Evaluation of information leak by robustness evaluation of countermeasure to disguised CSI in PLNC considering physical layer security

Kengo Matsumoto, Osamu Takyu, Takeo Fujii, Tomoaki Ohtsuki, Fumihito Sasamori, Shiro Handa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In Physical Layer Network Coding (PLNC), the two information sources access to the relay station, simultaneously and thus the transmitted signals are combined, together. Since the relay station hardly decodes each information single, the security for avoiding the information leak to the relay station is maintained. Therefore, the PLNC is attracting much attention in terms of physical layer security (PLS). However, the information source needs the transmit power control based on the channel state information (CSI). If the relay station is untrusted, it camouflages the real CSI for stealing the information. This paper considers the camouflaging of CSI is modeled as the liner programming problem in the subject to the statistic of CSI following the model of propagation. We clarify the maximal capacity of tapping by the relay station.

Original languageEnglish
Title of host publicationIEEE Radio and Wireless Symposium, RWS
PublisherIEEE Computer Society
Pages123-125
Number of pages3
Volume2015-June
EditionJune
DOIs
Publication statusPublished - 2015 Jun 19
Event2015 IEEE Radio and Wireless Symposium, RWS 2015 - RWW 2015 - San Diego, United States
Duration: 2015 Jan 252015 Jan 28

Other

Other2015 IEEE Radio and Wireless Symposium, RWS 2015 - RWW 2015
Country/TerritoryUnited States
CitySan Diego
Period15/1/2515/1/28

Keywords

  • Physical Layer Network Coding(PLNC)
  • Physical Layer Security(PLS)

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Communication

Fingerprint

Dive into the research topics of 'Evaluation of information leak by robustness evaluation of countermeasure to disguised CSI in PLNC considering physical layer security'. Together they form a unique fingerprint.

Cite this