TY - GEN
T1 - Secure identification under jamming attacks
AU - Boche, Holger
AU - Deppe, Christian
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/7/2
Y1 - 2017/7/2
N2 - In next generation connectivity systems, relying on robust and low-latency information exchange, there exists communication tasks in which the Ahlswede/Dueck identification scheme is much more efficient than Shannon's transmission scheme. We concentrate on the arbitrarily varying wiretap channel (AVWC) modeling jamming attacks. We provide a coding scheme for secure identification and determine the secrecy capacity of the AVWC. Furthermore, we analyze important properties of this capacity function, e.g. continuity and super-additivity.
AB - In next generation connectivity systems, relying on robust and low-latency information exchange, there exists communication tasks in which the Ahlswede/Dueck identification scheme is much more efficient than Shannon's transmission scheme. We concentrate on the arbitrarily varying wiretap channel (AVWC) modeling jamming attacks. We provide a coding scheme for secure identification and determine the secrecy capacity of the AVWC. Furthermore, we analyze important properties of this capacity function, e.g. continuity and super-additivity.
UR - http://www.scopus.com/inward/record.url?scp=85049783319&partnerID=8YFLogxK
U2 - 10.1109/WIFS.2017.8267648
DO - 10.1109/WIFS.2017.8267648
M3 - Conference contribution
AN - SCOPUS:85049783319
T3 - 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017
SP - 1
EP - 6
BT - 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017
Y2 - 4 December 2017 through 7 December 2017
ER -