Filters








1,107 Hits in 4.3 sec

A Model for Adversarial Wiretap Channels and its Applications

Reihaneh Safavi-Naini, Pengwei Wang
2015 Journal of Information Processing  
We consider a coding-theoretic model for wiretap channels with active adversaries who can choose their view of the communication channel and also add adversarial noise to the channel.  ...  In the wiretap model of secure communication, Alice is connected to Bob and Eve by two noisy channels.  ...  The model naturally extends the wiretap II model and gives a codingtheoretic model for active adversaries for the wiretap.  ... 
doi:10.2197/ipsjjip.23.554 fatcat:fuudrnzbjvhdxiuchts6ps5bgm

Detection of Algebraic Manipulation in the Presence of Leakage [chapter]

Hadi Ahmadi, Reihaneh Safavi-Naini
2014 Lecture Notes in Computer Science  
We thus introduce a new optimal BLR-AMD code construction and prove its security in the model. We show an application of LR-AMD codes to tampering detection over wiretap channels.  ...  We investigate the problem of algebraic manipulation detection (AMD) over a communication channel that partially leaks information to an adversary.  ...  The application of LR-AMD codes to tampering detection over wiretap channels suites for instance a scenario where a covert adversary tries not to use high-energy jamming/overshadowing attacks to avoid  ... 
doi:10.1007/978-3-319-04268-8_14 fatcat:4fuddjzkezgfrjny32huwvw36y

Learning Secured Modulation With Deep Adversarial Neural Networks [article]

Hesham Mohammed, Dola Saha
2020 arXiv   pre-print
Our results show that a trusted pair of users can exchange data bits in both clean and noisy channels, where a trained adversary cannot decipher the data.  ...  We train to cooperatively learn encryption and decryption algorithms between our trusted pair of neural networks, while eavesdropper's model is trained adversarially on the same data to minimize the error  ...  In [15] , the authors used autoencoder model and train it in a wiretap channel environment to achieve a key-less encryption between Alice and Bob.  ... 
arXiv:2005.13694v1 fatcat:5rfylo2surdvdl36yr6ae4oxve

A Model for Adversarial Wiretap Channel [article]

Pengwei Wang, Reihaneh Safavi-Naini
2014 arXiv   pre-print
In this paper we propose a model for adversarial wiretap (AWTP) channel that models active adversaries at this layer.  ...  In wiretap model of secure communication the goal is to provide (asymptotic) perfect secrecy and reliable communication over a noisy channel that is eavesdropped by an adversary with unlimited computational  ...  Considering active adversaries in wiretap model is well motivated by real life application scenarios.  ... 
arXiv:1312.6457v3 fatcat:yecptfdpzfbu7lqjri67hte3je

A Review of Fundamental Optimization Approaches and the Role of AI Enabling Technologies in Physical Layer Security

Mulugeta Kassaw Tefera, Zengwang Jin, Shengbing Zhang
2022 Sensors  
The review begins with the fundamental concepts that are associated with PLS, including a discussion on conventional cryptographic techniques and wiretap channel models.  ...  This phenomenon is due to the fact that traditional methods for the network optimization of PLS fail to adapt new features, technologies, and resource management to diversified demand applications.  ...  Acknowledgments: We would like to acknowledge the Northwestern Polytechnical University (NWPU) and Yangtze River Delta Research Institute of NWPU for their research funding.  ... 
doi:10.3390/s22093589 pmid:35591279 pmcid:PMC9100781 fatcat:shioc6hcjzeghhlamyhe6axwwe

A Virtual Wiretap Channel for Secure Message Transmission [chapter]

Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin
2017 Lecture Notes in Computer Science  
In this paper we develop an abstract model for BiT protocol as a wiretap channel and refer to it as a virtual wiretap channel.  ...  In the Wyner wiretap channel a sender is connected to a receiver and an eavesdropper through two noisy channels.  ...  We analyze BiT and show how it can be modelled as a virtual wiretap channel.  ... 
doi:10.1007/978-3-319-61273-7_9 fatcat:jteug5az6fg57lwecfltb4hl3i

Network equivalence in the presence of an eavesdropper

Theodoros K. Dikaliotis, Hongyi Yao, Tracey Ho, Michelle Effros, Joerg Kliewer
2012 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton)  
For the case where the eavesdropper can wiretap at most one channel at a time, we show that the secrecy capacity region, for a broad class of channels and any given network topology and communication demands  ...  , is equivalent to that of a corresponding network where each noisy wiretap channel is replaced by a noiseless wiretap channel.  ...  ACKNOWLEDGMENTS This work has been supported in part by NSF grants CNS 0905615, CCF 0830666, and CCF 1017632.  ... 
doi:10.1109/allerton.2012.6483322 dblp:conf/allerton/DikaliotisYHEK12 fatcat:fhqlfym3jbcfzcvmd5uerscygy

Network Equivalence in the Presence of an Eavesdropper [article]

Theodoros K. Dikaliotis, Hongyi Yao, Tracey Ho, Michelle Effros, Joerg Kliewer
2012 arXiv   pre-print
For the case where the eavesdropper can wiretap at most one channel at a time, we show that the secrecy capacity region, for a broad class of channels and any given network topology and communication demands  ...  , is equivalent to that of a corresponding network where each noisy wiretap channel is replaced by a noiseless wiretap channel.  ...  ACKNOWLEDGMENTS This work has been supported in part by NSF grants CNS 0905615, CCF 0830666, and CCF 1017632.  ... 
arXiv:1211.4081v1 fatcat:mxiwub2cbbdqvgexyg5stovtwy

