Active Secure Coding Based on Eavesdropper Behavior Learning

07/09/2018
by   Yizhi Zhao, et al.
0

The secrecy capacity achieving problem of the wiretap channel against an active eavesdropper with unlimited computational power over is an important foresighted task for secure communication. For active wiretap channel, the effectiveness of cryptography embedded secure coding schemes are limited due to the passive problem of physical layer coding. Thus in this paper, a novel solution called active secure coding scheme is proposed which combines physical secure coding with machine learning to implement an active defense against the active eavesdropper. To construct an universal active method for secure coding, an abstract active wiretap channel model is constructed under the detectable precondition, in which hidden Markov model is employed to build the internal eavesdropper behavior pattern (the stochastic process for eavesdropper behavior states) with stochastically mapped external observations. Based on the abstract model, an eavesdropper behavior pattern learning and eavesdropper behavior states decoding are constructed for estimating the optimal eavesdropper behavior states, which enables the secure coding scheme to respond the eavesdropper actively. Then this active secure coding method is performed to the general varying wiretap channel to construct an explicit active secure polar coding scheme. As proofed, the proposed active secure polar coding scheme can theoretically achieve the average secrecy capacity of t times secure transmissions under the reliability and strong security criterions.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/29/2018

Strong Security Polar Coding with Delayed Wiretap Channel State Information

Secure and reliable communication over the wiretap channel of delayed ch...
research
12/01/2018

Secure physical layer network coding versus secure network coding

Secure network coding realizes the secrecy of the message when the messa...
research
12/01/2018

Irregular Channel Polarization and Its Applications to Static Adversarial Wiretap Channel

The problem of achieving the secrecy capacity of static adversarial wire...
research
01/19/2022

Bayesian Inference with Nonlinear Generative Models: Comments on Secure Learning

Unlike the classical linear model, nonlinear generative models have been...
research
02/29/2020

Secure Polar Coding for Adversarial Wiretap Channel

The adversarial wiretap channel (AWTC) model is a secure communication m...
research
05/18/2022

Secure Coding via Gaussian Random Fields

Inverse probability problems whose generative models are given by strict...
research
02/20/2021

A Novel Key Generation Scheme Using Quaternary PUF Responses and Wiretap Polar Coding

Physical unclonable functions (PUFs) are widely considered in secret key...

Please sign up or login with your details

Forgot password? Click here to reset