Project Details
Projekt Print View

Information theoretic secrecy for multiple access and broadcast channels

Subject Area Electronic Semiconductors, Components and Circuits, Integrated Systems, Sensor Technology, Theoretical Electrical Engineering
Term from 2014 to 2023
Project identifier Deutsche Forschungsgemeinschaft (DFG) - Project number 253552306
 
Final Report Year 2023

Final Report Abstract

In future wireless networks, in addition to fulfilling the higher data rate requirements by the users more and novel key performance indicators need to be addressed. In particular, those networks are required to fulfill the demands of the users in terms of secrecy, privacy, and confidentiality. While this is a task usually deferred to higher layers in the technical communication stack, in the project a novel security paradigm referred to information-theoretic security is investigated which aims at providing security at the physical layer. Within this context, the project aimed at several important aspects, namely • how the deliver sensitive data to users in a wireless networks while ensuring privacy in utilizing the concept of caching at the physical layer • the characterization of fundamentals limits of secure communication with various security constraints and network assumptions • the impact of lack of knowing the wireless channels in the network perfectly. In particular, due to the broadcast nature of the wireless medium, the communication link from the base station and the legitimate receivers can be eavesdropped by third parties. In order to reduce the potential of leakage various concepts at the physical layer have been investigated, starting with physical-layer caching, symbol extension with jamming signals and utilizing side information at the nodes. In the project, we have studied the fundamental information theoretic limits in terms of lower and upper bounds on the secrecy capacity in both wired and wireless networks to either exactly characterize the secrecy capacity or approximately in terms of the secure generalized degrees of freedom. In particular, two important security constraints have been addressed, namely individual and common security. While the former aims at ensuring confidentiality of data with a user-centric perspective, the later aims at joint confidentiality from the network perspective. The insights obtained from the results indicate the tradeoff between secrecy and rate and the need for more effort in achieving global security as a function of network parameters. In particular, for future communication systems, provably secure communication is of central importance. Information-theoretical security is of central significance here for secure communication. Jamming attacks are serious hostile attacks on the communication system. Digital computing has fundamental limits for proving the necessary security performance and resilience. Automated proof of the required system performance is not possible on the basis of digital computers. On the other hand, the security guarantees and resilience can be proven by mathematical proofs.

Publications

 
 

Additional Information

Textvergrößerung und Kontrastanpassung