首页> 外文会议>Asilomar Conference on Signals, Systems Computers >Wiretap-channels with constrained active attacks
【24h】

Wiretap-channels with constrained active attacks

机译:具有受限制的主动攻击的窃听通道

获取原文

摘要

In this paper, we calculate an achievable secrecy rate for the Wiretap Channel (WTC) with an active eavesdropper, who is subject to a distortion constraint, in general. Furthermore, we consider the replacement attack and jamming attack explicitly, when imposing symbol, peak or an average constraint on the jamming sequence. We show, that in all cases the optimal strategy for the eavesdropper is to disturb each symbol equiprobable in the former case, or to jam each symbol with the same jamming power in the latter case. A consequence is, that the eavesdropper's replacement attack can be modeled as an additional Binary Symmetric Channel (BSC). Additionally, we demonstrate, that if the attacker is able to induce a channel corruption which corresponds to his own channel's degradedness or which is even worse, no positive secrecy rate is achievable.
机译:在本文中,我们通常使用受监听约束的窃听者,为窃听通道(WTC)计算可达到的保密率。此外,当在干扰序列上施加符号,峰值或平均约束时,我们会明确考虑替换攻击和干扰攻击。我们表明,在所有情况下,窃听者的最佳策略是在前一种情况下扰乱每个符号,或者在后一种情况下以相同的干扰力干扰每个符号。结果是,窃听者的替换攻击可以建模为附加的二进制对称信道(BSC)。此外,我们证明,如果攻击者能够诱发与他自己的通道的降级相对应或什至更糟的通道损坏,则无法实现正的保密率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号