TY - GEN
T1 - Optimal impersonation of CSI for maximizing leaked information to untrusted relay in PLNC
AU - Takyu, Osamu
AU - Matsumoto, Kengo
AU - Ohtsuki, Tomoaki
AU - Fujii, Takeo
AU - Sasamori, Fumihito
AU - Handa, Shiro
PY - 2016/1/1
Y1 - 2016/1/1
N2 - In Physical Layer Network Coding (PLNC), since the two sources access the relay station at a time, the relay station can hardly demodulate each information owing to the mutual interference between two transmitted signals. The PLNC achieves the high secure relay communication based on physical layer security (PLS). The source needs the transmit power control based on the channel state information (CSI) for maintaining the secure mutual interference. The untrusted relay, however, may impersonate the CSI for breaking it. So far, the authors have evaluated the amount of the leaked information to the untrusted relay by the impersonation of CSI but the leaked information is not maximal. For the countermeasure to the impersonation of CSI, the most powerful model of the untrusted relay to maximizing the leaked information is necessary. This paper constructs the optimal impersonation of CSI by a linear programing problem.
AB - In Physical Layer Network Coding (PLNC), since the two sources access the relay station at a time, the relay station can hardly demodulate each information owing to the mutual interference between two transmitted signals. The PLNC achieves the high secure relay communication based on physical layer security (PLS). The source needs the transmit power control based on the channel state information (CSI) for maintaining the secure mutual interference. The untrusted relay, however, may impersonate the CSI for breaking it. So far, the authors have evaluated the amount of the leaked information to the untrusted relay by the impersonation of CSI but the leaked information is not maximal. For the countermeasure to the impersonation of CSI, the most powerful model of the untrusted relay to maximizing the leaked information is necessary. This paper constructs the optimal impersonation of CSI by a linear programing problem.
UR - http://www.scopus.com/inward/record.url?scp=84989907587&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84989907587&partnerID=8YFLogxK
U2 - 10.1109/WCNC.2016.7565098
DO - 10.1109/WCNC.2016.7565098
M3 - Conference contribution
AN - SCOPUS:84989907587
T3 - IEEE Wireless Communications and Networking Conference, WCNC
BT - 2016 IEEE Wireless Communications and Networking Conference, WCNC 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2016 IEEE Wireless Communications and Networking Conference, WCNC 2016
Y2 - 3 April 2016 through 7 April 2016
ER -