Author_Institution :
Dept. of Electr. Eng., Pennsylvania State Univ., University Park, PA, USA
Abstract :
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the source and the destination nodes are allowed to transmit, and the relay receives a superposition of their transmitted signals. We propose a new coding scheme that satisfies two requirements simultaneously: the transmitted message must be kept secret from the relay node, and the destination must be able to detect any Byzantine attack that the relay node might launch reliably and fast. The three main components of the proposed scheme are the nested lattice code, the privacy amplification scheme, and the algebraic manipulation detection (AMD) code. Specifically, for the Gaussian two-hop network, we show that lattice coding can successfully pair with AMD codes enabling its first application to a noisy channel model. We prove, using this new coding scheme, that the probability that the Byzantine attack goes undetected decreases exponentially fast with respect to the number of channel uses, while the loss in the secrecy rate, compared to the rate achievable when the relay is honest, can be made arbitrarily small. In addition, in contrast with prior work in Gaussian channels, the notion of secrecy provided here is strong secrecy.
Keywords :
Gaussian channels; algebraic codes; data privacy; encoding; probability; telecommunication network reliability; telecommunication security; wireless channels; AMD code; Byzantine adversary; Byzantine attack detection; Gaussian channel; Gaussian two-hop network; algebraic manipulation detection code; coding scheme; destination node; eavesdropper; lattice coding; nested lattice code; noisy channel model; privacy amplification scheme; probability; relay node; reliable Byzantine detection; secrecy rate; source node; transmitted secret message; transmitted signal; untrusted relay; Encoding; Lattices; Noise measurement; Physical layer; Relays; Reliability; Zirconium; Algebraic manipulation detection (AMD) code; Byzantine detection; information-theoretic secrecy; lattice code; relay channel; strong secrecy;