Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas

Xiang He, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations

    Abstract

    Despite recent attempts with compound channel settings, guaranteeing information theoretically secure communication rates with no knowledge of the eavesdropper channel states has been elusive to date. In this work, we address this problem, and consider the worst case scenario where the eavesdropper's channel is arbitrarily varying, and is known only by itself. We show that it is possible to provide non-zero secure communication rates with the aid of multiple antennas. Under the mild assumption that the number of antennas at the eavesdropper is limited, we provide the strong secrecy rate for the MIMO wiretap channel. Specifically, it is proved that there exists a universal coding scheme that secures the confidential message against any sequence of channel states experienced by the eavesdropper. We show that the result is tight in terms of secure degrees of freedom.

    Original languageEnglish (US)
    Title of host publication2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010
    Pages1228-1235
    Number of pages8
    DOIs
    StatePublished - 2010
    Event48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010 - Monticello, IL, United States
    Duration: Sep 29 2010Oct 1 2010

    Publication series

    Name2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010

    Other

    Other48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010
    Country/TerritoryUnited States
    CityMonticello, IL
    Period9/29/1010/1/10

    All Science Journal Classification (ASJC) codes

    • Computer Networks and Communications
    • Control and Systems Engineering

    Fingerprint

    Dive into the research topics of 'Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas'. Together they form a unique fingerprint.

    Cite this