无线窃听信道与秘密容量原理

4星 · 超过85%的资源 需积分: 9 8 下载量 78 浏览量 更新于2024-11-17 收藏 111KB PDF 举报
"这篇文章主要介绍了秘密容量(secrecy capacity)的概念,它是信息论中用于描述在有恶意第三方监听的情况下,可靠地传输信息的最大速率。文章首先概述了秘密通信的基本原理,然后探讨了单个接收者系统和多终端设置下的秘密容量界限。" **一、概述** 秘密容量的概念起源于 Wyner 在1975年提出的窃听信道模型(Wiretap Channel),该模型考虑了通信源如何向一个合法接收者发送信息,同时防止一个窃听者(eavesdropper)解码这些信息。这个模型为研究秘密通信的理论基础奠定了基石。 **二、点对点秘密容量** Wyner 的工作定义了点对点(point-to-point)情况下的秘密容量。在这种情况下,发送者(Alice)试图向接收者(Bob)发送信息,而一个潜在的窃听者(Eve)也在尝试获取这些信息。Wyner 显示,存在一种编码方式,使得Alice可以向Bob发送信息,同时保持Eve的解码错误率极高,从而实现信息的秘密传输。秘密容量是能够在不被Eve解码的前提下,Alice能向Bob稳定传输信息的最大速率。 **三、多终端设置中的秘密容量** 秘密容量的概念不仅限于点对点通信,还扩展到了更复杂的多终端网络环境。Csiszár和Körner对Wyner的工作进行了扩展,提出了多用户信道的秘密容量。在这些设置中,多个发送者和接收者之间的交互以及可能存在的多个窃听者增加了问题的复杂性,但同时也提供了更多的策略来增强通信的安全性。 **四、网络秘密容量与共用随机性** 随着信息论领域的不断发展,网络秘密容量和共用随机性成为近年来的研究热点。Csiszár和Narayan的研究将秘密生成与多终端源编码相结合,利用共用随机性来提高安全性。这些方法受到Ahlswede的一些有趣成果的影响,如信道编码定理和网络信息论中的其他关键概念。 **五、当代进展** Ahlswede等人的工作为理解秘密容量在更广泛的网络环境中的应用提供了基础。他们提出的方法和结果有助于设计更为复杂和安全的通信系统,以应对现代通信网络中日益增长的安全挑战。 秘密容量是信息论中衡量在有窃听者存在时,通信系统能够提供多少安全信息传输能力的关键指标。从单点传输到多用户网络,这一领域的研究不断深化,为实际通信系统的安全性提供了理论指导。通过深入理解这些概念和技术,我们可以设计出更高效且安全的通信协议,以抵御潜在的威胁。

Unlike the classical encryption schemes,keys are dispensable in certain PLS technigues, known as the keyless secure strat egy. Sophisticated signal processing techniques such as arti- ficial noise, beamforming,and diversitycan be developed to ensure the secrecy of the MC networks.In the Alice-Bob-Eve model, Alice is the legitimate transmitter, whose intended target is the legitimate receiver Bob,while Eve is the eavesdropper that intercepts the information from Alice to Bob.The secrecy performance is quantified via information leakagei.ethe dif ference of the mutual information between the Alice-Bob and Alice-Eve links. The upper bound of the information leakage is called secrecy capacity realized by a specific distribution of the input symbols, namely,capacity-achieving distribution.The secrecy performance of the diffusion-based MC system with concentration shift keying(CSK)is analyzed from an informa- tion-theoretical point of view,providing two paramount secrecy metrics, i.e., secrecy capacity and secure distance[13].How ever, only the estimation of lower bound secrecy capacity is derived as both links attain their channel capacity.The secrecy capacity highly depends on the system parameters such as the average signal energy,diffusion coefficientand reception duration. Moreover, the distance between the transmitter and the eavesdropper is also an important aspect of secrecy per- formance. For both amplitude and energy detection schemes secure distance is proposed as a secret metricover which the eavesdropper is incapable of signal recovery. Despite the case with CSK,the results of the secure metrics vary with the modulation type(e.g.pulse position,spacetype) and reception mechanism(e.g.passive,partially absorbingper fectly absorbing).For ease of understanding,Figure 3 depicts the modulation types and the corresponding CIRs with different reception mechanisms. Novel signa processing techniques and the biochemical channel properties can further assist the secrecy enhancement in the MC system.The molecular beam forming that avoids information disclosure can be realized via the flow generated in the channel.Besidesnew dimensions of diversity, such as the aforementioned molecular diversity of ionic compounds, can beexploited. Note that the feasibility of these methods can be validated by the derived secrecy metrics.

2023-06-13 上传