Secure Status Updates under Eavesdropping: Age of Information-based Physical Layer Security Metrics

02/18/2020
by   He Chen, et al.
0

This letter studies the problem of maintaining information freshness under passive eavesdropping attacks. The classical three-node wiretap channel model is considered, in which a source aims to send its latest status wirelessly to its intended destination, while protecting the message from being overheard by an eavesdropper. Considering that conventional channel capacity-based secrecy metrics are no longer adequate to measure the information timeliness in status update systems, we define two new age of information-based metrics to characterize the secrecy performance of the considered system. We further propose, analyze, and optimize a randomized stationary transmission policy implemented at the source for further enhancing the secrecy performance. Simulation results are provided to validate our analysis and optimization.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/09/2018

A Dynamic Jamming Game for Real-Time Status Updates

We study timely status updates of a real-time system in an adversarial s...
research
10/10/2019

Optimal Control of Status Updates in a Multiple Access Channel with Stability Constraints

In this work, we study peak-age-optimal scheduling with stability constr...
research
08/06/2018

Energy-Age Tradeoff in Status Update Communication Systems with Retransmission

Age-of-information is a novel performance metric in communication system...
research
12/21/2018

The Cost of Delay in Status Updates and their Value: Non-linear Ageing

We consider a status update communication system consisting of a source-...
research
06/26/2023

Capacity Bounds for Identification With Effective Secrecy

An upper bound to the identification capacity of discrete memoryless wir...
research
01/23/2019

A Survey of Optimization Approaches for Wireless Physical Layer Security

Due to the malicious attacks in wireless networks, physical layer securi...
research
04/28/2018

Towards Practical Implementation of Deep Random Secrecy

We have formerly introduced Deep Random Secrecy, a new cryptologic techn...

Please sign up or login with your details

Forgot password? Click here to reset