Data transmissions with information leakage
Vestnik Sankt-Peterburgskogo universiteta. Prikladnaâ matematika, informatika, processy upravleniâ, no. 2 (2011), pp. 40-54
Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice de l'article

The problem of optimal signal transmission by the user when there is eavesdropping in a wireless network, by summarizing the results of P. K. Gopala, L. Lai, H. El Gamal in the case where a condition in the form of cost for an information transmission is superimposed on a signal transmission process, as well as in the case when the transmission process itself cannot occur simultaneously but over a certain number of time slots.
Keywords: wireless networks, secrecy Shannon capacity, eavesdropping, closed form solution, optimal strategies, non-linear programming.
@article{VSPUI_2011_2_a4,
     author = {M. A. Zolotukhin and A. Yu. Garnaev and V. V. Zakharov},
     title = {Data transmissions with information leakage},
     journal = {Vestnik Sankt-Peterburgskogo universiteta. Prikladna\^a matematika, informatika, processy upravleni\^a},
     pages = {40--54},
     year = {2011},
     number = {2},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/VSPUI_2011_2_a4/}
}
TY  - JOUR
AU  - M. A. Zolotukhin
AU  - A. Yu. Garnaev
AU  - V. V. Zakharov
TI  - Data transmissions with information leakage
JO  - Vestnik Sankt-Peterburgskogo universiteta. Prikladnaâ matematika, informatika, processy upravleniâ
PY  - 2011
SP  - 40
EP  - 54
IS  - 2
UR  - http://geodesic.mathdoc.fr/item/VSPUI_2011_2_a4/
LA  - ru
ID  - VSPUI_2011_2_a4
ER  - 
%0 Journal Article
%A M. A. Zolotukhin
%A A. Yu. Garnaev
%A V. V. Zakharov
%T Data transmissions with information leakage
%J Vestnik Sankt-Peterburgskogo universiteta. Prikladnaâ matematika, informatika, processy upravleniâ
%D 2011
%P 40-54
%N 2
%U http://geodesic.mathdoc.fr/item/VSPUI_2011_2_a4/
%G ru
%F VSPUI_2011_2_a4
M. A. Zolotukhin; A. Yu. Garnaev; V. V. Zakharov. Data transmissions with information leakage. Vestnik Sankt-Peterburgskogo universiteta. Prikladnaâ matematika, informatika, processy upravleniâ, no. 2 (2011), pp. 40-54. http://geodesic.mathdoc.fr/item/VSPUI_2011_2_a4/

[1] Bennett C., Brassard G., Crepeau C., Maurer U. M., “Generalized privacy amplification”, IEEE Trans. on Information Theory, 41 (1995), 1915–1923 | DOI | MR | Zbl

[2] Garnaev A. Trappe W., “An eavesdropping game with SINR as an objective function”, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 19, 2009, 142–162 | DOI | Zbl

[3] Hero A. E., “Secure Space-Time Communication”, IEEE Trans. Info. Theory, 23 (2003), 3235–3249 | DOI | MR

[4] Koorapaty H., Hassan A. A., Chennakeshu S., “Secure Information Transmission for Mobile Radio”, IEEE Trans. Wireless Commun., 41 (2003), 52–55

[5] Liang Y., Poor H. V., Shamai S., “Secure Communication over Fading Channels”, IEEE Transactions on Information Theory, 54:6, Special issue on Information Theoretic Security (2008), 2470–2492 | DOI | MR

[6] Wyner A., “The wire-tap channel”, Bell. Syst. Tech. J., 54:8 (1975), 1355–1387 | MR | Zbl

[7] Gopala P. K., Lai L., El Gamal H., “On the Secrecy Capacity of Fading Channels”, IEEE Transactions on Information Theory, 54:10 (2008), 4687–4698 | DOI | MR

[8] Ueli M. Maurer, Stefan Wolf., “Information-theoretic key agreement: From weak to strong secrecy for free”, EUROCRYPT, 2000, 351–368 | MR | Zbl

[9] Shannon C. E., “A Mathematical Theory of Communication”, Bell System Technical Journal, 27 (1948), 379–423, 623–656 | MR | Zbl

[10] Shannon C. E., “Communication theory of secrecy systems”, Bell System Technical Journal, 28 (1949), 656–715 | MR | Zbl

[11] Altman E., Avrachenkov K., Garnaev A., “A jamming game in wireless networks with transmission cost”, Lecture Notes in Computer Science, 4465, 2007, 1–12 | DOI | Zbl

[12] Vishnevskii V. M., Lyakhov A. I., Portnoi S. L., Shakhnovich I. V., Shirokopolosnye besprovodnye seti peredachi informatsii, Tekhnosfera, M., 2005, 592 pp.

[13] Leung-Yan-Cheong S. K., Hellman M. E., “The Gaussian Wire-Tap Channel”, IEEE Trans. on Information Theory, 24 (1978), 451–456 | DOI | MR | Zbl

[14] Liang Y., Poor H. V., “Generalized multiple access channels with confidential messages”, IEEE Trans. on Information Theory, 2007, 112–122 | MR