Confidentiality of wireless network data based on an information-theoretical approach
AbstractIn modern communication systems, there is a clear separation between data encryption and error correction in the message flow. At the physical level of an open data transmission system, error correction is implemented that allows higher levels to abstract this level as an ideal bit channel. Encryption based on cryptographic principles occurs at higher levels. This separation has long been an obvious solution in most communication systems, but recently there has been an increasing interest in providing security directly at the physical level by using the properties of the basic communication channel. With this approach, security is ensured by an information-theoretic approach that does not require difficult to compute functions, as in traditional cryptography. Information and theoretical security, first introduced by Shannon and widely recognized as the most stringent security notation, is becoming increasingly attractive to many cyber-physical systems, wireless networks, distributed control systems and other applications. Nevertheless, many open questions remain for the full integration of information and theoretical security into future communication systems. This article discusses the autonomous results in the field of theoretical information security.
2 A.D. Wyner, Bell System Technical Journal, 54, 1355-1387 (1975).
3 I. Csiszar and J. Korner, IEEE Transactions on Information Theory, 24, 339-348 (1978).
4 U.M. Maurer, Provably secure key distribution based on independent channels, in Proc. of the IEEE Information Theory Workshop (ITW), Veldhoven, The Netherlands, June (1990).
5 U.M. Maurer, IEEE Trans. on Information Theory, 39, 733-742 (1993).
6 R. Ahlswede and I. Csiszar, IEEE Trans. on Information Theory, 39, 1121-1132 (1993).
7 W. Diffie and M. Hellman, IEEE Trans. Inf. Theory, IT-22 (6), 644–654 (1976).
8 A. Salomaa, Kriptografiya s otkrytym klyuchom, (Moscow, Mir, 1995), 320 s. (in Russ.)
9 N. Asokan and P. Ginzboorg, Computer Communications, 23 (17), 1627-1637 (2000).
10 G. Naga Satish, Ch.V. Raghavendran, P.T.K. Mehar, Dr. P. Suresh Varma, Intern. J. of Computer Science, Information Technology and Management, 1 (1-2) (2012).
11 R.D. Pietro, L.V. Mancini, and S. Jajodia, Efficient and secure keys management for wireless mobile communications, in Proc. of the 2nd ACM International Workshop on Principles of Mobile Computing, Toulouse, France, 66-73 (2002).
12 B. Zhu, F. Bao, R. H. Deng, M. S. Kankanhalli, and G. Wang, Computer Networks, 48, 657-682 (2005).
13 R. Cramer and V. Shoup, SIAM Journal on Computing, 33 (1), 167-226 (2004).
14 H. Dennis and E. Kiltz, Secure hybrid encryption from weakened key encapsulation, in Proc. of the 27th Annual Intern. Cryptology Conference (CRYPTO), Santa Barbara, CA, USA, August 2007, 553-571 (2007).
15 K. Sayood, Mathematical Preliminaries for Lossy Coding //in book “Introduction to Data Compression (4th Edition) (Elsevier, 2012), 217-250.
16 J.L. Massey, An introduction to contemporary cryptology, Proc.IEEE, 76, 533-549 (1988).
17 H. Vincent Poor and Rafael F. Schaefer, PNAS, 114 (1), 19-26 (2017).
18 A.O. Hero, IEEE Transactions on Information Theory, 49 (12), 3235-3249 (2003).