scispace - formally typeset
Proceedings ArticleDOI

Secure bits through queues

TLDR
It is shown that equivalent secrecy rates can be achieved using a deterministic encoding strategy, which provides an example contrasting the fact that for many memoryless channels a stochastic encoder is required to achieve non-zero secrecy rates.
Abstract
We investigate the idea of providing information-theoretic security at the network and data link layers by exploiting the timing information resulting from queuing of packets between a source, an intended receiver, and other users in a network. Specifically, we consider the secure transmission of messages by encoding them onto the interarrival timing of packets that enter parallel queues. By leveraging recent results on the secrecy capacity of arbitrary wiretap channels, achievable secrecy rates are obtained. We also show that equivalent secrecy rates can be achieved using a deterministic encoding strategy, which provides an example contrasting the fact that for many memoryless channels a stochastic encoder is required to achieve non-zero secrecy rates.

read more

Citations
More filters
Book

Physical-Layer Security: From Information Theory to Security Engineering

TL;DR: In this article, the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication are presented, using a bottom-up approach from the link level all the way to end-to-end architectures.
Journal ArticleDOI

Strong Secrecy From Channel Resolvability

TL;DR: It is shown that at least for symmetric wiretap channels, random capacity- based constructions fail to achieve the strong secrecy capacity, while channel-resolvability-based constructions achieve it.
Posted Content

Strong Secrecy from Channel Resolvability

TL;DR: In this article, the authors consider channel resolvability-based constructions, which associate to each message a sub-code that operates just above the capacity of the eavesdropper's channel.
Journal ArticleDOI

A Survey of Timing Channels and Countermeasures

TL;DR: This survey considers all three canonical applications of timing channels, namely, covert communication, timing side channel, and network flow watermarking and surveys the theoretical foundations, the implementation, and the various detection and prevention techniques that have been reported in literature.
Posted Content

Deep Learning for Joint Source-Channel Coding of Text

TL;DR: In this article, a joint source and channel coding of structured data such as natural language over a noisy channel is considered and a deep learning based encoder and decoder is developed.
References
More filters
Journal ArticleDOI

The wire-tap channel

TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Book

Information Theory and Reliable Communication

TL;DR: This chapter discusses Coding for Discrete Sources, Techniques for Coding and Decoding, and Source Coding with a Fidelity Criterion.
Book

Information-Spectrum Methods in Information Theory

太舜 韓, +1 more
TL;DR: This paper presents a meta-analyses of source and channel coding for multi-Terminal Information Theory, which aims to clarify the role of symbols in the development of information theory.
Journal ArticleDOI

Bits through queues

TL;DR: It is shown that intuition is wrong: the Shannon capacity of the single-server queue is actually higher than /spl mu/ bits/sec, because information can be encoded into the arrival epochs.