2015
DOI: 10.1109/jproc.2015.2459652
|View full text |Cite
|
Sign up to set email alerts
|

Secure Communication Under Channel Uncertainty and Adversarial Attacks

Abstract: This paper surveys various channel models that capture channel uncertainty at transmitters and adversarial attacks, and reviews design of information-theoretic schemes to achieve secure communications and characterization of the secrecy capacity for these models.ABSTRACT | Information theoretic approaches to security have been examined as a promising complement to current cryptographic techniques. Such information theoretic approaches establish reliable communication and data confidentiality directly at the ph… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 56 publications
(22 citation statements)
references
References 57 publications
0
22
0
Order By: Relevance
“…Moreover, these basic ideas have been applied in other settings, such as optical communication (53,54) and situations with adversarial attacks (25), and in other application areas, such as biometric identification systems (55,56) and smart electricity grids (57).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, these basic ideas have been applied in other settings, such as optical communication (53,54) and situations with adversarial attacks (25), and in other application areas, such as biometric identification systems (55,56) and smart electricity grids (57).…”
Section: Resultsmentioning
confidence: 99%
“…A survey on secure communication under channel uncertainty and adversarial attacks can be found in ref. 25.…”
Section: [3]mentioning
confidence: 99%
“…A characterization of achievable rates for this attack scenario is not known, except for the source model for secret key generation, which has been derived in [21]. For an overview of these types of attacks, see [22]. Recently, the corresponding problem for wiretap channels could be solved [23,24].…”
Section: Discussionmentioning
confidence: 99%
“…The golden section search [38] or uniform sampling search can be exploited to acquire the optimal α and γ * (τ ′ ). The optimal α should be chosen as the one that leads to the maximum γ * (τ ′ ) in (12). Ultimately, the optimal Q 0 , Q c and Q a , denoted by (Q * 0 , Q * c , Q * a ), can be retrieved through the relation (14).…”
Section: B a Charnes-cooper Transformation-based Line Searchmentioning
confidence: 99%