Information-Theoretically Secure Communication Under Channel Uncertainty
dc.contributor | Liu, Tie | |
dc.creator | Ly, Hung Dinh | |
dc.date.accessioned | 2012-07-16T15:57:48Z | |
dc.date.accessioned | 2012-07-16T20:26:27Z | |
dc.date.accessioned | 2017-04-07T20:00:11Z | |
dc.date.available | 2012-07-16T15:57:48Z | |
dc.date.available | 2012-07-16T20:26:27Z | |
dc.date.available | 2017-04-07T20:00:11Z | |
dc.date.created | 2012-05 | |
dc.date.issued | 2012-07-16 | |
dc.description.abstract | Secure communication under channel uncertainty is an important and challenging problem in physical-layer security and cryptography. In this dissertation, we take a fundamental information-theoretic view at three concrete settings and use them to shed insight into efficient secure communication techniques for different scenarios under channel uncertainty. First, a multi-input multi-output (MIMO) Gaussian broadcast channel with two receivers and two messages: a common message intended for both receivers (i.e., channel uncertainty for decoding the common message at the receivers) and a confidential message intended for one of the receivers but needing to be kept asymptotically perfectly secret from the other is considered. A matrix characterization of the secrecy capacity region is established via a channel-enhancement argument and an extremal entropy inequality previously established for characterizing the capacity region of a degraded compound MIMO Gaussian broadcast channel. Second, a multilevel security wiretap channel where there is one possible realization for the legitimate receiver channel but multiple possible realizations for the eavesdropper channel (i.e., channel uncertainty at the eavesdropper) is considered. A coding scheme is designed such that the number of secure bits delivered to the legitimate receiver depends on the actual realization of the eavesdropper channel. More specifically, when the eavesdropper channel realization is weak, all bits delivered to the legitimate receiver need to be secure. In addition, when the eavesdropper channel realization is strong, a prescribed part of the bits needs to remain secure. We call such codes security embedding codes, referring to the fact that high-security bits are now embedded into the low-security ones. We show that the key to achieving efficient security embedding is to jointly encode the low-security and high-security bits. In particular, the low-security bits can be used as (part of) the transmitter randomness to protect the high-security ones. Finally, motivated by the recent interest in building secure, robust and efficient distributed information storage systems, the problem of secure symmetrical multilevel diversity coding (S-SMDC) is considered. This is a setting where there are channel uncertainties at both the legitimate receiver and the eavesdropper. The problem of encoding individual sources is first studied. A precise characterization of the entire admissible rate region is established via a connection to the problem of secure coding over a three-layer wiretap network and utilizing some basic polyhedral structure of the admissible rate region. Building on this result, it is then shown that the simple coding strategy of separately encoding individual sources at the encoders can achieve the minimum sum rate for the general S-SMDC problem. | |
dc.identifier.uri | http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-10822 | |
dc.language.iso | en_US | |
dc.subject | Channel uncertainty | |
dc.subject | secure communication | |
dc.subject | MIMO secure communication | |
dc.subject | security embedding | |
dc.subject | secure symmetrical multilevel diversity coding | |
dc.subject | secure distributed storage systems | |
dc.subject | physical-layer security | |
dc.title | Information-Theoretically Secure Communication Under Channel Uncertainty | |
dc.type | Thesis |