8]) using a private key, which was shared secretly by the two legitimate nodes during previous transmissions. Since the key packets are

…(Full text truncated)…

📸 Image Gallery

cover.png page_2.webp page_3.webp

Reference

This content is AI-processed based on ArXiv data.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut