Achievable Information-Theoretic Secrecy in the Presence of a Radar

被引:0
|
作者
Guan, Bo [1 ]
Goeckel, Dennis L. [1 ]
机构
[1] Univ Massachusetts, Dept Elect & Comp Engn, Amherst, MA 01003 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/milcom47813.2019.9020731
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the demand for spectrum increases, co-existence between radar and communication systems has been of increased interest. However, the effect of a radar signal on the secrecy capacity of a communication system operating in the environment has not been addressed. Particularly, for military operations, the limited dynamic range of real receivers is important to consider because the radar signal is often large enough to send the receivers into nonlinearity. In this paper, information-theoretic secrecy is considered when a friendly radar is present in the wiretap channel: the intended receiver Bob can cancel the radar signal before recording the signal based on a key sequence which is shared by the radar with the transmitter Alice and with Bob. However, due to the non-linear conversion operation in the eavesdropper Eve's receiver, Eve is inhibited from recovering the transmitted signal even if she obtains the key after storing the received signal. We analyze the information-theoretic secrecy rate of a wiretap channel co-existing with the radar signal without Gaussian assumptions on the radar signal. This analysis is made difficult relative to prior work due to the complex structure of the radar signal and the correlation between the two dimensions. We show that a positive secrecy rate can be achieved, even when the eavesdropper is closer to the transmitter than the intended receiver.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Information-theoretic analysis of information hiding
    Moulin, P
    O'Sullivan, JA
    2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 19 - 19
  • [22] Information-theoretic analysis of information hiding
    Moulin, P
    O'Sullivan, JA
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (03) : 563 - 593
  • [23] On the information-theoretic capacity of magnetic recording systems in the presence of medium noise
    Arnold, D
    Eleftheriou, E
    IEEE TRANSACTIONS ON MAGNETICS, 2002, 38 (05) : 2319 - 2321
  • [24] Information-theoretic and set-theoretic similarity
    Cazzanti, Luca
    Gupta, Maya R.
    2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 1836 - +
  • [25] An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels
    Long Kong
    Yun Ai
    Lei Lei
    Georges Kaddoum
    Symeon Chatzinotas
    Björn Ottersten
    EURASIP Journal on Wireless Communications and Networking, 2021
  • [26] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [27] Information-theoretic limits of control
    Touchette, H
    Lloyd, S
    PHYSICAL REVIEW LETTERS, 2000, 84 (06) : 1156 - 1159
  • [28] AN INFORMATION-THEORETIC FRAMEWORK FOR ROBUSTNESS
    MORGENTHALER, S
    HURVICH, C
    ANNALS OF THE INSTITUTE OF STATISTICAL MATHEMATICS, 1991, 43 (01) : 131 - 146
  • [29] Notes on Information-Theoretic Privacy
    Asoodeh, Shahab
    Alajaji, Fady
    Linder, Tamas
    2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2014, : 1272 - 1278
  • [30] INFORMATION-THEORETIC VIEW OF CONTROL
    Roy, Prateep
    Cela, Arben
    Hamam, Yskandar
    ICINCO 2009: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS, VOL 3, 2009, : 5 - +