A Security Enhancement Technique for Wireless Communications Using Secret Sharing and Physical Layer Secrecy Transmission
Secret sharing is a method of information protection for security. The information is divided into n shares and reconstructed from any k shares, but no knowledge of the information is revealed from k-1 shares. Physical layer security is a method of achieving favorable reception conditions at the des...
Saved in:
Published in | IEICE Transactions on Information and Systems Vol. E99.D; no. 4; pp. 830 - 838 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
The Institute of Electronics, Information and Communication Engineers
2016
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Secret sharing is a method of information protection for security. The information is divided into n shares and reconstructed from any k shares, but no knowledge of the information is revealed from k-1 shares. Physical layer security is a method of achieving favorable reception conditions at the destination terminal in wireless communications. In this study, we propose a security enhancement technique for wireless packet communications. The technique uses secret sharing and physical layer security to exchange a secret encryption key. The encryption key for packet information is set as the secret information in secret sharing, and the secret information is divided into n shares. Each share is located in the packet header. The base station transmits the packets to the destination terminal by using physical layer security based on precoded multi-antenna transmission. With this transmission scheme, the destination terminal can receive more than k shares without error and perfectly recover the secret information. In addition, an eavesdropper terminal can receive less than k-1 shares without error and recover no secret information. In this paper, we propose a protection technique using secret sharing based on systematic Reed-Solomon codes. The technique establishes an advantageous condition for the destination terminal to recover the secret information. The evaluation results by numerical analysis and computer simulation show the validity of the proposed technique. |
---|---|
AbstractList | Secret sharing is a method of information protection for security. The information is divided into n shares and reconstructed from any k shares, but no knowledge of the information is revealed from k-1 shares. Physical layer security is a method of achieving favorable reception conditions at the destination terminal in wireless communications. In this study, we propose a security enhancement technique for wireless packet communications. The technique uses secret sharing and physical layer security to exchange a secret encryption key. The encryption key for packet information is set as the secret information in secret sharing, and the secret information is divided into n shares. Each share is located in the packet header. The base station transmits the packets to the destination terminal by using physical layer security based on precoded multi-antenna transmission. With this transmission scheme, the destination terminal can receive more than k shares without error and perfectly recover the secret information. In addition, an eavesdropper terminal can receive less than k-1 shares without error and recover no secret information. In this paper, we propose a protection technique using secret sharing based on systematic Reed-Solomon codes. The technique establishes an advantageous condition for the destination terminal to recover the secret information. The evaluation results by numerical analysis and computer simulation show the validity of the proposed technique. |
Author | YAMASAKI, Shoichiro MATSUSHIMA, Tomoko K. |
Author_xml | – sequence: 1 fullname: YAMASAKI, Shoichiro organization: Polytechnic University of Japan – sequence: 2 fullname: MATSUSHIMA, Tomoko K. organization: Polytechnic University of Japan |
