• 제목/요약/키워드: Wiretap

검색결과 20건 처리시간 0.022초

Capacity-Equivocation Region of a Special Case of Wiretap Channel with Noiseless Feedback

  • Dai, Bin;Han Vinck, A.J.;Luo, Yuan;Ma, Zheng
    • Journal of Communications and Networks
    • /
    • 제17권1호
    • /
    • pp.21-26
    • /
    • 2015
  • The general wiretap channel with noiseless feedback is first investigated by Ahlswede and Cai, where lower and upper bounds on the secrecy capacity are provided in their work. The upper bound is met with equality only in some special cases. In this paper, we study a special case of the general wiretap channel with noiseless feedback (called non-degraded wiretap channel with noiseless feedback). Inner and outer bounds on the capacity-equivocation region of this special model are provided. The outer bound is achievable if the main channel is more capable than the wiretap channel. The inner bound is constructed especially for the case that the wiretap channel is more capable than the main channel. The results of this paper are further explained via binary and Gaussian examples. Compared with the capacity results for the non-degraded wiretap channel, we find that the security is enhanced by using the noiseless feedback.

보안 모니터링과 감청의 차이점에 관한 연구 (A Study on the Difference between Security Monitoring and Wiretap)

  • 홍창화;최민규;김태훈
    • 한국항행학회논문지
    • /
    • 제13권1호
    • /
    • pp.104-112
    • /
    • 2009
  • 통신비밀보호법상의 감청과 보안모니터링은 유사한 것으로 간주될 수 있으나, 실제로는 전혀 다른 개념이라고 할 수 있다. 하지만 감청과 보안모니터링의 개념상 차이점에 대한 연구가 부족한 현 시점에서 두 용어가 혼용되고 있으며, 이로 인해 다양한 부작용이 나타나고 있다. 본 연구에서는 목적, 범위, 대상, 정보활용방법 등의 분야에서 통신감청과 보안모니터링을 비교함으로써 이 두 가지 개념의 차이점을 비교, 설명하였다.

  • PDF

Secure Broadcasting Using Multiple Antennas

  • Ekrem, Ersen;Ulukus, Sennur
    • Journal of Communications and Networks
    • /
    • 제12권5호
    • /
    • pp.411-432
    • /
    • 2010
  • We consider three different secure broadcasting scenarios: i) Broadcast channels with common and confidential messages (BCC), ii) multi-receiver wiretap channels with public and confidential messages, and iii) compound wiretap channels. The BCC is a broadcast channel with two users, where in addition to the common message sent to both users, a private message, which needs to be kept hidden as much as possible from the other user, is sent to each user. In this model, each user treats the other user as an eavesdropper. The multi-receiver wiretap channel is a broadcast channel with two legitimate users and an external eavesdropper, where the transmitter sends a pair of public and confidential messages to each legitimate user. Although there is no secrecy concern about the public messages, the confidential messages need to be kept perfectly secret from the eavesdropper. The compound wiretap channel is a compound broadcast channel with a group of legitimate users and a group of eavesdroppers. In this model, the transmitter sends a common confidential message to the legitimate users, and this confidential message needs to be kept perfectly secret from all eavesdroppers. In this paper, we provide a survey of the existing information-theoretic results for these three forms of secure broadcasting problems, with a closer look at the Gaussian multiple-input multiple-output (MIMO) channel models. We also present the existing results for the more general discrete memoryless channel models, as they are often the first step in obtaining the capacity results for the corresponding Gaussian MIMO channel models.

Build-in Wiretap Channel I with Feedback and LDPC Codes

  • Wen, Hong;Gong, Guang;Ho, Pin-Han
    • Journal of Communications and Networks
    • /
    • 제11권6호
    • /
    • pp.538-543
    • /
    • 2009
  • A wiretap channel I is one of the channel models that was proved to achieve unconditional security. However, it has been an open problem in realizing such a channel model in a practical network environment. The paper is committed to solve the open problem by introducing a novel approach for building wiretap channel I in which the eavesdropper sees a binary symmetric channel (BSC) with error probability p while themain channel is error free. By taking advantage of the feedback and low density parity check (LDPC) codes, our scheme adds randomness to the feedback signals from the destination for keeping an eavesdropper ignorant; on the other hand, redundancy is added and encoded by the LDPC codes such that a legitimate receiver can correctly receive and decode the signals. With the proposed approach, unconditionallysecure communication can be achieved through interactive communications, in which the legitimate partner can realize the secret information transmission without a pre-shared secret key even if the eavesdropper has better channel from the beginning.

다중 안테나 릴레이 기반의 Secure Amplifyand-Forward 전송 시스템의 보안 성능 분석 (Secrecy Performance of Secure Amplify-and-Forward Transmission with Multi-Antenna Relay)

  • 황규성;주민철
    • 한국통신학회논문지
    • /
    • 제38A권8호
    • /
    • pp.733-738
    • /
    • 2013
  • 본 논문에서는 증폭후전송 (amplify-and-forward, AF) 기반의 중계 전송 시스템에서 통신 정보를 도청하는 도청자가 존재하는 환경인 와이어탭 채널 (wiretap channel)에서의 물리 계층 보안에 대한 분석을 한다. 와이어탭 채널 환경에서 원천 노드, 목적지 노드, 중계 노드, 도청 노드가 각각 한 개씩 존재한다고 가정하며, 특히 중계 노드는 다수의 안테나를 가지고 있는 시스템을 고려한다. 중계 노드에서는 AF 전송시에 다이버시티 (diversity) 이득을 취하기 위한 안테나 선택 기법을 적용하였다. 구체적으로, 중계 노드에서 데이터 수 송신시 신호대잡음비를 최대화 할 수 있는 안테나를 선택하여 동작한다. 보다 실질적인 환경을 고려하기 위하여 중계 노드에서 목적지 노드로 전송할 때 도청 노드에 대한 채널 정보는 없는 환경을 고려하였다. 제안된 시스템의 보안 성능 분석을 위하여 보안 불통 확률 (secrecy outage probability)를 한 개의 적분 형태로 구하였으며, 시뮬레이션 결과를 통하여 해당 성능 분석이 올바름을 보인다.

