Proceedings ArticleDOI
Secure bits through queues
Brian P. Dunn,Matthieu R. Bloch,J. Nicholas Laneman +2 more
- pp 37-41
TLDR
It is shown that equivalent secrecy rates can be achieved using a deterministic encoding strategy, which provides an example contrasting the fact that for many memoryless channels a stochastic encoder is required to achieve non-zero secrecy rates.Abstract:
We investigate the idea of providing information-theoretic security at the network and data link layers by exploiting the timing information resulting from queuing of packets between a source, an intended receiver, and other users in a network. Specifically, we consider the secure transmission of messages by encoding them onto the interarrival timing of packets that enter parallel queues. By leveraging recent results on the secrecy capacity of arbitrary wiretap channels, achievable secrecy rates are obtained. We also show that equivalent secrecy rates can be achieved using a deterministic encoding strategy, which provides an example contrasting the fact that for many memoryless channels a stochastic encoder is required to achieve non-zero secrecy rates.read more
Citations
More filters
Book
Physical-Layer Security: From Information Theory to Security Engineering
Matthieu R. Bloch,Joao Barros +1 more
TL;DR: In this article, the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication are presented, using a bottom-up approach from the link level all the way to end-to-end architectures.
Journal ArticleDOI
Strong Secrecy From Channel Resolvability
TL;DR: It is shown that at least for symmetric wiretap channels, random capacity- based constructions fail to achieve the strong secrecy capacity, while channel-resolvability-based constructions achieve it.
Posted Content
Strong Secrecy from Channel Resolvability
TL;DR: In this article, the authors consider channel resolvability-based constructions, which associate to each message a sub-code that operates just above the capacity of the eavesdropper's channel.
Journal ArticleDOI
A Survey of Timing Channels and Countermeasures
TL;DR: This survey considers all three canonical applications of timing channels, namely, covert communication, timing side channel, and network flow watermarking and surveys the theoretical foundations, the implementation, and the various detection and prevention techniques that have been reported in literature.
Posted Content
Deep Learning for Joint Source-Channel Coding of Text
TL;DR: In this article, a joint source and channel coding of structured data such as natural language over a noisy channel is considered and a deep learning based encoder and decoder is developed.
References
More filters
Journal ArticleDOI
The wire-tap channel
TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Book
Information Theory and Reliable Communication
TL;DR: This chapter discusses Coding for Discrete Sources, Techniques for Coding and Decoding, and Source Coding with a Fidelity Criterion.
Book
Information and information stability of random variables and processes
M. S. Pinsker,Amiel Feinstein +1 more
Book
Information-Spectrum Methods in Information Theory
太舜 韓,Hiroki Koga +1 more
TL;DR: This paper presents a meta-analyses of source and channel coding for multi-Terminal Information Theory, which aims to clarify the role of symbols in the development of information theory.
Journal ArticleDOI
Bits through queues
Venkat Anantharam,Sergio Verdu +1 more
TL;DR: It is shown that intuition is wrong: the Shannon capacity of the single-server queue is actually higher than /spl mu/ bits/sec, because information can be encoded into the arrival epochs.