A Secure Method for Transmission of Sensitive Data over Wireless Fading Channels

Authors(2) :-B. Kavitha , K. S. Yuvaraj

In this project, the Delay-Sensitive data capacity of the Wireless fading channel is explored under two distinct suppositions on the accessible transmitter channel state data (CSI). The principal situation accept consummate earlier learning of both the fundamental and spy channel picks up. Here, upper and lower limits on the protected delay constrained limit are inferred and appeared to be tight in the high flag to-clamor proportion (SNR) administration (for a wide class of channel circulations). In the second situation, just the principle channel CSI is thought to be accessible at the transmitter. Amazingly, under this suspicion, I build up the achievability of non-zero secure rate (for a wide class of channel circulations) under a strict delay limitation. In the two cases, our achievability contentions depend on a novel two phase approach that defeats the mystery blackout wonder saw in before works.

Authors and Affiliations

B. Kavitha
PG Scholar, Department of MCA,St.Ann's College of Engineering & Technology,Chirala, Andhra Pradesh, India
K. S. Yuvaraj
Ass.Professor, Department of MCA,St.Ann's College of Engineering & Technology,Chirala, Andhra Pradesh, India

Delay-Sensitive Data Capacity, Wireless Fading, Channel State Data, Secure Method, Quality of Service, SNR

  1. A. D. Wyner, "The Wire-Tap Channel," The Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
  2. P. K. Gopala, L. Lai, and H. El Gamal, "On the Secrecy Capacity of Fading Channels," IEEE Trans. on Inf. Theory, vol. 54, no. 10, pp. 4687- 4698, Oct. 2008.
  3. S. V. Hanly and D. N. C. Tse "Multiaccess Fading Channels-Part II: Delay-Limited Capacities," IEEE Trans. on Inf. Theory, vol. 44, no. 7, pp. 2816-2831, Nov. 1998.
  4. R. A. Berry and R. G. Gallager, "Communication Over Fading Channels with Delay Constraints," IEEE Trans. on Inf. Theory, vol. 48, no. 5, pp. 1135-1149, May 2002.
  5. J. Lee and N. Jindal, "Energy-efficient Scheduling of Delay Constrained Traffic over Fading Channels," IEEE Trans. on Wireless Communications, to appear.
  6. G. S. Vernam, "Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications," J. Amer. Inst. Elect. Eng., vol. 55, pp. 109-115, 1926.
  7. C. E. Shannon, "Communication Theory of Secrecy Systems," The Bell System Technical Journal, vol. 28, pp. 656-715, Oct. 1949.
  8. M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless Information-Theoretic Security," IEEE Trans. on Inf. Theory, volume 54, no. 6, pp. 2515-2534, June 2008.
  9. V. M. Prabhakaran, K. Eswaran, and K. Ramchandran, "Secrecy via Sources and Channels-A Secret Key - Secret Message Rate Tradeoff Region," in Proc. of IEEE International Symposium on Information Theory (ISIT’08), Toronto, ON, Canada, July 2008.

Publication Details

Published in : Volume 3 | Issue 4 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 278-283
Manuscript Number : CSEIT183397
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

B. Kavitha , K. S. Yuvaraj, "A Secure Method for Transmission of Sensitive Data over Wireless Fading Channels", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.278-283, March-April-2018.
Journal URL : http://ijsrcseit.com/CSEIT183397

Article Preview

Follow Us

Contact Us