Filters








1,323 Hits in 1.6 sec

A Model for Adversarial Wiretap Channel [article]

Pengwei Wang, Reihaneh Safavi-Naini
2014 arXiv   pre-print
In this paper we propose a model for adversarial wiretap (AWTP) channel that models active adversaries at this layer.  ...  In wiretap model of secure communication the goal is to provide (asymptotic) perfect secrecy and reliable communication over a noisy channel that is eavesdropped by an adversary with unlimited computational  ...  The model effectively replaces probabilistic noise over the main channel in Wyner's wiretap model with adversarial noise, and for the wiretapper channel adopts the Wyner's wiretap II model, allowing the  ... 
arXiv:1312.6457v3 fatcat:yecptfdpzfbu7lqjri67hte3je

A Model for Adversarial Wiretap Channels and its Applications

Reihaneh Safavi-Naini, Pengwei Wang
2015 Journal of Information Processing  
We consider a coding-theoretic model for wiretap channels with active adversaries who can choose their view of the communication channel and also add adversarial noise to the channel.  ...  In the wiretap model of secure communication, Alice is connected to Bob and Eve by two noisy channels.  ...  The model naturally extends the wiretap II model and gives a codingtheoretic model for active adversaries for the wiretap.  ... 
doi:10.2197/ipsjjip.23.554 fatcat:fuudrnzbjvhdxiuchts6ps5bgm

On the capacity of the binary adversarial wiretap channel [article]

Carol Wang
2016 arXiv   pre-print
New bounds on the semantic secrecy capacity of the binary adversarial wiretap channel are established .  ...  Against an adversary which reads a ρ_r fraction of the transmitted codeword and modifies a ρ_w fraction of the codeword, we show an achievable rate of 1-h(ρ_w)-ρ_r, where h(·) is the binary entropy function  ...  Thanks as well to Sidharth Jaggi for sharing a draft of his work on myopic adversaries.  ... 
arXiv:1605.01330v2 fatcat:nh5nmnry3ngsnexrc7yob5tlbm

Detection of Algebraic Manipulation in the Presence of Leakage [chapter]

Hadi Ahmadi, Reihaneh Safavi-Naini
2014 Lecture Notes in Computer Science  
We thus introduce a new optimal BLR-AMD code construction and prove its security in the model. We show an application of LR-AMD codes to tampering detection over wiretap channels.  ...  We investigate the problem of algebraic manipulation detection (AMD) over a communication channel that partially leaks information to an adversary.  ...  The adversarial channel model was later proposed by Hamming [9] as an alternative to Shannon's model.  ... 
doi:10.1007/978-3-319-04268-8_14 fatcat:4fuddjzkezgfrjny32huwvw36y

Learning Secured Modulation With Deep Adversarial Neural Networks [article]

Hesham Mohammed, Dola Saha
2020 arXiv   pre-print
Our results show that a trusted pair of users can exchange data bits in both clean and noisy channels, where a trained adversary cannot decipher the data.  ...  We introduce a discrete activation layer with a defined gradient to combat noise in a lossy channel.  ...  We used Adam optimizer [25] with a learning rate of 0.001. The number of training epoch is 4000 for clear wiretap channel, 7000 for Gaussian wiretap channel and 8000 for Rayleigh wiretap channel.  ... 
arXiv:2005.13694v1 fatcat:5rfylo2surdvdl36yr6ae4oxve

Secure Polar Coding for Adversarial Wiretap Channel [article]

Yizhi Zhao
2020 arXiv   pre-print
The adversarial wiretap channel (AWTC) model is a secure communication model in which adversary can directly read and write the transmitted bits in legitimate communication with fixed fractions.  ...  For the adversarial reading and writing action, we present a ρ equivalent channel block and study its transformation under the channel polarization operation.  ...  Now we present the definition of adversarial wiretap channel model (AWTC) [3] . Definition 1 The adversarial wiretap channel model is defined as (X , Y, Z, ρ r , ρ w , S r , S w ).  ... 
arXiv:2003.00240v2 fatcat:ouacergxprguzbxd3xrxlayyky

A Virtual Wiretap Channel for Secure Message Transmission [chapter]

Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin
2017 Lecture Notes in Computer Science  
In this paper we develop an abstract model for BiT protocol as a wiretap channel and refer to it as a virtual wiretap channel.  ...  In the Wyner wiretap channel a sender is connected to a receiver and an eavesdropper through two noisy channels.  ...  Wiretap Channel Model.  ... 
doi:10.1007/978-3-319-61273-7_9 fatcat:jteug5az6fg57lwecfltb4hl3i

Adversarial Wiretap Channel with Public Discussion [article]

Pengwei Wang, Reihaneh Safavi-Naini
2015 arXiv   pre-print
We consider an adversarial model of wiretap channel proposed in [18,19] where the adversary is active: it selects a fraction ρ_r of the transmitted codeword to eavesdrop and a fraction ρ_w of the codeword  ...  Wyner's elegant model of wiretap channel exploits noise in the communication channel to provide perfect secrecy against a computationally unlimited eavesdropper without requiring a shared key.  ...  In this paper we consider a model of adversarial wiretap channel (AWTP channel) that is proposed in [18, 19] .  ... 
arXiv:1403.5598v4 fatcat:qfpbc2olcja5nm6zdan64ni76e

