Dialog codes for secure wireless communications
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Information Theoretic Security
Foundations and Trends in Communications and Information Theory
Authentication over noisy channels
IEEE Transactions on Information Theory
A Wireless Security Framework without Shared Secrets
SSS '09 Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Channel scrambling for secrecy
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Wiretap channel with secure rate-limited feedback
IEEE Transactions on Information Theory
Secret sharing over fast-fading MIMO wiretap channels
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Secure relaying: can publicly transferred keys increase degrees of freedom?
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
LDPC codes for physical layer security
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Randomization for security in half-duplex two-way Gaussian channels
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
The Gaussian wiretap channel with noisy public feedback: breaking the high-SNR ceiling
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Secure communications with insecure feedback: breaking the high-SNR ceiling
IEEE Transactions on Information Theory
Two-hop secure communication using an untrusted relay
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
A shared-secret free security infrastructure for wireless networks
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Creating shared secrets out of thin air
Proceedings of the 11th ACM Workshop on Hot Topics in Networks
Control of wireless networks with secrecy
IEEE/ACM Transactions on Networking (TON)
Hi-index | 755.02 |
In this work, the critical role of noisy feedback in enhancing the secrecy capacity of the wiretap channel is established. Unlike previous works, where a noiseless public discussion channel is used for feedback, the feed-forward and feedback signals share the same noisy channel in the present model. Quite interestingly, this noisy feedback model is shown to be more advantageous in the current setting. More specifically, the discrete memoryless modulo-additive channel with a full-duplex destination node is considered first, and it is shown that the judicious use of feedback increases the secrecy capacity to the capacity of the source-destination channel in the absence of the wiretapper. In the achievability scheme, the feedback signal corresponds to a private key, known only to the destination. In the half-duplex scheme, a novel feedback technique that always achieves a positive perfect secrecy rate (even when the source-wiretapper channel is less noisy than the source-destination channel) is proposed. These results hinge on the modulo-additive property of the channel, which is exploited by the destination to perform encryption over the channel without revealing its key to the source. Finally, this scheme is extended to the continuous real valued modulo-Lambda channel where it is shown that the secrecy capacity with feedback is also equal to the capacity in the absence of the wiretapper.