Joint power and secret key queue management for delay limited secure communication

  • Authors:
  • Onur Gungor;Jian Tan;Can Emre Koksal;Hesham El Gamal;Ness B. Shroff

  • Affiliations:
  • Department of Electrical and Computer Engineering, The Ohio State University, Columbus;Department of Electrical and Computer Engineering, The Ohio State University, Columbus;Department of Electrical and Computer Engineering, The Ohio State University, Columbus;Department of Electrical and Computer Engineering, The Ohio State University, Columbus;Department of Electrical and Computer Engineering, The Ohio State University, Columbus

  • Venue:
  • INFOCOM'10 Proceedings of the 29th conference on Information communications
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In this paper, we design a wireless communication system that achieves constant bit rate data transmission over a block fading channel, securely from an eavesdropper that listens to the transmitter over another independent block fading channel. It is well known that, the method of sending secure information using the binning techniques inspired by the wiretap channel fails to secure the information at times when the eavesdropper channel has favorable conditions over the main channel. This phenomenon is called secrecy outage. In our system, however, we exploit the times at which the main channel is favorable over the eavesdropper channel for us to be able to transmit some random secret key bits along with the data bits. These key bits are stored in a separate key queue at the transmitter as well as the receiver, and are utilized to secure data bits, whenever the channel conditions favor the eavesdropper. We show that, our system achieves a high performance at any given desired outage probability by jointly controlling the key queue and the transmit power. We show that the optimal power control involves a time sharing between secure waterfilling and channel inversion strategies and the key queue operates in the heavy traffic regime to achieve the maximum delay limited rate possible, under a small outage constraint. This work can be viewed as a first step in providing a framework that combines both information theory and queueing analysis for the study of information theoretic security.