Title :
Secrecy Outage Capacity of Fading Channels
Author :
Gungor, Onur ; Jian Tan ; Koksal, Can Emre ; El-Gamal, Hesham ; Shroff, Ness B.
Author_Institution :
Dept. of Electr. & Comput. Eng., Ohio State Univ., Columbus, OH, USA
Abstract :
This paper considers point-to-point secure communication over flat fading channels under an outage constraint. More specifically, we extend the definition of outage capacity to account for the secrecy constraint and obtain sharp characterizations of the corresponding fundamental limits under two different assumptions on the transmitter channel state information (CSI). First, we find the outage secrecy capacity assuming that the transmitter has perfect knowledge of the legitimate and eavesdropper channel gains. In this scenario, the capacity achieving scheme relies on opportunistically exchanging private keys between the legitimate nodes. These keys are stored in a key buffer and later used to secure delay sensitive data using the Vernam´s one time pad technique. We then extend our results to the more practical scenario where the transmitter is assumed to know only the legitimate channel gain. Here, our achievability arguments rely on privacy amplification techniques to generate secret key bits. In the two cases, we also characterize the optimal power control policies which, interestingly, turn out to be a judicious combination of channel inversion and the optimal ergodic strategy. Finally, we analyze the effect of key buffer overflow on the overall outage probability.
Keywords :
channel capacity; fading channels; optimal control; power control; private key cryptography; radio links; radio transmitters; telecommunication control; telecommunication security; Vernam´s one time pad technique; channel inversion; delay sensitive data; eavesdropper channel gain; flat fading channels; key buffer; legitimate channel gain; legitimate nodes; opportunistically exchanging private keys; optimal ergodic strategy; optimal power control policies; outage constraint; outage probability; point-to-point secure communication; privacy amplification techniques; secrecy constraint; secrecy outage capacity; secret key bits; transmitter channel state information; Delays; Fading; Power control; Privacy; Receivers; Resource management; Transmitters; Block fading channels; channel state information; information theoretic secrecy; key queue; power control; secrecy outage capacity;
Journal_Title :
Information Theory, IEEE Transactions on
DOI :
10.1109/TIT.2013.2265691