DocumentCode :
3588048
Title :
Wiretap-channels with constrained active attacks
Author :
Janda, Carsten Rudolf ; Scheunert, Christian ; Jorswieck, Eduard A.
Author_Institution :
Commun. Lab., Dresden Univ. of Technol., Dresden, Germany
fYear :
2014
Firstpage :
1984
Lastpage :
1988
Abstract :
In this paper, we calculate an achievable secrecy rate for the Wiretap Channel (WTC) with an active eavesdropper, who is subject to a distortion constraint, in general. Furthermore, we consider the replacement attack and jamming attack explicitly, when imposing symbol, peak or an average constraint on the jamming sequence. We show, that in all cases the optimal strategy for the eavesdropper is to disturb each symbol equiprobable in the former case, or to jam each symbol with the same jamming power in the latter case. A consequence is, that the eavesdropper´s replacement attack can be modeled as an additional Binary Symmetric Channel (BSC). Additionally, we demonstrate, that if the attacker is able to induce a channel corruption which corresponds to his own channel´s degradedness or which is even worse, no positive secrecy rate is achievable.
Keywords :
jamming; telecommunication security; wireless channels; BSC; WTC; binary symmetric channel; channel corruption; distortion constraint; eavesdropper replacement attack; jamming attack; jamming power; jamming sequence; wiretap-channels; Compounds; Computers; Decoding; Encoding; Hardware; Jamming; Zinc; Active Eavesdroppers; Compound Wiretap Channel; Constraints; Physical Layer Secrecy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Signals, Systems and Computers, 2014 48th Asilomar Conference on
Print_ISBN :
978-1-4799-8295-0
Type :
conf
DOI :
10.1109/ACSSC.2014.7094818
Filename :
7094818
Link To Document :
بازگشت