Achievable Information-Theoretic Secrecy in the Presence of a Radar

被引:0
|
作者
Guan, Bo [1 ]
Goeckel, Dennis L. [1 ]
机构
[1] Univ Massachusetts, Dept Elect & Comp Engn, Amherst, MA 01003 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/milcom47813.2019.9020731
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the demand for spectrum increases, co-existence between radar and communication systems has been of increased interest. However, the effect of a radar signal on the secrecy capacity of a communication system operating in the environment has not been addressed. Particularly, for military operations, the limited dynamic range of real receivers is important to consider because the radar signal is often large enough to send the receivers into nonlinearity. In this paper, information-theoretic secrecy is considered when a friendly radar is present in the wiretap channel: the intended receiver Bob can cancel the radar signal before recording the signal based on a key sequence which is shared by the radar with the transmitter Alice and with Bob. However, due to the non-linear conversion operation in the eavesdropper Eve's receiver, Eve is inhibited from recovering the transmitted signal even if she obtains the key after storing the received signal. We analyze the information-theoretic secrecy rate of a wiretap channel co-existing with the radar signal without Gaussian assumptions on the radar signal. This analysis is made difficult relative to prior work due to the complex structure of the radar signal and the correlation between the two dimensions. We show that a positive secrecy rate can be achieved, even when the eavesdropper is closer to the transmitter than the intended receiver.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden
    Forouzesh, Moslem
    Azmi, Paeiz
    Kuhestani, Ali
    Yeoh, Phee Lep
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (09) : 7170 - 7181
  • [2] Information-Theoretic Secrecy with Access to Decryption Oracles
    Portmann, Christopher
    Tanaka, Keisuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (07) : 1585 - 1590
  • [3] Increasing the Information-Theoretic Secrecy by Cooperative Relaying and Jamming
    Marina, Ninoslav
    Stojanovski, Toni Draganov
    Poor, H. Vincent
    2012 50TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2012, : 974 - 981
  • [4] Information-Theoretic Structure of Multistatic Radar Imaging
    Chance, Zachary
    Raj, Raghu G.
    Love, David J.
    2011 IEEE RADAR CONFERENCE (RADAR), 2011, : 853 - 858
  • [5] Information-Theoretic Optimal Radar Waveform Design
    Zhu, Zhenghan
    Kay, Steven
    Raghavan, Ramachandran S.
    IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (03) : 274 - 278
  • [6] Information-theoretic key agreement: From weak to strong secrecy for free
    Maurer, U
    Wolf, S
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 351 - 368
  • [7] Security in heterogeneous distributed storage systems: a practically achievable information-theoretic approach
    Baldi, Marco
    Chiaraluce, Franco
    Senigagliesi, Linda
    Spalazzi, Luca
    Spegni, Francesco
    2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 1021 - 1028
  • [8] Spatial Information-Theoretic Optimal LPI Radar Waveform Design
    Chen, Jun
    Wang, Jie
    Zhang, Yidong
    Wang, Fei
    Zhou, Jianjiang
    ENTROPY, 2022, 24 (11)
  • [9] Information-Theoretic Radar Waveform Design under the SINR Constraint
    Xiao, Yu
    Deng, Zhenghong
    Wu, Tao
    ENTROPY, 2020, 22 (10) : 1 - 17
  • [10] Characterization of the Relations between Information-Theoretic Non-malleability, Secrecy, and Authenticity
    Kawachi, Akinori
    Portmann, Christopher
    Tanaka, Keisuke
    INFORMATION THEORETIC SECURITY, (ICITS 2011), 2011, 6673 : 6 - 24