ePrints@IIScePrints@IISc Home | About | Browse | Latest Additions | Advanced Search | Contact | Help

Jamming to foil an eavesdropper

Kashyap, Navin and Sankarasubramaniam, Yogesh and Kashyap, Navin (2012) Jamming to foil an eavesdropper. In: 2012 National Conference on Communications (NCC), 3-5 Feb. 2012, Kharagpur.

[img]
Preview
PDF
Natio_Confer_Comms _1_2012.pdf

Download (319kB) | Preview
Official URL: http://dx.doi.org/10.1109/NCC.2012.6176761

Abstract

We consider key-less secure communication against a passive adversary, by allowing the legitimate receiver to selectively jam transmitted bits. The channel between the transmitter and legitimate receiver is assumed to be half-duplex (i.e., one cannot jam and receive simultaneously), while the only degradation seen by the eavesdropper is due to jamming done by the legitimate receiver. However, jamming must be done without knowledge of the transmitted sequence, and the transmitted sequence must be recovered exactly by the receiver from the unjammed bits alone. We study the resulting coding problem in this setup, both under complete equivocation (CE) and partial equivocation (PE) of the eavesdropper. For (CE), we give explicit code-constructions that achieve the maximum transmission rate, while for (PE) we compute upper and lower bounds on the maximum possible transmission rate.

Item Type: Conference Paper
Publisher: IEEE
Additional Information: Copyright of this article belongs to IEEE.
Department/Centre: Division of Electrical Sciences > Electrical Communication Engineering
Date Deposited: 23 Jan 2014 05:26
Last Modified: 23 Jan 2014 05:26
URI: http://eprints.iisc.ac.in/id/eprint/48242

Actions (login required)

View Item View Item