Network equivalence in the presence of an eavesdropper

Theodoros K. Dikaliotis, Hongyi Yao, Tracey Ho, Michelle Effros, Joerg Kliewer
2012 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton)  
For the case where the eavesdropper can wiretap at most one channel at a time, we show that the secrecy capacity region, for a broad class of channels and any given network topology and communication demands  ...  , is equivalent to that of a corresponding network where each noisy wiretap channel is replaced by a noiseless wiretap channel.  ...  wiretap network for which lower bound model-II is not tight but lower bound model-II is tight.Lower bound model-I.  ... 
doi:10.1109/allerton.2012.6483322 dblp:conf/allerton/DikaliotisYHEK12 fatcat:fhqlfym3jbcfzcvmd5uerscygy

Network Equivalence in the Presence of an Eavesdropper [article]

Theodoros K. Dikaliotis, Hongyi Yao, Tracey Ho, Michelle Effros, Joerg Kliewer
2012 arXiv   pre-print
For the case where the eavesdropper can wiretap at most one channel at a time, we show that the secrecy capacity region, for a broad class of channels and any given network topology and communication demands  ...  , is equivalent to that of a corresponding network where each noisy wiretap channel is replaced by a noiseless wiretap channel.  ...  wiretap network for which lower bound model-II is not tight but lower bound model-II is tight.Lower bound model-I.  ... 
arXiv:1211.4081v1 fatcat:mxiwub2cbbdqvgexyg5stovtwy

Harnessing the Adversarial Perturbation to Enhance Security in the Autoencoder-Based Communication System

Deng, Sang
2020 Electronics  
To defend the self-perturbation from the loop-back channel, the legitimate receiver is re-trained with the adversarial training method.  ...  The FD legitimate receiver transmits a well-designed adversary perturbation signal to jam the eavesdropper while receiving information simultaneously.  ...  To improve System Model Due to the broadcast nature and openness of the wireless channel, a legitimate receiver may encounter the active attack of a jammer or an external eavesdropper may wiretap the  ... 
doi:10.3390/electronics9020294 fatcat:owy7mt6xjzabvp7wycktmoimia

Detecting Algebraic Manipulation in Leaky Storage Systems [article]

Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang
2016 arXiv   pre-print
We describe applications of ρ-AMD codes to, (i) robust ramp secret sharing scheme and, (ii) wiretap II channel when the adversary can eavesdrop a ρ fraction of codeword components and tamper with all components  ...  Algebraic Manipulation Detection (AMD) Codes detect adversarial noise that is added to a coded message and stored in a storage that is opaque to the adversary.  ...  Wiretap II codes. Wiretap II model [5] of secure communication considers a scenario where Alice wants to send messages to Bob over a reliable channel that is eavesdropped by an adversary, Eve.  ... 
arXiv:1607.00089v2 fatcat:jnl3zlxxpjhpxdrcp62qhmyqwa

Physical layer security in PLC networks: Achievable secrecy rate and channel effects

A. Pittolo, A. M. Tonello
2013 2013 IEEE 17th International Symposium on Power Line Communications and Its Applications  
Although physical layer security is widely discussed for wireless systems, we can not say the same for the PLC context. As a starting point, the wireless case will be examined.  ...  To provide experimental evidence, we consider channel measures obtained in a in-ship and in a in-home measurement campaign.  ...  Fig. 2 . 2 Models of wiretap channel.  ... 
doi:10.1109/isplc.2013.6525863 fatcat:nlb5sn2m45crbpgv5psoswkhpm

Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation [article]

Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai
2022 IACR Cryptology ePrint Archive  
A wiretap coding scheme (Wyner, Bell Syst. Tech.  ...  This follows from their full characterization of the channel pairs (ChB, ChE) that enable information-theoretic wiretap coding.  ...  A wiretap coding scheme Π for wiretap channel (ChB, ChE) and message space M in the ideal obfuscation model is a pair of algorithms (Enc, Dec (•) ).  ... 
dblp:journals/iacr/IshaiKLS22 fatcat:xunk43vmdnfczoprj7e25gadwy

On The Compound MIMO Wiretap Channel with Mean Feedback [article]

Amr Abdelaziz, C. Emre Koksal, Hesham El Gamal, Ashraf D. Elbayoumy
2017 arXiv   pre-print
Compound MIMO wiretap channel with double sided uncertainty is considered under channel mean information model.  ...  Finally, An equivalence relation with MIMO wiretap channel in Rician fading environment is established.  ...  Compound wiretap channel [4] , [5] is a model that tackle these limitations in which CSI is known only to belong to a certain class of uncertainty.  ... 
arXiv:1701.07518v4 fatcat:h4bkfi6ybrarxg72okahyxme6a
« Previous Showing results 1 — 15 out of 1,323 results