• DocumentCode
    38276
  • Title

    Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay

  • Author

    He, Xiang ; Yener, Aylin

  • Author_Institution
    Dept. of Electr. Eng., Pennsylvania State Univ., University Park, PA, USA
  • Volume
    59
  • Issue
    1
  • fYear
    2013
  • fDate
    Jan. 2013
  • Firstpage
    177
  • Lastpage
    192
  • Abstract
    We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the source and the destination nodes are allowed to transmit, and the relay receives a superposition of their transmitted signals. We propose a new coding scheme that satisfies two requirements simultaneously: the transmitted message must be kept secret from the relay node, and the destination must be able to detect any Byzantine attack that the relay node might launch reliably and fast. The three main components of the proposed scheme are the nested lattice code, the privacy amplification scheme, and the algebraic manipulation detection (AMD) code. Specifically, for the Gaussian two-hop network, we show that lattice coding can successfully pair with AMD codes enabling its first application to a noisy channel model. We prove, using this new coding scheme, that the probability that the Byzantine attack goes undetected decreases exponentially fast with respect to the number of channel uses, while the loss in the secrecy rate, compared to the rate achievable when the relay is honest, can be made arbitrarily small. In addition, in contrast with prior work in Gaussian channels, the notion of secrecy provided here is strong secrecy.
  • Keywords
    Gaussian channels; algebraic codes; data privacy; encoding; probability; telecommunication network reliability; telecommunication security; wireless channels; AMD code; Byzantine adversary; Byzantine attack detection; Gaussian channel; Gaussian two-hop network; algebraic manipulation detection code; coding scheme; destination node; eavesdropper; lattice coding; nested lattice code; noisy channel model; privacy amplification scheme; probability; relay node; reliable Byzantine detection; secrecy rate; source node; transmitted secret message; transmitted signal; untrusted relay; Encoding; Lattices; Noise measurement; Physical layer; Relays; Reliability; Zirconium; Algebraic manipulation detection (AMD) code; Byzantine detection; information-theoretic secrecy; lattice code; relay channel; strong secrecy;
  • fLanguage
    English
  • Journal_Title
    Information Theory, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0018-9448
  • Type

    jour

  • DOI
    10.1109/TIT.2012.2216952
  • Filename
    6293896