Evaluation of information leak by robustness evaluation of countermeasure to disguised CSI in PLNC considering physical layer security

Kengo Matsumoto, Osamu Takyu, Takeo Fujii, Tomoaki Ohtsuki, Fumihito Sasamori, Shiro Handa

研究成果: Conference contribution

抄録

In Physical Layer Network Coding (PLNC), the two information sources access to the relay station, simultaneously and thus the transmitted signals are combined, together. Since the relay station hardly decodes each information single, the security for avoiding the information leak to the relay station is maintained. Therefore, the PLNC is attracting much attention in terms of physical layer security (PLS). However, the information source needs the transmit power control based on the channel state information (CSI). If the relay station is untrusted, it camouflages the real CSI for stealing the information. This paper considers the camouflaging of CSI is modeled as the liner programming problem in the subject to the statistic of CSI following the model of propagation. We clarify the maximal capacity of tapping by the relay station.

元の言語English
ホスト出版物のタイトルIEEE Radio and Wireless Symposium, RWS
出版者IEEE Computer Society
ページ123-125
ページ数3
2015-June
エディションJune
DOI
出版物ステータスPublished - 2015 6 19
イベント2015 IEEE Radio and Wireless Symposium, RWS 2015 - RWW 2015 - San Diego, United States
継続期間: 2015 1 252015 1 28

Other

Other2015 IEEE Radio and Wireless Symposium, RWS 2015 - RWW 2015
United States
San Diego
期間15/1/2515/1/28

Fingerprint

Network coding
Channel state information
coding
evaluation
Camouflage
Power control
Statistics
programming
statistics

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Communication

これを引用

Matsumoto, K., Takyu, O., Fujii, T., Ohtsuki, T., Sasamori, F., & Handa, S. (2015). Evaluation of information leak by robustness evaluation of countermeasure to disguised CSI in PLNC considering physical layer security. : IEEE Radio and Wireless Symposium, RWS (June 版, 巻 2015-June, pp. 123-125). [7129751] IEEE Computer Society. https://doi.org/10.1109/RWS.2015.7129751

Evaluation of information leak by robustness evaluation of countermeasure to disguised CSI in PLNC considering physical layer security. / Matsumoto, Kengo; Takyu, Osamu; Fujii, Takeo; Ohtsuki, Tomoaki; Sasamori, Fumihito; Handa, Shiro.

IEEE Radio and Wireless Symposium, RWS. 巻 2015-June June. 編 IEEE Computer Society, 2015. p. 123-125 7129751.

研究成果: Conference contribution

Matsumoto, K, Takyu, O, Fujii, T, Ohtsuki, T, Sasamori, F & Handa, S 2015, Evaluation of information leak by robustness evaluation of countermeasure to disguised CSI in PLNC considering physical layer security. : IEEE Radio and Wireless Symposium, RWS. June Edn, 巻. 2015-June, 7129751, IEEE Computer Society, pp. 123-125, 2015 IEEE Radio and Wireless Symposium, RWS 2015 - RWW 2015, San Diego, United States, 15/1/25. https://doi.org/10.1109/RWS.2015.7129751
Matsumoto K, Takyu O, Fujii T, Ohtsuki T, Sasamori F, Handa S. Evaluation of information leak by robustness evaluation of countermeasure to disguised CSI in PLNC considering physical layer security. : IEEE Radio and Wireless Symposium, RWS. June 版 巻 2015-June. IEEE Computer Society. 2015. p. 123-125. 7129751 https://doi.org/10.1109/RWS.2015.7129751
Matsumoto, Kengo ; Takyu, Osamu ; Fujii, Takeo ; Ohtsuki, Tomoaki ; Sasamori, Fumihito ; Handa, Shiro. / Evaluation of information leak by robustness evaluation of countermeasure to disguised CSI in PLNC considering physical layer security. IEEE Radio and Wireless Symposium, RWS. 巻 2015-June June. 版 IEEE Computer Society, 2015. pp. 123-125
@inproceedings{410f767df5a24766825080b027fc77a1,
title = "Evaluation of information leak by robustness evaluation of countermeasure to disguised CSI in PLNC considering physical layer security",
abstract = "In Physical Layer Network Coding (PLNC), the two information sources access to the relay station, simultaneously and thus the transmitted signals are combined, together. Since the relay station hardly decodes each information single, the security for avoiding the information leak to the relay station is maintained. Therefore, the PLNC is attracting much attention in terms of physical layer security (PLS). However, the information source needs the transmit power control based on the channel state information (CSI). If the relay station is untrusted, it camouflages the real CSI for stealing the information. This paper considers the camouflaging of CSI is modeled as the liner programming problem in the subject to the statistic of CSI following the model of propagation. We clarify the maximal capacity of tapping by the relay station.",
keywords = "Physical Layer Network Coding(PLNC), Physical Layer Security(PLS)",
author = "Kengo Matsumoto and Osamu Takyu and Takeo Fujii and Tomoaki Ohtsuki and Fumihito Sasamori and Shiro Handa",
year = "2015",
month = "6",
day = "19",
doi = "10.1109/RWS.2015.7129751",
language = "English",
volume = "2015-June",
pages = "123--125",
booktitle = "IEEE Radio and Wireless Symposium, RWS",
publisher = "IEEE Computer Society",
edition = "June",

}

TY - GEN

T1 - Evaluation of information leak by robustness evaluation of countermeasure to disguised CSI in PLNC considering physical layer security

AU - Matsumoto, Kengo

AU - Takyu, Osamu

AU - Fujii, Takeo

AU - Ohtsuki, Tomoaki

AU - Sasamori, Fumihito

AU - Handa, Shiro

PY - 2015/6/19

Y1 - 2015/6/19

N2 - In Physical Layer Network Coding (PLNC), the two information sources access to the relay station, simultaneously and thus the transmitted signals are combined, together. Since the relay station hardly decodes each information single, the security for avoiding the information leak to the relay station is maintained. Therefore, the PLNC is attracting much attention in terms of physical layer security (PLS). However, the information source needs the transmit power control based on the channel state information (CSI). If the relay station is untrusted, it camouflages the real CSI for stealing the information. This paper considers the camouflaging of CSI is modeled as the liner programming problem in the subject to the statistic of CSI following the model of propagation. We clarify the maximal capacity of tapping by the relay station.

AB - In Physical Layer Network Coding (PLNC), the two information sources access to the relay station, simultaneously and thus the transmitted signals are combined, together. Since the relay station hardly decodes each information single, the security for avoiding the information leak to the relay station is maintained. Therefore, the PLNC is attracting much attention in terms of physical layer security (PLS). However, the information source needs the transmit power control based on the channel state information (CSI). If the relay station is untrusted, it camouflages the real CSI for stealing the information. This paper considers the camouflaging of CSI is modeled as the liner programming problem in the subject to the statistic of CSI following the model of propagation. We clarify the maximal capacity of tapping by the relay station.

KW - Physical Layer Network Coding(PLNC)

KW - Physical Layer Security(PLS)

UR - http://www.scopus.com/inward/record.url?scp=84937872141&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84937872141&partnerID=8YFLogxK

U2 - 10.1109/RWS.2015.7129751

DO - 10.1109/RWS.2015.7129751

M3 - Conference contribution

AN - SCOPUS:84937872141

VL - 2015-June

SP - 123

EP - 125

BT - IEEE Radio and Wireless Symposium, RWS

PB - IEEE Computer Society

ER -