IEICE Technical Committee Submission System
Conference Paper's Information
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top Page Go Previous   [Japanese] / [English] 

Paper Abstract and Keywords
Presentation 2015-03-04 09:25
Optimal Design of Impersonated CSI maximize Information Leak in Untrusted Relay
Kengo Matsumoto, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ), Fumihito Sasamori, Shiro Handa (Shinshu Univ) RCS2014-302
Abstract (in Japanese) (See Japanese page) 
(in English) In Physical Layer Network Coding (PLNC), the two information sources access to the relay station, simultaneously and thus the transmitted signals are combined, together. Since the relay station hardly decodes each information single, the security for avoiding the information leak to the relay station is maintained. Therefore, the PLNC is attracting much attention in terms of physical layer security (PLS). However, the information source needs the transmit power control based on the channel state information (CSI). If the relay station is untrusted, it camouflages the real CSI for stealing the information. So far, the authors have evaluated the amount of information that relay station can exploit in secret by the CSI impersonation. However, the method of disguised CSI for maximizing the information leaked to the untrusted relay has not been clarified, yet. This paper considers that the CSI impersonation is constructed by the linear programing problem for maximizing the leaked information to the untrusted relay. From the numerical results, if it is the constrained condition for the impersonation of CSI that the stochastic model of CSI is perfectly matched to the channel model, such as Rayleigh fading, the information leaked to the untrusted relay can be reduced.
Keyword (in Japanese) (See Japanese page) 
(in English) Physical Layer Security(PLS) / Physical Layer Network Coding(PLNC) / Channel State Information(CSI) / Linear Programming Problem / / / /  
Reference Info. IEICE Tech. Rep., vol. 114, no. 490, RCS2014-302, pp. 5-9, March 2015.
Paper # RCS2014-302 
Date of Issue 2015-02-25 (RCS) 
ISSN Print edition: ISSN 0913-5685  Online edition: ISSN 2432-6380
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
Download PDF RCS2014-302

Conference Information
Committee RCS SR SRW  
Conference Date 2015-03-04 - 2015-03-06 
Place (in Japanese) (See Japanese page) 
Place (in English) Tokyo Institute of Technology 
Topics (in Japanese) (See Japanese page) 
Topics (in English) Mobile Communication Workshop 
Paper Information
Registration To RCS 
Conference Code 2015-03-RCS-SR-SRW 
Language Japanese 
Title (in Japanese) (See Japanese page) 
Sub Title (in Japanese) (See Japanese page) 
Title (in English) Optimal Design of Impersonated CSI maximize Information Leak in Untrusted Relay 
Sub Title (in English)  
Keyword(1) Physical Layer Security(PLS)  
Keyword(2) Physical Layer Network Coding(PLNC)  
Keyword(3) Channel State Information(CSI)  
Keyword(4) Linear Programming Problem  
1st Author's Name Kengo Matsumoto  
1st Author's Affiliation Shinshu University (Shinshu Univ)
2nd Author's Name Osamu Takyu  
2nd Author's Affiliation Shinshu University (Shinshu Univ)
3rd Author's Name Takeo Fujii  
3rd Author's Affiliation The University of Electro-communications (UEC)
4th Author's Name Tomoaki Ohtsuki  
4th Author's Affiliation Keio University (Keio Univ)
5th Author's Name Fumihito Sasamori  
5th Author's Affiliation Shinshu University (Shinshu Univ)
6th Author's Name Shiro Handa  
6th Author's Affiliation Shinshu University (Shinshu Univ)
7th Author's Name  
7th Author's Affiliation ()
8th Author's Name  
8th Author's Affiliation ()
9th Author's Name  
9th Author's Affiliation ()
10th Author's Name  
10th Author's Affiliation ()
11th Author's Name  
11th Author's Affiliation ()
12th Author's Name  
12th Author's Affiliation ()
13th Author's Name  
13th Author's Affiliation ()
14th Author's Name  
14th Author's Affiliation ()
15th Author's Name  
15th Author's Affiliation ()
16th Author's Name  
16th Author's Affiliation ()
17th Author's Name  
17th Author's Affiliation ()
18th Author's Name  
18th Author's Affiliation ()
19th Author's Name  
19th Author's Affiliation ()
20th Author's Name  
20th Author's Affiliation ()
Date Time 2015-03-04 09:25:00 
Presentation Time 25 
Registration for RCS 
Paper # IEICE-RCS2014-302 
Volume (vol) IEICE-114 
Number (no) no.490 
Page pp.5-9 
#Pages IEICE-5 
Date of Issue IEICE-RCS-2015-02-25 

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan