Secure identification under jamming attacks

Holger Boche, Christian Deppe

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

In next generation connectivity systems, relying on robust and low-latency information exchange, there exists communication tasks in which the Ahlswede/Dueck identification scheme is much more efficient than Shannon's transmission scheme. We concentrate on the arbitrarily varying wiretap channel (AVWC) modeling jamming attacks. We provide a coding scheme for secure identification and determine the secrecy capacity of the AVWC. Furthermore, we analyze important properties of this capacity function, e.g. continuity and super-additivity.

Original languageEnglish
Title of host publication2017 IEEE Workshop on Information Forensics and Security, WIFS 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-6
Number of pages6
ISBN (Electronic)9781509067695
DOIs
StatePublished - 2 Jul 2017
Event2017 IEEE Workshop on Information Forensics and Security, WIFS 2017 - Rennes, France
Duration: 4 Dec 20177 Dec 2017

Publication series

Name2017 IEEE Workshop on Information Forensics and Security, WIFS 2017
Volume2018-January

Conference

Conference2017 IEEE Workshop on Information Forensics and Security, WIFS 2017
Country/TerritoryFrance
CityRennes
Period4/12/177/12/17

Fingerprint

Dive into the research topics of 'Secure identification under jamming attacks'. Together they form a unique fingerprint.

Cite this