Achievable Secrecy in Arbitrary Erasure Networks with Feedback

被引:0
|
作者
Czap, Laszlo [1 ]
Papadopoulos, Athanasios [2 ]
Fragouli, Christina [1 ,2 ]
机构
[1] Ecole Polytech Fed Lausanne, Lausanne, Switzerland
[2] Univ Calif Los Angeles, Los Angeles, CA 90024 USA
关键词
SECURE NETWORK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present achievability schemes for secure message transmission in the presence of a passive eavesdropper, over arbitrary networks, where each edge corresponds to an independent erasure channel and we have available public channel state feedback. Our schemes are efficiently described through linear programming formulations, that generalize the information flow linear programs to networks with security constraints; different sources of secrecy show up as parameters in our linear programs, and solving the optimization problem enables to select the optimal ( in terms of rate) scheme that integrates them. As far as we know, these are the first linear programming formulations for secret message transmission over arbitrary networks with erasures and channel state feedback.
引用
收藏
页码:877 / 880
页数:4
相关论文
共 50 条
  • [1] LP formulations for secrecy over erasure networks with feedback
    Papadopoulos, Athanasios
    Czap, Laszlo
    Fragouli, Christina
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 954 - 958
  • [2] Wireless Erasure Networks With Feedback
    Smith, Brian
    Hassibi, Babak
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 339 - +
  • [3] On the Achievable Secrecy Diversity of Cooperative Networks With Untrusted Relays
    Chraiti, Mohaned
    Ghrayeb, Ali
    Assi, Chadi
    Hasna, Mazen O.
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (01) : 39 - 53
  • [4] Multicast in Wireless Erasure Networks with Feedback
    Jiang, Chong
    Smith, Brian
    Hassibi, Babak
    Vishwanath, Sfiram
    [J]. 2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2008, : 1199 - 1202
  • [5] Achievable Secrecy Rate Region of Two-Way Communication with Secret Key Feedback
    Tao Li
    Shidong Zhou
    [J]. Tsinghua Science and Technology., 2018, 23 (02) - 134
  • [7] Achievable Secrecy Rate Region of Two-Way Communication with Secret Key Feedback
    Li, Tao
    Zhou, Shidong
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (02) : 126 - 134
  • [8] Achievable Secrecy Rate Region of Two-Way Communication with Secret Key Feedback
    Tao Li
    Shidong Zhou
    [J]. Tsinghua Science and Technology, 2018, (02) : 126 - 134
  • [9] Physical Layer Security in PLC Networks: Achievable Secrecy Rate and Channel Effects
    Pittolo, Alberto
    Tonello, Andrea M.
    [J]. 2013 17TH IEEE INTERNATIONAL SYMPOSIUM ON POWER LINE COMMUNICATIONS AND ITS APPLICATIONS (ISPLC), 2013, : 273 - 278
  • [10] Strong Secrecy for Erasure Wiretap Channels
    Suresh, Ananda T.
    Subramanian, Arunkumar
    Thangaraj, Andrew
    Bloch, Matthieu
    McLaughlin, Steven W.
    [J]. 2010 IEEE INFORMATION THEORY WORKSHOP (ITW), 2010,