Rate-Distortion-Based Physical Layer Secrecy with Applications to Multimode Fiber

被引:11
作者
Song, Eva C. [1 ]
Soljanin, Emina [2 ]
Cuff, Paul [1 ]
Poor, H. Vincent [1 ]
Guan, Kyle [2 ]
机构
[1] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
[2] Alcatel Lucent, Bell Labs, Murray Hill, NJ 07974 USA
基金
美国国家科学基金会;
关键词
Terms-rate-distortion; MIMO; optical fiber communication; source-channel coding; secrecy; SDM; MMF; CONFIDENTIAL MESSAGES; BROADCAST CHANNELS;
D O I
10.1109/TCOMM.2014.010914.130256
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Optical networks are vulnerable to physical layer attacks; wiretappers can improperly receive messages intended for legitimate recipients. Multimode fiber (MMF) transmission can be modeled via a broadcast channel in which both the legitimate receiver's and wiretapper's channels are multiple-input- multiple-output complex Gaussian channels. This work considers the theoretical aspects of this security problem in the domain of a broadcast channel. Source-channel coding analyses based on the use of distortion as the metric for secrecy are developed. Alice has a source sequence to be encoded and transmitted over this broadcast channel so that the legitimate user Bob can reliably decode it while forcing the distortion of the wiretapper, or eavesdropper, Eve's estimate to be as high as possible. Tradeoffs between transmission rate and distortion under two extreme scenarios are examined: the best case where Eve has only her channel output and the worst case where she also knows the past realization of the source. It is shown that under the best case, an operationally separate source-channel coding scheme guarantees maximum distortion at the same rate as needed for reliable transmission. Theoretical bounds are given, and particularized for MMF. Numerical results showing the rate distortion tradeoff are presented and compared with corresponding results for the perfect secrecy case.
引用
收藏
页码:1080 / 1090
页数:11
相关论文
共 17 条
[1]  
[Anonymous], 2011, INFORM THEORY CODING, DOI DOI 10.1017/CBO9780511921889
[2]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[3]  
Cuff P., P 2010 IEEE GLOB TEL, P1
[4]  
Guan K., P 2012 EUR C EXH OPT
[5]  
Guan K, 2012, CONF REC ASILOMAR C, P654, DOI 10.1109/ACSSC.2012.6489091
[6]   Multiple-Input Multiple-Output Gaussian Broadcast Channels With Common and Confidential Messages [J].
Ly, Hung D. ;
Liu, Tie ;
Liang, Yingbin .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (11) :5477-5487
[7]  
Maurer U, 2000, LECT NOTES COMPUT SC, V1807, P351
[8]   The Secrecy Capacity of the MIMO Wiretap Channel [J].
Oggier, Frederique ;
Hassibi, Babak .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (08) :4961-4972
[9]  
Schaefer R. F., P 2013 IEEE INFORM T
[10]  
Schieler C., 2013, CORR