Evaluation of information leak by robustness evaluation of countermeasure to disguised CSI in PLNC considering physical layer security

Kengo Matsumoto, Osamu Takyu, Takeo Fujii, Tomoaki Ohtsuki, Fumihito Sasamori, Shiro Handa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In Physical Layer Network Coding (PLNC), the two information sources access to the relay station, simultaneously and thus the transmitted signals are combined, together. Since the relay station hardly decodes each information single, the security for avoiding the information leak to the relay station is maintained. Therefore, the PLNC is attracting much attention in terms of physical layer security (PLS). However, the information source needs the transmit power control based on the channel state information (CSI). If the relay station is untrusted, it camouflages the real CSI for stealing the information. This paper considers the camouflaging of CSI is modeled as the liner programming problem in the subject to the statistic of CSI following the model of propagation. We clarify the maximal capacity of tapping by the relay station.

Original languageEnglish
Title of host publicationIEEE Radio and Wireless Symposium, RWS
PublisherIEEE Computer Society
Pages123-125
Number of pages3
Volume2015-June
EditionJune
DOIs
Publication statusPublished - 2015 Jun 19
Event2015 IEEE Radio and Wireless Symposium, RWS 2015 - RWW 2015 - San Diego, United States
Duration: 2015 Jan 252015 Jan 28

Other

Other2015 IEEE Radio and Wireless Symposium, RWS 2015 - RWW 2015
CountryUnited States
CitySan Diego
Period15/1/2515/1/28

Fingerprint

Network coding
Channel state information
coding
evaluation
Camouflage
Power control
Statistics
programming
statistics

Keywords

  • Physical Layer Network Coding(PLNC)
  • Physical Layer Security(PLS)

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Communication

Cite this

Matsumoto, K., Takyu, O., Fujii, T., Ohtsuki, T., Sasamori, F., & Handa, S. (2015). Evaluation of information leak by robustness evaluation of countermeasure to disguised CSI in PLNC considering physical layer security. In IEEE Radio and Wireless Symposium, RWS (June ed., Vol. 2015-June, pp. 123-125). [7129751] IEEE Computer Society. https://doi.org/10.1109/RWS.2015.7129751

Evaluation of information leak by robustness evaluation of countermeasure to disguised CSI in PLNC considering physical layer security. / Matsumoto, Kengo; Takyu, Osamu; Fujii, Takeo; Ohtsuki, Tomoaki; Sasamori, Fumihito; Handa, Shiro.

IEEE Radio and Wireless Symposium, RWS. Vol. 2015-June June. ed. IEEE Computer Society, 2015. p. 123-125 7129751.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Matsumoto, K, Takyu, O, Fujii, T, Ohtsuki, T, Sasamori, F & Handa, S 2015, Evaluation of information leak by robustness evaluation of countermeasure to disguised CSI in PLNC considering physical layer security. in IEEE Radio and Wireless Symposium, RWS. June edn, vol. 2015-June, 7129751, IEEE Computer Society, pp. 123-125, 2015 IEEE Radio and Wireless Symposium, RWS 2015 - RWW 2015, San Diego, United States, 15/1/25. https://doi.org/10.1109/RWS.2015.7129751
Matsumoto K, Takyu O, Fujii T, Ohtsuki T, Sasamori F, Handa S. Evaluation of information leak by robustness evaluation of countermeasure to disguised CSI in PLNC considering physical layer security. In IEEE Radio and Wireless Symposium, RWS. June ed. Vol. 2015-June. IEEE Computer Society. 2015. p. 123-125. 7129751 https://doi.org/10.1109/RWS.2015.7129751
Matsumoto, Kengo ; Takyu, Osamu ; Fujii, Takeo ; Ohtsuki, Tomoaki ; Sasamori, Fumihito ; Handa, Shiro. / Evaluation of information leak by robustness evaluation of countermeasure to disguised CSI in PLNC considering physical layer security. IEEE Radio and Wireless Symposium, RWS. Vol. 2015-June June. ed. IEEE Computer Society, 2015. pp. 123-125
@inproceedings{410f767df5a24766825080b027fc77a1,
title = "Evaluation of information leak by robustness evaluation of countermeasure to disguised CSI in PLNC considering physical layer security",
abstract = "In Physical Layer Network Coding (PLNC), the two information sources access to the relay station, simultaneously and thus the transmitted signals are combined, together. Since the relay station hardly decodes each information single, the security for avoiding the information leak to the relay station is maintained. Therefore, the PLNC is attracting much attention in terms of physical layer security (PLS). However, the information source needs the transmit power control based on the channel state information (CSI). If the relay station is untrusted, it camouflages the real CSI for stealing the information. This paper considers the camouflaging of CSI is modeled as the liner programming problem in the subject to the statistic of CSI following the model of propagation. We clarify the maximal capacity of tapping by the relay station.",
keywords = "Physical Layer Network Coding(PLNC), Physical Layer Security(PLS)",
author = "Kengo Matsumoto and Osamu Takyu and Takeo Fujii and Tomoaki Ohtsuki and Fumihito Sasamori and Shiro Handa",
year = "2015",
month = "6",
day = "19",
doi = "10.1109/RWS.2015.7129751",
language = "English",
volume = "2015-June",
pages = "123--125",
booktitle = "IEEE Radio and Wireless Symposium, RWS",
publisher = "IEEE Computer Society",
edition = "June",

}

TY - GEN

T1 - Evaluation of information leak by robustness evaluation of countermeasure to disguised CSI in PLNC considering physical layer security

AU - Matsumoto, Kengo

AU - Takyu, Osamu

AU - Fujii, Takeo

AU - Ohtsuki, Tomoaki

AU - Sasamori, Fumihito

AU - Handa, Shiro

PY - 2015/6/19

Y1 - 2015/6/19

N2 - In Physical Layer Network Coding (PLNC), the two information sources access to the relay station, simultaneously and thus the transmitted signals are combined, together. Since the relay station hardly decodes each information single, the security for avoiding the information leak to the relay station is maintained. Therefore, the PLNC is attracting much attention in terms of physical layer security (PLS). However, the information source needs the transmit power control based on the channel state information (CSI). If the relay station is untrusted, it camouflages the real CSI for stealing the information. This paper considers the camouflaging of CSI is modeled as the liner programming problem in the subject to the statistic of CSI following the model of propagation. We clarify the maximal capacity of tapping by the relay station.

AB - In Physical Layer Network Coding (PLNC), the two information sources access to the relay station, simultaneously and thus the transmitted signals are combined, together. Since the relay station hardly decodes each information single, the security for avoiding the information leak to the relay station is maintained. Therefore, the PLNC is attracting much attention in terms of physical layer security (PLS). However, the information source needs the transmit power control based on the channel state information (CSI). If the relay station is untrusted, it camouflages the real CSI for stealing the information. This paper considers the camouflaging of CSI is modeled as the liner programming problem in the subject to the statistic of CSI following the model of propagation. We clarify the maximal capacity of tapping by the relay station.

KW - Physical Layer Network Coding(PLNC)

KW - Physical Layer Security(PLS)

UR - http://www.scopus.com/inward/record.url?scp=84937872141&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84937872141&partnerID=8YFLogxK

U2 - 10.1109/RWS.2015.7129751

DO - 10.1109/RWS.2015.7129751

M3 - Conference contribution

AN - SCOPUS:84937872141

VL - 2015-June

SP - 123

EP - 125

BT - IEEE Radio and Wireless Symposium, RWS

PB - IEEE Computer Society

ER -