Secure Identification Under Passive Eavesdroppers and Active Jamming Attacks Article Swipe
Related Concepts
Computer science
Jamming
Secrecy
Computer network
Secure transmission
Secure communication
Identification (biology)
Identification scheme
Coding (social sciences)
Channel (broadcasting)
Information leakage
Computer security
Scheme (mathematics)
Mathematics
Encryption
Measure (data warehouse)
Mathematical analysis
Botany
Statistics
Thermodynamics
Biology
Database
Physics
Holger Boche
,
Christian Deppe
·
YOU?
·
· 2018
· Open Access
·
· DOI: https://doi.org/10.1109/tifs.2018.2854729
· OA: W2813639628
YOU?
·
· 2018
· Open Access
·
· DOI: https://doi.org/10.1109/tifs.2018.2854729
· OA: W2813639628
In next-generation connectivity systems, which rely on robust and low-latency information exchange, there exists communication tasks in which the Ahlswede/Dueck identification scheme is much more efficient than Shannon's transmission scheme. We concentrate on the arbitrarily varying wiretap channel (AVWC) that models jamming attacks. We provide a coding scheme for secure identification and determine the secrecy capacity of the AVWC. Furthermore, we analyze important properties of this capacity function, e.g., continuity and super-additivity. These properties are important for the design of robust secure communication design and for the optimization of the medium access control.
Related Topics
Finding more related topics…