A Secure Method for Transmission of Sensitive Data over Wireless Fading Channels
Keywords:
Delay-Sensitive Data Capacity, Wireless Fading, Channel State Data, Secure Method, Quality of Service, SNRAbstract
In this project, the Delay-Sensitive data capacity of the Wireless fading channel is explored under two distinct suppositions on the accessible transmitter channel state data (CSI). The principal situation accept consummate earlier learning of both the fundamental and spy channel picks up. Here, upper and lower limits on the protected delay constrained limit are inferred and appeared to be tight in the high flag to-clamor proportion (SNR) administration (for a wide class of channel circulations). In the second situation, just the principle channel CSI is thought to be accessible at the transmitter. Amazingly, under this suspicion, I build up the achievability of non-zero secure rate (for a wide class of channel circulations) under a strict delay limitation. In the two cases, our achievability contentions depend on a novel two phase approach that defeats the mystery blackout wonder saw in before works.
References
- A. D. Wyner, "The Wire-Tap Channel," The Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
- P. K. Gopala, L. Lai, and H. El Gamal, "On the Secrecy Capacity of Fading Channels," IEEE Trans. on Inf. Theory, vol. 54, no. 10, pp. 4687- 4698, Oct. 2008.
- S. V. Hanly and D. N. C. Tse "Multiaccess Fading Channels-Part II: Delay-Limited Capacities," IEEE Trans. on Inf. Theory, vol. 44, no. 7, pp. 2816-2831, Nov. 1998.
- R. A. Berry and R. G. Gallager, "Communication Over Fading Channels with Delay Constraints," IEEE Trans. on Inf. Theory, vol. 48, no. 5, pp. 1135-1149, May 2002.
- J. Lee and N. Jindal, "Energy-efficient Scheduling of Delay Constrained Traffic over Fading Channels," IEEE Trans. on Wireless Communications, to appear.
- G. S. Vernam, "Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications," J. Amer. Inst. Elect. Eng., vol. 55, pp. 109-115, 1926.
- C. E. Shannon, "Communication Theory of Secrecy Systems," The Bell System Technical Journal, vol. 28, pp. 656-715, Oct. 1949.
- M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless Information-Theoretic Security," IEEE Trans. on Inf. Theory, volume 54, no. 6, pp. 2515-2534, June 2008.
- V. M. Prabhakaran, K. Eswaran, and K. Ramchandran, "Secrecy via Sources and Channels-A Secret Key - Secret Message Rate Tradeoff Region," in Proc. of IEEE International Symposium on Information Theory (ISIT’08), Toronto, ON, Canada, July 2008.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.