Paper Abstract and Keywords |
Presentation |
2015-03-04 09:25
Optimal Design of Impersonated CSI maximize Information Leak in Untrusted Relay Kengo Matsumoto, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ), Fumihito Sasamori, Shiro Handa (Shinshu Univ) RCS2014-302 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
In Physical Layer Network Coding (PLNC), the two information sources access to the relay station, simultaneously and thus the transmitted signals are combined, together. Since the relay station hardly decodes each information single, the security for avoiding the information leak to the relay station is maintained. Therefore, the PLNC is attracting much attention in terms of physical layer security (PLS). However, the information source needs the transmit power control based on the channel state information (CSI). If the relay station is untrusted, it camouflages the real CSI for stealing the information. So far, the authors have evaluated the amount of information that relay station can exploit in secret by the CSI impersonation. However, the method of disguised CSI for maximizing the information leaked to the untrusted relay has not been clarified, yet. This paper considers that the CSI impersonation is constructed by the linear programing problem for maximizing the leaked information to the untrusted relay. From the numerical results, if it is the constrained condition for the impersonation of CSI that the stochastic model of CSI is perfectly matched to the channel model, such as Rayleigh fading, the information leaked to the untrusted relay can be reduced. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Physical Layer Security(PLS) / Physical Layer Network Coding(PLNC) / Channel State Information(CSI) / Linear Programming Problem / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 114, no. 490, RCS2014-302, pp. 5-9, March 2015. |
Paper # |
RCS2014-302 |
Date of Issue |
2015-02-25 (RCS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
RCS2014-302 |
Conference Information |
Committee |
RCS SR SRW |
Conference Date |
2015-03-04 - 2015-03-06 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Tokyo Institute of Technology |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Mobile Communication Workshop |
Paper Information |
Registration To |
RCS |
Conference Code |
2015-03-RCS-SR-SRW |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Optimal Design of Impersonated CSI maximize Information Leak in Untrusted Relay |
Sub Title (in English) |
|
Keyword(1) |
Physical Layer Security(PLS) |
Keyword(2) |
Physical Layer Network Coding(PLNC) |
Keyword(3) |
Channel State Information(CSI) |
Keyword(4) |
Linear Programming Problem |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Kengo Matsumoto |
1st Author's Affiliation |
Shinshu University (Shinshu Univ) |
2nd Author's Name |
Osamu Takyu |
2nd Author's Affiliation |
Shinshu University (Shinshu Univ) |
3rd Author's Name |
Takeo Fujii |
3rd Author's Affiliation |
The University of Electro-communications (UEC) |
4th Author's Name |
Tomoaki Ohtsuki |
4th Author's Affiliation |
Keio University (Keio Univ) |
5th Author's Name |
Fumihito Sasamori |
5th Author's Affiliation |
Shinshu University (Shinshu Univ) |
6th Author's Name |
Shiro Handa |
6th Author's Affiliation |
Shinshu University (Shinshu Univ) |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2015-03-04 09:25:00 |
Presentation Time |
25 minutes |
Registration for |
RCS |
Paper # |
RCS2014-302 |
Volume (vol) |
vol.114 |
Number (no) |
no.490 |
Page |
pp.5-9 |
#Pages |
5 |
Date of Issue |
2015-02-25 (RCS) |
|