A Security Enhancement Technique for Wireless Communications Using Secret Sharing and Physical Layer Secrecy Transmission

Secret sharing is a method of information protection for security. The information is divided into n shares and reconstructed from any k shares, but no knowledge of the information is revealed from k-1 shares. Physical layer security is a method of achieving favorable reception conditions at the des...

Full description

Saved in:
Bibliographic Details
Published inIEICE Transactions on Information and Systems Vol. E99.D; no. 4; pp. 830 - 838
Main Authors YAMASAKI, Shoichiro, MATSUSHIMA, Tomoko K.
Format Journal Article
LanguageEnglish
Published The Institute of Electronics, Information and Communication Engineers 2016
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Secret sharing is a method of information protection for security. The information is divided into n shares and reconstructed from any k shares, but no knowledge of the information is revealed from k-1 shares. Physical layer security is a method of achieving favorable reception conditions at the destination terminal in wireless communications. In this study, we propose a security enhancement technique for wireless packet communications. The technique uses secret sharing and physical layer security to exchange a secret encryption key. The encryption key for packet information is set as the secret information in secret sharing, and the secret information is divided into n shares. Each share is located in the packet header. The base station transmits the packets to the destination terminal by using physical layer security based on precoded multi-antenna transmission. With this transmission scheme, the destination terminal can receive more than k shares without error and perfectly recover the secret information. In addition, an eavesdropper terminal can receive less than k-1 shares without error and recover no secret information. In this paper, we propose a protection technique using secret sharing based on systematic Reed-Solomon codes. The technique establishes an advantageous condition for the destination terminal to recover the secret information. The evaluation results by numerical analysis and computer simulation show the validity of the proposed technique.
AbstractList Secret sharing is a method of information protection for security. The information is divided into n shares and reconstructed from any k shares, but no knowledge of the information is revealed from k-1 shares. Physical layer security is a method of achieving favorable reception conditions at the destination terminal in wireless communications. In this study, we propose a security enhancement technique for wireless packet communications. The technique uses secret sharing and physical layer security to exchange a secret encryption key. The encryption key for packet information is set as the secret information in secret sharing, and the secret information is divided into n shares. Each share is located in the packet header. The base station transmits the packets to the destination terminal by using physical layer security based on precoded multi-antenna transmission. With this transmission scheme, the destination terminal can receive more than k shares without error and perfectly recover the secret information. In addition, an eavesdropper terminal can receive less than k-1 shares without error and recover no secret information. In this paper, we propose a protection technique using secret sharing based on systematic Reed-Solomon codes. The technique establishes an advantageous condition for the destination terminal to recover the secret information. The evaluation results by numerical analysis and computer simulation show the validity of the proposed technique.
Author YAMASAKI, Shoichiro
MATSUSHIMA, Tomoko K.
Author_xml – sequence: 1
  fullname: YAMASAKI, Shoichiro
  organization: Polytechnic University of Japan
– sequence: 2
  fullname: MATSUSHIMA, Tomoko K.
