Achievable Information-Theoretic Secrecy in the Presence of a Radar

被引:0
|
作者
Guan, Bo [1 ]
Goeckel, Dennis L. [1 ]
机构
[1] Univ Massachusetts, Dept Elect & Comp Engn, Amherst, MA 01003 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/milcom47813.2019.9020731
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the demand for spectrum increases, co-existence between radar and communication systems has been of increased interest. However, the effect of a radar signal on the secrecy capacity of a communication system operating in the environment has not been addressed. Particularly, for military operations, the limited dynamic range of real receivers is important to consider because the radar signal is often large enough to send the receivers into nonlinearity. In this paper, information-theoretic secrecy is considered when a friendly radar is present in the wiretap channel: the intended receiver Bob can cancel the radar signal before recording the signal based on a key sequence which is shared by the radar with the transmitter Alice and with Bob. However, due to the non-linear conversion operation in the eavesdropper Eve's receiver, Eve is inhibited from recovering the transmitted signal even if she obtains the key after storing the received signal. We analyze the information-theoretic secrecy rate of a wiretap channel co-existing with the radar signal without Gaussian assumptions on the radar signal. This analysis is made difficult relative to prior work due to the complex structure of the radar signal and the correlation between the two dimensions. We show that a positive secrecy rate can be achieved, even when the eavesdropper is closer to the transmitter than the intended receiver.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Distributed Information-Theoretic Biclustering
    Pichler, Georg
    Piantanida, Pablo
    Matz, Gerald
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 1083 - 1087
  • [32] CONTENT - SEMANTIC AND INFORMATION-THEORETIC
    CHURCHLAND, PM
    CHURCHLAND, PS
    BEHAVIORAL AND BRAIN SCIENCES, 1983, 6 (01) : 67 - 68
  • [33] An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels
    Kong, Long
    Ai, Yun
    Lei, Lei
    Kaddoum, Georges
    Chatzinotas, Symeon
    Ottersten, Bjorn
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [34] Joint Information-Theoretic Secrecy and Covertness for UAV-Assisted Wireless Transmission With Finite Blocklength
    Liu, Pengpeng
    Li, Zan
    Si, Jiangbo
    Al-Dhahir, Naofal
    Gao, Yang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (08) : 10187 - 10199
  • [35] An Information-Theoretic Protocol Compiler
    Sahai, Amit
    2012 IEEE INFORMATION THEORY WORKSHOP (ITW), 2012, : 1 - 4
  • [36] Distributed information-theoretic clustering
    Pichler, Georg
    Piantanida, Pablo
    Matz, Gerald
    INFORMATION AND INFERENCE-A JOURNAL OF THE IMA, 2022, 11 (01) : 137 - 166
  • [37] Information-Theoretic System Identification
    Chernyshov, K. R.
    2017 4TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT), 2017, : 1117 - 1122
  • [38] An information-theoretic perspective on teleconnections
    Greene, Arthur M.
    GEOPHYSICAL RESEARCH LETTERS, 2013, 40 (19) : 5258 - 5262
  • [39] An information-theoretic model for steganography
    Cachin, C
    INFORMATION AND COMPUTATION, 2004, 192 (01) : 41 - 56
  • [40] Information-Theoretic Security with Asymmetries
    Beyne, Tim
    Chen, Yu Long
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT IV, 2024, 14923 : 463 - 494