DocumentCode :
1658585
Title :
Jamming to foil an eavesdropper
Author :
Kashyap, Navin ; Sankarasubramaniam, Yogesh ; Thangaraj, Andrew
Author_Institution :
Dept. of ECE, Indian Inst. of Sci. Bangalore, Bangalore, India
fYear :
2012
Firstpage :
1
Lastpage :
5
Abstract :
We consider key-less secure communication against a passive adversary, by allowing the legitimate receiver to selectively jam transmitted bits. The channel between the transmitter and legitimate receiver is assumed to be half-duplex (i.e., one cannot jam and receive simultaneously), while the only degradation seen by the eavesdropper is due to jamming done by the legitimate receiver. However, jamming must be done without knowledge of the transmitted sequence, and the transmitted sequence must be recovered exactly by the receiver from the unjammed bits alone. We study the resulting coding problem in this setup, both under complete equivocation (CE) and partial equivocation (PE) of the eavesdropper. For (CE), we give explicit code-constructions that achieve the maximum transmission rate, while for (PE) we compute upper and lower bounds on the maximum possible transmission rate.
Keywords :
codes; jamming; telecommunication security; code-construction; coding problem; complete equivocation; eavesdropper; jamming; key-less secure communication; legitimate receiver; partial equivocation; passive adversary; transmitter; Cryptography; Erbium; Jamming; Linear code; Receivers; Vectors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications (NCC), 2012 National Conference on
Conference_Location :
Kharagpur
Print_ISBN :
978-1-4673-0815-1
Type :
conf
DOI :
10.1109/NCC.2012.6176761
Filename :
6176761
Link To Document :
بازگشت