Optimal impersonation of CSI for maximizing leaked information to untrusted relay in PLNC

Osamu Takyu, Kengo Matsumoto, Tomoaki Ohtsuki, Takeo Fujii, Fumihito Sasamori, Shiro Handa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In Physical Layer Network Coding (PLNC), since the two sources access the relay station at a time, the relay station can hardly demodulate each information owing to the mutual interference between two transmitted signals. The PLNC achieves the high secure relay communication based on physical layer security (PLS). The source needs the transmit power control based on the channel state information (CSI) for maintaining the secure mutual interference. The untrusted relay, however, may impersonate the CSI for breaking it. So far, the authors have evaluated the amount of the leaked information to the untrusted relay by the impersonation of CSI but the leaked information is not maximal. For the countermeasure to the impersonation of CSI, the most powerful model of the untrusted relay to maximizing the leaked information is necessary. This paper constructs the optimal impersonation of CSI by a linear programing problem.

Original languageEnglish
Title of host publication2016 IEEE Wireless Communications and Networking Conference, WCNC 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Volume2016-September
ISBN (Electronic)9781467398145
DOIs
Publication statusPublished - 2016 Sep 12
Event2016 IEEE Wireless Communications and Networking Conference, WCNC 2016 - Doha, Qatar
Duration: 2016 Apr 32016 Apr 7

Other

Other2016 IEEE Wireless Communications and Networking Conference, WCNC 2016
CountryQatar
CityDoha
Period16/4/316/4/7

Fingerprint

Network coding
Channel state information
Power control
Communication

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Takyu, O., Matsumoto, K., Ohtsuki, T., Fujii, T., Sasamori, F., & Handa, S. (2016). Optimal impersonation of CSI for maximizing leaked information to untrusted relay in PLNC. In 2016 IEEE Wireless Communications and Networking Conference, WCNC 2016 (Vol. 2016-September). [7565098] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/WCNC.2016.7565098

Optimal impersonation of CSI for maximizing leaked information to untrusted relay in PLNC. / Takyu, Osamu; Matsumoto, Kengo; Ohtsuki, Tomoaki; Fujii, Takeo; Sasamori, Fumihito; Handa, Shiro.

2016 IEEE Wireless Communications and Networking Conference, WCNC 2016. Vol. 2016-September Institute of Electrical and Electronics Engineers Inc., 2016. 7565098.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Takyu, O, Matsumoto, K, Ohtsuki, T, Fujii, T, Sasamori, F & Handa, S 2016, Optimal impersonation of CSI for maximizing leaked information to untrusted relay in PLNC. in 2016 IEEE Wireless Communications and Networking Conference, WCNC 2016. vol. 2016-September, 7565098, Institute of Electrical and Electronics Engineers Inc., 2016 IEEE Wireless Communications and Networking Conference, WCNC 2016, Doha, Qatar, 16/4/3. https://doi.org/10.1109/WCNC.2016.7565098
Takyu O, Matsumoto K, Ohtsuki T, Fujii T, Sasamori F, Handa S. Optimal impersonation of CSI for maximizing leaked information to untrusted relay in PLNC. In 2016 IEEE Wireless Communications and Networking Conference, WCNC 2016. Vol. 2016-September. Institute of Electrical and Electronics Engineers Inc. 2016. 7565098 https://doi.org/10.1109/WCNC.2016.7565098
Takyu, Osamu ; Matsumoto, Kengo ; Ohtsuki, Tomoaki ; Fujii, Takeo ; Sasamori, Fumihito ; Handa, Shiro. / Optimal impersonation of CSI for maximizing leaked information to untrusted relay in PLNC. 2016 IEEE Wireless Communications and Networking Conference, WCNC 2016. Vol. 2016-September Institute of Electrical and Electronics Engineers Inc., 2016.
@inproceedings{4f5ff1133cdf4ed0946e2cf99c3723d1,
title = "Optimal impersonation of CSI for maximizing leaked information to untrusted relay in PLNC",
abstract = "In Physical Layer Network Coding (PLNC), since the two sources access the relay station at a time, the relay station can hardly demodulate each information owing to the mutual interference between two transmitted signals. The PLNC achieves the high secure relay communication based on physical layer security (PLS). The source needs the transmit power control based on the channel state information (CSI) for maintaining the secure mutual interference. The untrusted relay, however, may impersonate the CSI for breaking it. So far, the authors have evaluated the amount of the leaked information to the untrusted relay by the impersonation of CSI but the leaked information is not maximal. For the countermeasure to the impersonation of CSI, the most powerful model of the untrusted relay to maximizing the leaked information is necessary. This paper constructs the optimal impersonation of CSI by a linear programing problem.",
author = "Osamu Takyu and Kengo Matsumoto and Tomoaki Ohtsuki and Takeo Fujii and Fumihito Sasamori and Shiro Handa",
year = "2016",
month = "9",
day = "12",
doi = "10.1109/WCNC.2016.7565098",
language = "English",
volume = "2016-September",
booktitle = "2016 IEEE Wireless Communications and Networking Conference, WCNC 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Optimal impersonation of CSI for maximizing leaked information to untrusted relay in PLNC

AU - Takyu, Osamu

AU - Matsumoto, Kengo

AU - Ohtsuki, Tomoaki

AU - Fujii, Takeo

AU - Sasamori, Fumihito

AU - Handa, Shiro

PY - 2016/9/12

Y1 - 2016/9/12

N2 - In Physical Layer Network Coding (PLNC), since the two sources access the relay station at a time, the relay station can hardly demodulate each information owing to the mutual interference between two transmitted signals. The PLNC achieves the high secure relay communication based on physical layer security (PLS). The source needs the transmit power control based on the channel state information (CSI) for maintaining the secure mutual interference. The untrusted relay, however, may impersonate the CSI for breaking it. So far, the authors have evaluated the amount of the leaked information to the untrusted relay by the impersonation of CSI but the leaked information is not maximal. For the countermeasure to the impersonation of CSI, the most powerful model of the untrusted relay to maximizing the leaked information is necessary. This paper constructs the optimal impersonation of CSI by a linear programing problem.

AB - In Physical Layer Network Coding (PLNC), since the two sources access the relay station at a time, the relay station can hardly demodulate each information owing to the mutual interference between two transmitted signals. The PLNC achieves the high secure relay communication based on physical layer security (PLS). The source needs the transmit power control based on the channel state information (CSI) for maintaining the secure mutual interference. The untrusted relay, however, may impersonate the CSI for breaking it. So far, the authors have evaluated the amount of the leaked information to the untrusted relay by the impersonation of CSI but the leaked information is not maximal. For the countermeasure to the impersonation of CSI, the most powerful model of the untrusted relay to maximizing the leaked information is necessary. This paper constructs the optimal impersonation of CSI by a linear programing problem.

UR - http://www.scopus.com/inward/record.url?scp=84989907587&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84989907587&partnerID=8YFLogxK

U2 - 10.1109/WCNC.2016.7565098

DO - 10.1109/WCNC.2016.7565098

M3 - Conference contribution

AN - SCOPUS:84989907587

VL - 2016-September

BT - 2016 IEEE Wireless Communications and Networking Conference, WCNC 2016

PB - Institute of Electrical and Electronics Engineers Inc.

ER -