A Secure Method for Transmission of Sensitive Data over Wireless Fading Channels

Authors

  • B. Kavitha   PG Scholar, Department of MCA,St.Ann's College of Engineering & Technology,Chirala, Andhra Pradesh, India
  • K. S. Yuvaraj  Ass.Professor, Department of MCA,St.Ann's College of Engineering & Technology,Chirala, Andhra Pradesh, India

Keywords:

Delay-Sensitive Data Capacity, Wireless Fading, Channel State Data, Secure Method, Quality of Service, SNR

Abstract

In this project, the Delay-Sensitive data capacity of the Wireless fading channel is explored under two distinct suppositions on the accessible transmitter channel state data (CSI). The principal situation accept consummate earlier learning of both the fundamental and spy channel picks up. Here, upper and lower limits on the protected delay constrained limit are inferred and appeared to be tight in the high flag to-clamor proportion (SNR) administration (for a wide class of channel circulations). In the second situation, just the principle channel CSI is thought to be accessible at the transmitter. Amazingly, under this suspicion, I build up the achievability of non-zero secure rate (for a wide class of channel circulations) under a strict delay limitation. In the two cases, our achievability contentions depend on a novel two phase approach that defeats the mystery blackout wonder saw in before works.

References

  1. A. D. Wyner, "The Wire-Tap Channel," The Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
  2. P. K. Gopala, L. Lai, and H. El Gamal, "On the Secrecy Capacity of Fading Channels," IEEE Trans. on Inf. Theory, vol. 54, no. 10, pp. 4687- 4698, Oct. 2008.
  3. S. V. Hanly and D. N. C. Tse "Multiaccess Fading Channels-Part II: Delay-Limited Capacities," IEEE Trans. on Inf. Theory, vol. 44, no. 7, pp. 2816-2831, Nov. 1998.
  4. R. A. Berry and R. G. Gallager, "Communication Over Fading Channels with Delay Constraints," IEEE Trans. on Inf. Theory, vol. 48, no. 5, pp. 1135-1149, May 2002.
  5. J. Lee and N. Jindal, "Energy-efficient Scheduling of Delay Constrained Traffic over Fading Channels," IEEE Trans. on Wireless Communications, to appear.
  6. G. S. Vernam, "Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications," J. Amer. Inst. Elect. Eng., vol. 55, pp. 109-115, 1926.
  7. C. E. Shannon, "Communication Theory of Secrecy Systems," The Bell System Technical Journal, vol. 28, pp. 656-715, Oct. 1949.
  8. M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless Information-Theoretic Security," IEEE Trans. on Inf. Theory, volume 54, no. 6, pp. 2515-2534, June 2008.
  9. V. M. Prabhakaran, K. Eswaran, and K. Ramchandran, "Secrecy via Sources and Channels-A Secret Key - Secret Message Rate Tradeoff Region," in Proc. of IEEE International Symposium on Information Theory (ISIT’08), Toronto, ON, Canada, July 2008.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
B. Kavitha , K. S. Yuvaraj, " A Secure Method for Transmission of Sensitive Data over Wireless Fading Channels, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.278-283, March-April-2018.