  organization: Polytechnic University of Japan
BookMark eNqFkU9P2zAYh62pk9YyvgEHH7mk-G3ixOaGSgdIlVaJoh0tx3lDjRKn2O4h334uZQztstMrS8_z_vl5RiZucEjIBbA5cFFdRa9dsK6dLxjwh-WGMWBfyBSqgmeQlzAhUyahzATPF9_ILISXRIgF8CkZb-gjmoO3caQrt9POYI8u0i2anbOvB6Tt4Okv67HDEOhy6PuDs0ZHO7hAn9LU52MDj5E-7rQ_PrVr6GY3hkR1dK1H9CfCjHR7XLS3IST7O_na6i7g-Xs9I08_Vtvlfbb-efewvFlnhlcsZqIWUtaIRdOYUhdtI1ldiDIXgksAjpWseQFNm7eskLysyqrRla4bVkMlZFnnZ-Ty1Hfvh3RPiCotYLDrtMPhEBQIJgAWTMqEFifU-CEEj63ae9trPypg6pi0-pO0-pR00q7_0YyNbwkl3Hb_kzcn-SVE_YwfE7WP1nT4V1pJqW5V8V4_tfhATfoAhS7_DS7XqF0
CitedBy_id crossref_primary_10_1587_transfun_E100_A_2680
crossref_primary_10_3390_telecom1030018
crossref_primary_10_1587_essfr_12_2_107
Cites_doi 10.1109/18.661517
10.1002/047001413X
10.1145/358746.358762
10.1109/MCOM.2015.7081071
10.1109/MSP.2013.2256953
10.1007/978-981-4560-14-6
10.1109/MSP.2013.2260875
10.1145/359168.359176
ContentType Journal Article
Copyright 2016 The Institute of Electronics, Information and Communication Engineers
Copyright_xml – notice: 2016 The Institute of Electronics, Information and Communication Engineers
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1587/transinf.2015ICP0010
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1745-1361
EndPage 838
ExternalDocumentID 10_1587_transinf_2015ICP0010
article_transinf_E99_D_4_E99_D_2015ICP0010_article_char_en
GroupedDBID -~X
5GY
ABZEH
ACGFS
ADNWM
AENEX
ALMA_UNASSIGNED_HOLDINGS
CS3
DU5
EBS
EJD
F5P
ICE
JSF
JSH
KQ8
OK1
P2P
RJT
RZJ
TN5
TQK
ZKX
1TH
AAYXX
ABJNI
AFFNX
C1A
CITATION
CKLRP
H13
RIG
RYL
VOH
ZE2
ZY4
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c570t-8b899bee4ddc6a4fd90b48638859115e79b541df3f04956767da7abd0b17896b3
ISSN 0916-8532
IngestDate Fri Jul 11 09:17:41 EDT 2025
Tue Jul 01 02:27:54 EDT 2025
Thu Apr 24 22:58:48 EDT 2025
Wed Apr 05 06:36:45 EDT 2023
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c570t-8b899bee4ddc6a4fd90b48638859115e79b541df3f04956767da7abd0b17896b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
OpenAccessLink https://www.jstage.jst.go.jp/article/transinf/E99.D/4/E99.D_2015ICP0010/_article/-char/en
PQID 1808112099
PQPubID 23500
PageCount 9
ParticipantIDs proquest_miscellaneous_1808112099
crossref_primary_10_1587_transinf_2015ICP0010
crossref_citationtrail_10_1587_transinf_2015ICP0010
jstage_primary_article_transinf_E99_D_4_E99_D_2015ICP0010_article_char_en
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20160000
PublicationDateYYYYMMDD 2016-01-01
PublicationDate_xml – year: 2016
  text: 20160000
PublicationDecade 2010
PublicationTitle IEICE Transactions on Information and Systems
PublicationTitleAlternate IEICE Trans. Inf. & Syst.
PublicationYear 2016
Publisher The Institute of Electronics, Information and Communication Engineers
Publisher_xml – name: The Institute of Electronics, Information and Communication Engineers
References [13] B. Vucetic and J. Yuan, Space-Time Coding, John Wiley & Sons Ltd., 2003.
[2] R. Bassily, E. Ekrem, X. He, E. Tekin, J. Xie, M.R. Bloch, S. Ulukus, and A. Yener, “Cooperative security at the physical layer,” IEEE Signal Process. Mag., vol.30, no.5, pp.16-28, Sept. 2013.
[5] A. Shamir, “How to share a secret,” Commun. ACM, vol.22, no.11, pp.612-613, 1979.
[8] S. Yamasaki, T.K. Matsushima, and K. Ohno, “A security enhancement scheme for wireless packet communications using secret sharing and precoding,” IEICE Technical Report, SIS2013-51, Dec. 2013.
[7] R.J. McEliece and D.V. Sarwate, “On sharing secrets and Reed-Solomon codes,” Commun. ACM, vol.24, no.9, pp.583-584, 1981.
[4] Y.-W.P. Hong, P.-C. Lan, and C.-C.J. Kuo, Signal processing approaches to secure physical layer communications in multi-antenna wireless systems, Springer briefs in electrical and computer eng., 2014.
[10] C. Kawashima, T. Yoshida, and T.K. Matsushima, “Study on hierarchical secret sharing schemes using product and concatenated codes,” IEICE Technical Report, ISEC2007-76, Sept. 2007.