Survey on Physical Layer Security in Downlink Networks

  • Abbas, Mohammed Adil;Hong, Jun-Pyo
    • Journal of information and communication convergence engineering
    • /
    • 제15권1호
    • /
    • pp.14-20
    • /
    • 2017
  • In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.

Wiretapping Strategies for Artificial Noise Assisted Communication in MU-MIMO wiretap channel

  • Wang, Shu;Da, Xinyu;Chu, Zhenyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권5호
    • /
    • pp.2166-2180
    • /
    • 2016
  • We investigate the opposite of artificial noise (AN)-assisted communication in multiple-input-multiple-output (MIMO) wiretap channels for the multiuser case by taking the side of the eavesdropper. We first define a framework for an AN-assisted multiuser multiple-input-multiple-output (MU-MIMO) system, for which eavesdropping methods are proposed with and without knowledge of legitimate users' channel state information (CSI). The proposed method without CSI is based on a modified joint approximate diagonalization of eigen-matrices algorithm, which eliminates permutation indetermination and phase ambiguity, as well as the minimum description length algorithm, which blindly estimates the number of secret data sources. Simulation results show that both proposed methods can intercept information effectively. In addition, the proposed method without legitimate users' CSI performs well in terms of robustness and computational complexity.

A Secure MQAM Scheme Based on Signal Constellation Hopping

  • Zhang, Yingxian;Liu, Aijun;Pan, Xiaofei;Ye, Zhan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권7호
    • /
    • pp.2246-2260
    • /
    • 2014
  • In this paper, a secure multilevel quadrature amplitude modulation (MQAM) scheme is proposed for the physical layer security (PLS) of the wireless communications. In the proposed scheme, each transmitted symbol's signal constellation (SC) is hopping with the control of two unique factors: amplitude distortion (AD) factor and phase hopping (PH) factor. With unknown the two factors, the eavesdropper cannot extract effective information from the received signal. We first introduce a security metric, referred to as secrecy gain, and drive a lower bound on the gain that the secrecy capacity can be improved. Then, we investigate the relationship among the secrecy gain, the signal to noise power ratios (SNRs) of the main and wiretap channels, and the secrecy capacity. Next, we analyze the security of the proposed scheme, and the results indicate that the secrecy capacity is improved by our scheme. Specifically, a positive secrecy capacity is always obtained, whether the quality of the main channel is better than that of the wiretap channel or not. Finally, the numerical results are provided to prove the analytical work, which further suggests the security of the proposed scheme.

상관관계를 갖는 MIMO 채널에서 하나의 피드백 비트를 이용한 OSTBC의 물리계층 보안 성능 평가 (Secrecy Performance Evaluation of OSTBC using One-Bit Feedback in Correlated MIMO Channels)

  • 이상준;이인호
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 추계학술대회
    • /
    • pp.886-889
    • /
    • 2014
  • 본 논문에서는 통신 신호를 도청하는 도청자가 존재하는 환경인 와이어탭(wiretap) 채널을 가정하여 하나의 피드백 비트를 이용한 직교 시공간 블록 코드(orthogonal space-time block code, OSTBC)의 물리계층 보안 성능을 평가한다. 여기서, 공간적 상관관계를 갖는 MIMO(multiple-input multiple-output) 채널을 가정한다. 본 논문에서는 하나의 피드백 비트를 이용한 OSTBC(one-bit feedback based OSTBC, F-OSTBC) 기술을 제시하고, 각 노드에서의 공간 채널 상관계수를 다양하게 가정하여 F-OSTBC와 기존의 OSTBC, 그리고 송신 안테나 선택 기술에 대한 보안 아웃티지 성능을 비교한다.

  • PDF

Edge 라우터 기반 네트워크 공격에 대응하는 보안기술 연구 (Research on security technology to respond to edge router-based network attacks)

  • 황성규
    • 한국정보통신학회논문지
    • /
    • 제26권9호
    • /
    • pp.1374-1381
    • /
    • 2022
  • 네트워크 공격 대응에 관한 보안기술의 기존 연구들은 하드웨어적 네트워크 보안 기술을 이용하여 네트워크의 보안성을 높이는 방법이나 바이러스 방역 백신과 바이러스 방역 시스템이 주로 제안 설계되어왔다. 많은 사용자는 라우터의 보안 기능을 충분히 활용하지 못하고 있어 이러한 문제점을 극복하기 위해 네트워크 보안 수준에 따라 분리함으로써 계층화된 보안 관리를 통하여 외부에서의 공격을 차단할 수 있음을 계층별 실험을 통해 분류하였다. 연구의 범위는 Edge 라우터의 보안기술 동향을 살펴봄으로 Edge 라우터 기반의 네트워크 공격에 관한 위협으로부터 보호하는 방법과 구현 사례를 제시한다.