Detecting Algebraic Manipulation in Leaky Storage Systems [article]

Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang
2016 arXiv   pre-print
We describe applications of ρ-AMD codes to, (i) robust ramp secret sharing scheme and, (ii) wiretap II channel when the adversary can eavesdrop a ρ fraction of codeword components and tamper with all components  ...  Algebraic Manipulation Detection (AMD) Codes detect adversarial noise that is added to a coded message and stored in a storage that is opaque to the adversary.  ...  The second application is a new variation of active adversary wiretap channel II. Robust ramp secret sharing scheme.  ... 
arXiv:1607.00089v2 fatcat:jnl3zlxxpjhpxdrcp62qhmyqwa

Non-Malleable Codes with Leakage and Applications to Secure Communication [article]

Fuchun Lin, Reihaneh Safavi-Naini, Mahdi Cheraghchi, Huaxiong Wang
2017 arXiv   pre-print
We show applications of our results in securing message communication against active physical layer adversaries in two settings: wiretap II with active adversaries and Secure Message Transmission (SMT)  ...  We define a class of functions that closely model tampering of communication by adversaries who can eavesdrop on a constant fraction of the transmitted codeword, and use this information to select a vector  ...  A (ρ r , 1)-active adversary wiretap II channel is a communication channel between Alice and Bob that is (partially) controlled by an adversary Eve with two capabilities: Read and Write.  ... 
arXiv:1708.05462v1 fatcat:orxuusucwvfqrjxwngfgamx3oy

Harnessing the Adversarial Perturbation to Enhance Security in the Autoencoder-Based Communication System

Deng, Sang
2020 Electronics  
To defend the self-perturbation from the loop-back channel, the legitimate receiver is re-trained with the adversarial training method.  ...  Given the vulnerability of deep neural network to adversarial attacks, the application of deep learning in the wireless physical layer arouses comprehensive security concerns.  ...  It means that the attacker can use its own model as a substitute model to design an adversarial perturbation and then attack the unknown models.  ... 
doi:10.3390/electronics9020294 fatcat:owy7mt6xjzabvp7wycktmoimia

Physical layer security in PLC networks: Achievable secrecy rate and channel effects

A. Pittolo, A. M. Tonello
2013 2013 IEEE 17th International Symposium on Power Line Communications and Its Applications  
This is due to different channel statistics and propagation scenario. To provide experimental evidence, we consider channel measures obtained in a in-ship and in a in-home measurement campaign.  ...  Although physical layer security is widely discussed for wireless systems, we can not say the same for the PLC context. As a starting point, the wireless case will be examined.  ...  Fig. 2 . 2 Models of wiretap channel.  ... 
doi:10.1109/isplc.2013.6525863 fatcat:nlb5sn2m45crbpgv5psoswkhpm

Physical Layer Security: A Paradigm Shift in Data Confidentiality [chapter]

Arsenia Chorti, Camilla Hollanti, Jean-Claude Belfiore, Harold Vincent Poor
2015 Lecture Notes in Electrical Engineering  
Subsequently it reviews some of the most significant advances in coding theory and system design that offer a concrete platform for the realization of the promise of this approach in data confidentiality  ...  to an eavesdropper by using appropriate encoding schemes that exploit the noise and fading effects of wireless communication channels.  ...  Bob) Applications of PLS Technologies and Extensions to Systems with Active Attacks In the absence of a feedback channel and under the assumption that only the statistics of the adversarial channel are  ... 
doi:10.1007/978-3-319-23609-4_1 fatcat:t3hwjd6kqjasli74zj7s6rxcbe

Secure Polar Coding for Adversarial Wiretap Channel [article]

Yizhi Zhao
2020 arXiv   pre-print
For the adversarial reading and writing action, we present a ρ equivalent channel block and study its transformation under the channel polarization operation.  ...  The adversarial wiretap channel (AWTC) model is a secure communication model in which adversary can directly read and write the transmitted bits in legitimate communication with fixed fractions.  ...  In the WTC model, two legitimate users, Alice and Bob, communicate through a noise main channel while an eavesdropper Eve is wiretapping through a noise wiretap channel.  ... 
arXiv:2003.00240v2 fatcat:ouacergxprguzbxd3xrxlayyky

Safeguarding MTC at the Physical Layer: Potentials and Challenges

D. P. Moya Osorio, E. E. Benitez Olivo, H. Alves, M. Latva-aho
2020 IEEE Access  
Thus, special emphasis will be given in the coming years to provide security and privacy for 5G and beyond networks.  ...  5G networks must provide a highly resilient, secure, and privacy-protected platform to support the emergence of new business and technologies expected from the so-called vertical-industry paradigm.  ...  A. PRACTICAL CHANNEL MODELS Accurate channel models are crucial for the appropriate design of system parameters and system performance evaluation.  ... 
doi:10.1109/access.2020.2996383 fatcat:espxiyuqnfgcvgw2yxy4p24vxy
« Previous Showing results 1 — 15 out of 1,107 results