[12] V. Tarokh, N. Seshadri, and A. Calderbank, “Space time codes for high data rate wireless communication: Performance criterion and code construction,” IEEE Trans. Inf. Theory, vol.44, no.2, pp.744-765, March 1998.
[6] K. Kurosawa and W. Ogata, Introduction to modern cryptography, Corona Publishing, 2004.
[9] S. Yamasaki, T.K. Matsushima, and K. Ohno, “On a secret sharing scheme with systematic Reed-Solomon codes and its applications,” IEICE Technical Report, IT2013-88, March 2014.
[1] N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M.D. Renzo, “Safeguarding 5G wireless communication networks using physical layer security,” IEEE Commun, Mag., vol.53, no.4, pp.20-27, April 2015.
[3] Y.-W.P. Hong, P.-C. Lan, and C.-C.J. Kuo, “Enhancing physical-layer secrecy in multiantenna wireless systems,” IEEE Signal Process. Mag., vol.30, no.5, pp.29-40, Sept. 2013.
[11] C. Kawashima, T. Yoshida, and T.K. Matsushima. “A study on hierarchical secret sharing schemes using product codes,” 2008 Symposium on Cryptography and Information Security (SCIC2008), pp.22-25, Jan. 2008
11
12
13
1
2
3
4
5
6
7
8
9
10
References_xml – reference: [7] R.J. McEliece and D.V. Sarwate, “On sharing secrets and Reed-Solomon codes,” Commun. ACM, vol.24, no.9, pp.583-584, 1981.
– reference: [10] C. Kawashima, T. Yoshida, and T.K. Matsushima, “Study on hierarchical secret sharing schemes using product and concatenated codes,” IEICE Technical Report, ISEC2007-76, Sept. 2007.
– reference: [12] V. Tarokh, N. Seshadri, and A. Calderbank, “Space time codes for high data rate wireless communication: Performance criterion and code construction,” IEEE Trans. Inf. Theory, vol.44, no.2, pp.744-765, March 1998.
– reference: [4] Y.-W.P. Hong, P.-C. Lan, and C.-C.J. Kuo, Signal processing approaches to secure physical layer communications in multi-antenna wireless systems, Springer briefs in electrical and computer eng., 2014.
– reference: [3] Y.-W.P. Hong, P.-C. Lan, and C.-C.J. Kuo, “Enhancing physical-layer secrecy in multiantenna wireless systems,” IEEE Signal Process. Mag., vol.30, no.5, pp.29-40, Sept. 2013.
– reference: [2] R. Bassily, E. Ekrem, X. He, E. Tekin, J. Xie, M.R. Bloch, S. Ulukus, and A. Yener, “Cooperative security at the physical layer,” IEEE Signal Process. Mag., vol.30, no.5, pp.16-28, Sept. 2013.
– reference: [6] K. Kurosawa and W. Ogata, Introduction to modern cryptography, Corona Publishing, 2004.
– reference: [9] S. Yamasaki, T.K. Matsushima, and K. Ohno, “On a secret sharing scheme with systematic Reed-Solomon codes and its applications,” IEICE Technical Report, IT2013-88, March 2014.
– reference: [11] C. Kawashima, T. Yoshida, and T.K. Matsushima. “A study on hierarchical secret sharing schemes using product codes,” 2008 Symposium on Cryptography and Information Security (SCIC2008), pp.22-25, Jan. 2008
– reference: [1] N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M.D. Renzo, “Safeguarding 5G wireless communication networks using physical layer security,” IEEE Commun, Mag., vol.53, no.4, pp.20-27, April 2015.
– reference: [5] A. Shamir, “How to share a secret,” Commun. ACM, vol.22, no.11, pp.612-613, 1979.
– reference: [13] B. Vucetic and J. Yuan, Space-Time Coding, John Wiley & Sons Ltd., 2003.
– reference: [8] S. Yamasaki, T.K. Matsushima, and K. Ohno, “A security enhancement scheme for wireless packet communications using secret sharing and precoding,” IEICE Technical Report, SIS2013-51, Dec. 2013.
