Physical-layer Security from Channel Resolvability
DOI: 10.23977/acss.2022.060107 | Downloads: 34 | Views: 843
Author(s)
Jiajia Wu 1, Ming Xu 1
Affiliation(s)
1 College of Information Engineering, Shanghai Maritime University, Shanghai, 201306, China
Corresponding Author
Ming XuABSTRACT
This paper discusses the performance of achieving physical layer security from channel resolvability in terms of secrecy and offers a kind of classification for different detection methods, including conventional hypothesis testing and active hypothesis testing. The difference between them is whether or not the detection time is a random variable. Moreover, this paper has a discussion on the applications of the practical case studies based on polar code from the channel resolvability, such as wireless channels with or without state information, point to point channel with an eavesdropper, multiple access channel with an eavesdropper, and communication networks at the physical layer. The channel resolvability is shown to be a promising method to achieve secrecy and covertness in the physical-layer.
KEYWORDS
Physical-layer security, Channel resolvability, Polar code, Hypothesis testingCITE THIS PAPER
Jiajia Wu, Ming Xu, Physical-layer Security from Channel Resolvability. Advances in Computer, Signals and Systems (2022) Vol. 6: 46-51. DOI: http://dx.doi.org/10.23977/acss.2022.060107.
REFERENCES
[1] Bloch M. R. (2016) Covert Communication Over Noisy Channels: A Resolvability Perspective. IEEE Transactions on Information Theory, 62, 2334-2354.
[2] Han T. S. and Verdu S. (1993) Approximation theory of output statistics. IEEE Transactions on Information Theory, 39, 752-772.
[3] Bloch M. R. and Laneman J. N. (2013) Strong Secrecy From Channel Resolvability. IEEE Transactions on Information Theory. 59, 8077-8098.
[4] Bash B. A., Goeckel D. and Towsley D. (2013) Limits of Reliable Communication with Low Probability of Detection on AWGN Channels. IEEE Journal on Selected Areas in Communications. 31, 1921-1930.
[5] Arikan E. (2009) Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels. IEEE Transactions on Information Theory. 55, 3051-3073.
[6] Chou R. A. and Bloch M. R. (2016) Polar Coding for the Broadcast Channel With Confidential Messages: A Random Binning Analogy. IEEE Transactions on Information Theory. 62, 2410-2429.
[7] Kadampot I. A., Tahmasbi M. and Bloch M. R. (2020) Multilevel-Coded Pulse-Position Modulation for Covert Communications Over Binary-Input Discrete Memoryless Channels. IEEE Transactions on Information Theory. 66, 6001-6023.
[8] Choi K. W., Jeon W. S. and Jeong D. G. (2009) Sequential detection of cyclostationary signal for cognitive radio systems. IEEE Transactions on Wireless Communications, 8, 4480-4485.
[9] Chang M. C. and Bloch M. R. (2021) Evasive Active Hypothesis Testing. IEEE Journal on Selected Areas in Information Theory. 2, 735-746.
Downloads: | 13036 |
---|---|
Visits: | 255003 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks