DocumentCode
847199
Title
Secure space-time communication
Author
Hero, Alfred O., III
Author_Institution
Dept. of Electr. Eng. & Comput. Sci., Univ. of Michigan, Ann Arbor, MI
Volume
49
Issue
12
fYear
2003
Firstpage
3235
Lastpage
3249
Abstract
Network security is important for information protection in open, secure, or covert communications. One such requirement is to achieve high-rate communications between clients, e.g., terminals or sensors, in the network while hiding information about the transmitted symbols, signal activity, or other sensitive data from an unintended receiver, e.g., an eavesdropper. For wireless links, the single-user capacity advantages of deployment of multiple antennas at the transmitter is well known. One of the principal conclusions of this paper is that proper exploitation of space-time diversity at the transmitter can also enhance information security and information-hiding capabilities. In particular, we show that significant gains are achievable when the transmitter and the client receiver are both informed about their channel while the transmitter and eavesdropper receiver are uniformed about their channel. More generally, we compare capacity limits for both informed and uninformed transmitter and informed receiver scenarios subject to low probability of intercept (LPI) and low probability of detection (LPD) constraints. For several general cases, we can characterize the LPI- and LPD-optimal transmitted source distributions and compare them to the standard optimal source distribution satisfying a power constraint. We assume the standard quasi-static flat Rayleigh-fading channel model for the transmitter-receiver pairs. This paper is a step toward answering the fundamental question: what are the qualitative and quantitative differences between the information-carrying capabilities of open space-time channels versus secure space-time channels?
Keywords
Rayleigh channels; channel coding; communication complexity; cryptography; radiocommunication; space-time codes; telecommunication security; Chernoff exponent; Rayleigh-fading model; channel capacity; covert channel; information hiding; network security; probability detection; probability intercept; secure communication; space-time coding; wireless eavesdropper; Channel capacity; Communication system security; Cryptography; Data security; Information security; MIMO; Protection; Rayleigh channels; Transmitters; Wireless sensor networks;
fLanguage
English
Journal_Title
Information Theory, IEEE Transactions on
Publisher
ieee
ISSN
0018-9448
Type
jour
DOI
10.1109/TIT.2003.820010
Filename
1255548
Link To Document