– ident: 12
  doi: 10.1109/18.661517
– ident: 11
– ident: 13
  doi: 10.1002/047001413X
– ident: 7
  doi: 10.1145/358746.358762
– ident: 1
  doi: 10.1109/MCOM.2015.7081071
– ident: 10
– ident: 3
  doi: 10.1109/MSP.2013.2256953
– ident: 6
– ident: 9
– ident: 4
  doi: 10.1007/978-981-4560-14-6
– ident: 8
– ident: 2
  doi: 10.1109/MSP.2013.2260875
– ident: 5
  doi: 10.1145/359168.359176
SSID ssj0018215
ssib053832749
ssib002991706
ssib036429076
ssib036429077
ssib023157076
Score 2.0559335
Snippet Secret sharing is a method of information protection for security. The information is divided into n shares and reconstructed from any k shares, but no...
SourceID proquest
crossref
jstage
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 830
SubjectTerms Computer information security
Encryption
Errors
Exchange
multi-antenna transmission
Packet transmission
physical layer security
Reed-Solomon codes
Secrecy aspects
secret sharing
Terminals
Wireless communication
Title A Security Enhancement Technique for Wireless Communications Using Secret Sharing and Physical Layer Secrecy Transmission
URI https://www.jstage.jst.go.jp/article/transinf/E99.D/4/E99.D_2015ICP0010/_article/-char/en
https://www.proquest.com/docview/1808112099
Volume E99.D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
ispartofPNX IEICE Transactions on Information and Systems, 2016/04/01, Vol.E99.D(4), pp.830-838
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bj5NAFJ7U1Qd98LJqrLeMiW8bKpQBhkfSZVOsa9a0TfaNwDDY1RXMlj6sv8af6jnMDKXuRl1foJkME-D7ejhnzo2Qt2PBClAbfMsNC89iDMwdzgSzgszmwpfScTlmIx9_9KdL9v7UOx0MfvailjZNPhI_rs0r-R9UYQxwxSzZGyDbLQoD8BvwhSMgDMd_wjjS2-WgSMfVCvFrXfuLri4rxhBifOs5yrOdXJD1gQoWmKPaqOo2m3TFEwPdhwz0cTVDXKoy6MCKtUFSq7RJnExibDVh-o63DghdkLUx0c7rXmV0FDIg6-fRLGk3X1f1mVidXdQd-NFivpxPk-OoZVP9rf5aH8xG_Q0KlTlp9hiBBKAPKHErlYQNmGc5rqrAbkRwHIajwx7bWE-kcu230V9nVQvmiuD3cOvkqH1WGMeQPS-ZnKDFu_3QGef-b9-_LioR7SFYJzWrpL1VbpHbYzBEsEfG7NPWT8XHqkeGeVCdnAmrvLvuXnaUnztfQP__fFUJaDWbxUNyX5skNFL8ekQGstonD0y7D6ql_z6516td-ZhcRtSQj_bIRzvyUSAANeSju-SjLfmoIh_V5KPAE2rIR1vyUU0-2iffE7I8iheTqaX7eFjCC-zG4jkY9bmUrCiEn7GyCO2ccRD8WDvR8WQQ5h5zitItbTTXAz8osiDLCzt3Ah76ufuU7FV1JZ8R6oSOJ8pScifIWclFKAq_lLaQY8HLomRD4poXnApd5B57rZynfwJ3SKzuqu-qyMtf5icKu262FgHb2cDo9DBl-ty7tpuKWZUgxIbkjYE_hdeI7rqskvVmnTrYFKdNbX9-w_t7Qe7iH1HtFL4ke83FRr4C3bnJX7f0_QUsa8vz
linkProvider Colorado Alliance of Research Libraries
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Security+Enhancement+Technique+for+Wireless+Communications+Using+Secret+Sharing+and+Physical+Layer+Secrecy+Transmission&rft.jtitle=IEICE+transactions+on+information+and+systems&rft.au=YAMASAKI%2C+Shoichiro&rft.au=MATSUSHIMA%2C+Tomoko+K.&rft.date=2016&rft.issn=0916-8532&rft.eissn=1745-1361&rft.volume=E99.D&rft.issue=4&rft.spage=830&rft.epage=838&rft_id=info:doi/10.1587%2Ftransinf.2015ICP0010&rft.externalDBID=n%2Fa&rft.externalDocID=10_1587_transinf_2015ICP0010
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0916-8532&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0916-8532&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0916-8532&client=summon