Next Article in Journal
A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology
Next Article in Special Issue
Beamforming and Antenna Grouping Design for the Multi-Antenna Relay with Energy Harvesting to Improve Secrecy Rate
Previous Article in Journal
Using Proven Reference Monitor Patterns for Security Evaluation
Article Menu

Export Article

Open AccessArticle
Information 2016, 7(2), 24; doi:10.3390/info7020024

Super-Activation as a Unique Feature of Secure Communication in Malicious Environments

1
Information Theory and Applications Chair, Technische Universität Berlin, 10587 Berlin, Germany
2
Institute of Theoretical Information Technology, Technische Universität München, 80333 Munich, Germany
3
Department of Electrical Engineering, Princeton University, Princeton, NJ 08544, USA
These authors contributed equally to this work.
*
Author to whom correspondence should be addressed.
Academic Editor: Willy Susilo
Received: 28 January 2016 / Revised: 25 April 2016 / Accepted: 27 April 2016 / Published: 12 May 2016
(This article belongs to the Special Issue Physical Layer Security in Wireless Networks)
View Full-Text   |   Download PDF [330 KB, uploaded 13 May 2016]   |  

Abstract

The wiretap channel models secure communication between two users in the presence of an eavesdropper who must be kept ignorant of transmitted messages. This communication scenario is studied for arbitrarily varying channels (AVCs), in which the legitimate users know only that the true channel realization comes from a pre-specified uncertainty set and that it varies from channel use to channel use in an arbitrary and unknown manner. This concept not only captures the case of channel uncertainty, but also models scenarios in which malevolent adversaries influence or jam the transmission of the legitimate users. For secure communication over orthogonal arbitrarily varying wiretap channels (AVWCs) it has been shown that the phenomenon of super-activation occurs; that is, there are orthogonal AVWCs, each having zero secrecy capacity, which allow for transmission with positive rate if they are used together. It is shown that for such orthogonal AVWCs super-activation is generic in the sense that whenever super-activation is possible, it is possible for all AVWCs in a certain neighborhood as well. As a consequence, a super-activated AVWC is robust and continuous in the uncertainty set, although a single AVWC might not be. Moreover, it is shown that the question of super-activation and the continuity of the secrecy capacity solely depends on the legitimate link. Accordingly, the single-user AVC is subsequently studied and it is shown that in this case, super-activation for non-secure message transmission is not possible making it a unique feature of secure communication over AVWCs. However, the capacity for message transmission of the single-user AVC is shown to be super-additive including a complete characterization. Such knowledge is important for medium access control and in particular resource allocation as it determines the overall performance of a system. View Full-Text
Keywords: wiretap channel; arbitrarily varying channel (AVC); secrecy capacity; super-activation; super-additivity; active attacks; malicious behavior wiretap channel; arbitrarily varying channel (AVC); secrecy capacity; super-activation; super-additivity; active attacks; malicious behavior
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Schaefer, R.F.; Boche, H.; Poor, H.V. Super-Activation as a Unique Feature of Secure Communication in Malicious Environments. Information 2016, 7, 24.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Information EISSN 2078-2489 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top