Optimal impersonation of CSI for maximizing leaked information to untrusted relay in PLNC

Osamu Takyu, Kengo Matsumoto, Tomoaki Ohtsuki, Takeo Fujii, Fumihito Sasamori, Shiro Handa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In Physical Layer Network Coding (PLNC), since the two sources access the relay station at a time, the relay station can hardly demodulate each information owing to the mutual interference between two transmitted signals. The PLNC achieves the high secure relay communication based on physical layer security (PLS). The source needs the transmit power control based on the channel state information (CSI) for maintaining the secure mutual interference. The untrusted relay, however, may impersonate the CSI for breaking it. So far, the authors have evaluated the amount of the leaked information to the untrusted relay by the impersonation of CSI but the leaked information is not maximal. For the countermeasure to the impersonation of CSI, the most powerful model of the untrusted relay to maximizing the leaked information is necessary. This paper constructs the optimal impersonation of CSI by a linear programing problem.

Original languageEnglish
Title of host publication2016 IEEE Wireless Communications and Networking Conference, WCNC 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467398145
DOIs
Publication statusPublished - 2016 Jan 1
Event2016 IEEE Wireless Communications and Networking Conference, WCNC 2016 - Doha, Qatar
Duration: 2016 Apr 32016 Apr 7

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
ISSN (Print)1525-3511

Other

Other2016 IEEE Wireless Communications and Networking Conference, WCNC 2016
Country/TerritoryQatar
CityDoha
Period16/4/316/4/7

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint

Dive into the research topics of 'Optimal impersonation of CSI for maximizing leaked information to untrusted relay in PLNC'. Together they form a unique fingerprint.

Cite this