Learning Adversary's Actions for Secret Communication

被引:0
|
作者
Tahmasbi, Mehrdad [1 ]
Bloch, Matthieu R. [1 ]
Yener, Aylin [2 ]
机构
[1] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
[2] Penn State Univ, Dept Elect Engn, University Pk, PA 16802 USA
来源
2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) | 2017年
基金
美国国家科学基金会;
关键词
WIRETAP CHANNELS; STATES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We analyze the problem of secure communication over a wiretap channel with an active adversary, in which the legitimate transmitter has the opportunity to sense and learn the adversary's actions. Specifically, the adversary has the ability to switch between two channels and to observe the corresponding output at every channel use; the encoder, however, has causal access to observations impacted by adversary's actions. We develop a joint learning/transmission scheme in which the legitimate users learn and adapt to the adversary's actions. For some channel models, we show that the achievable rates, which we define precisely, are arbitrarily close to those obtained with hindsight, had the transmitter known the actions ahead of time. This suggests that there is much to exploit and gain in physical layer security by monitoring the environment.
引用
收藏
页码:2708 / 2712
页数:5
相关论文
共 50 条
  • [1] Learning an Adversary's Actions for Secret Communication
    Tahmasbi, Mehrdad
    Bloch, Matthieu R.
    Yener, Aylin
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (03) : 1607 - 1624
  • [2] Communication Efficient Secret Sharing in the Presence of Malicious Adversary
    Bitar, Rawad
    Jaggi, Sidharth
    2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 548 - 553
  • [3] Confining Adversary Actions via Measurement
    Rowe, Paul D.
    GRAPHICAL MODELS FOR SECURITY, GRAMSEC 2016, 2016, 9987 : 150 - 166
  • [4] The Child's Secret of Learning
    Lewis, Paul
    TRADITION & DISCOVERY, 2005, 32 (03): : 61 - 62
  • [5] Covert Communication Gains From Adversary's Ignorance of Transmission Time
    Bash, Boulat A.
    Goeckel, Dennis
    Towsley, Don
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (12) : 8394 - 8405
  • [6] Two Quantum Secret Sharing Schemes with Adversary Structure
    Wu, Tingting
    Zhu, Shixin
    Li, Fulin
    Liu, Li
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (07)
  • [7] Covert Communication Gains From Adversary's Uncertainty of Phase Angles
    Qiao, Sen
    Cao, Daming
    Zhang, Qiaosheng
    Xu, Yinfei
    Liu, Guangjie
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2899 - 2912
  • [8] Two Quantum Secret Sharing Schemes with Adversary Structure
    Tingting Wu
    Shixin Zhu
    Fulin Li
    Li Liu
    International Journal of Theoretical Physics, 61
  • [9] Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures
    Eriguchi, Reo
    Kunihiro, Noboru
    Nuida, Koji
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (05) : 1751 - 1778
  • [10] Practical secret sharing scheme realizing generalized adversary structure
    Guo, YB
    Ma, JF
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2004, 19 (04) : 564 - 569