• DocumentCode
    67426
  • Title

    Secrecy Outage Capacity of Fading Channels

  • Author

    Gungor, Onur ; Jian Tan ; Koksal, Can Emre ; El-Gamal, Hesham ; Shroff, Ness B.

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Ohio State Univ., Columbus, OH, USA
  • Volume
    59
  • Issue
    9
  • fYear
    2013
  • fDate
    Sept. 2013
  • Firstpage
    5379
  • Lastpage
    5397
  • Abstract
    This paper considers point-to-point secure communication over flat fading channels under an outage constraint. More specifically, we extend the definition of outage capacity to account for the secrecy constraint and obtain sharp characterizations of the corresponding fundamental limits under two different assumptions on the transmitter channel state information (CSI). First, we find the outage secrecy capacity assuming that the transmitter has perfect knowledge of the legitimate and eavesdropper channel gains. In this scenario, the capacity achieving scheme relies on opportunistically exchanging private keys between the legitimate nodes. These keys are stored in a key buffer and later used to secure delay sensitive data using the Vernam´s one time pad technique. We then extend our results to the more practical scenario where the transmitter is assumed to know only the legitimate channel gain. Here, our achievability arguments rely on privacy amplification techniques to generate secret key bits. In the two cases, we also characterize the optimal power control policies which, interestingly, turn out to be a judicious combination of channel inversion and the optimal ergodic strategy. Finally, we analyze the effect of key buffer overflow on the overall outage probability.
  • Keywords
    channel capacity; fading channels; optimal control; power control; private key cryptography; radio links; radio transmitters; telecommunication control; telecommunication security; Vernam´s one time pad technique; channel inversion; delay sensitive data; eavesdropper channel gain; flat fading channels; key buffer; legitimate channel gain; legitimate nodes; opportunistically exchanging private keys; optimal ergodic strategy; optimal power control policies; outage constraint; outage probability; point-to-point secure communication; privacy amplification techniques; secrecy constraint; secrecy outage capacity; secret key bits; transmitter channel state information; Delays; Fading; Power control; Privacy; Receivers; Resource management; Transmitters; Block fading channels; channel state information; information theoretic secrecy; key queue; power control; secrecy outage capacity;
  • fLanguage
    English
  • Journal_Title
    Information Theory, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0018-9448
  • Type

    jour

  • DOI
    10.1109/TIT.2013.2265691
  • Filename
    6573412