BookMark | eNqFkU9P2zAYh62pk9YyvgEHH7mk-G3ixOaGSgdIlVaJoh0tx3lDjRKn2O4h334uZQztstMrS8_z_vl5RiZucEjIBbA5cFFdRa9dsK6dLxjwh-WGMWBfyBSqgmeQlzAhUyahzATPF9_ILISXRIgF8CkZb-gjmoO3caQrt9POYI8u0i2anbOvB6Tt4Okv67HDEOhy6PuDs0ZHO7hAn9LU52MDj5E-7rQ_PrVr6GY3hkR1dK1H9CfCjHR7XLS3IST7O_na6i7g-Xs9I08_Vtvlfbb-efewvFlnhlcsZqIWUtaIRdOYUhdtI1ldiDIXgksAjpWseQFNm7eskLysyqrRla4bVkMlZFnnZ-Ty1Hfvh3RPiCotYLDrtMPhEBQIJgAWTMqEFifU-CEEj63ae9trPypg6pi0-pO0-pR00q7_0YyNbwkl3Hb_kzcn-SVE_YwfE7WP1nT4V1pJqW5V8V4_tfhATfoAhS7_DS7XqF0 |
CitedBy_id | crossref_primary_10_1587_transfun_E100_A_2680 crossref_primary_10_3390_telecom1030018 crossref_primary_10_1587_essfr_12_2_107 |
Cites_doi | 10.1109/18.661517 10.1002/047001413X 10.1145/358746.358762 10.1109/MCOM.2015.7081071 10.1109/MSP.2013.2256953 10.1007/978-981-4560-14-6 10.1109/MSP.2013.2260875 10.1145/359168.359176 |
ContentType | Journal Article |
Copyright | 2016 The Institute of Electronics, Information and Communication Engineers |
Copyright_xml | – notice: 2016 The Institute of Electronics, Information and Communication Engineers |
DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1587/transinf.2015ICP0010 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1745-1361 |
EndPage | 838 |
ExternalDocumentID | 10_1587_transinf_2015ICP0010 article_transinf_E99_D_4_E99_D_2015ICP0010_article_char_en |
GroupedDBID | -~X 5GY ABZEH ACGFS ADNWM AENEX ALMA_UNASSIGNED_HOLDINGS CS3 DU5 EBS EJD F5P ICE JSF JSH KQ8 OK1 P2P RJT RZJ TN5 TQK ZKX 1TH AAYXX ABJNI AFFNX C1A CITATION CKLRP H13 RIG RYL VOH ZE2 ZY4 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c570t-8b899bee4ddc6a4fd90b48638859115e79b541df3f04956767da7abd0b17896b3 |
ISSN | 0916-8532 |
IngestDate | Fri Jul 11 09:17:41 EDT 2025 Tue Jul 01 02:27:54 EDT 2025 Thu Apr 24 22:58:48 EDT 2025 Wed Apr 05 06:36:45 EDT 2023 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c570t-8b899bee4ddc6a4fd90b48638859115e79b541df3f04956767da7abd0b17896b3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
OpenAccessLink | https://www.jstage.jst.go.jp/article/transinf/E99.D/4/E99.D_2015ICP0010/_article/-char/en |
PQID | 1808112099 |
PQPubID | 23500 |
PageCount | 9 |
ParticipantIDs | proquest_miscellaneous_1808112099 crossref_primary_10_1587_transinf_2015ICP0010 crossref_citationtrail_10_1587_transinf_2015ICP0010 jstage_primary_article_transinf_E99_D_4_E99_D_2015ICP0010_article_char_en |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20160000 |
PublicationDateYYYYMMDD | 2016-01-01 |
PublicationDate_xml | – year: 2016 text: 20160000 |
PublicationDecade | 2010 |
PublicationTitle | IEICE Transactions on Information and Systems |
PublicationTitleAlternate | IEICE Trans. Inf. & Syst. |
PublicationYear | 2016 |
Publisher | The Institute of Electronics, Information and Communication Engineers |
Publisher_xml | – name: The Institute of Electronics, Information and Communication Engineers |
References | [13] B. Vucetic and J. Yuan, Space-Time Coding, John Wiley & Sons Ltd., 2003. [2] R. Bassily, E. Ekrem, X. He, E. Tekin, J. Xie, M.R. Bloch, S. Ulukus, and A. Yener, “Cooperative security at the physical layer,” IEEE Signal Process. Mag., vol.30, no.5, pp.16-28, Sept. 2013. [5] A. Shamir, “How to share a secret,” Commun. ACM, vol.22, no.11, pp.612-613, 1979. [8] S. Yamasaki, T.K. Matsushima, and K. Ohno, “A security enhancement scheme for wireless packet communications using secret sharing and precoding,” IEICE Technical Report, SIS2013-51, Dec. 2013. [7] R.J. McEliece and D.V. Sarwate, “On sharing secrets and Reed-Solomon codes,” Commun. ACM, vol.24, no.9, pp.583-584, 1981. [4] Y.-W.P. Hong, P.-C. Lan, and C.-C.J. Kuo, Signal processing approaches to secure physical layer communications in multi-antenna wireless systems, Springer briefs in electrical and computer eng., 2014. [10] C. Kawashima, T. Yoshida, and T.K. Matsushima, “Study on hierarchical secret sharing schemes using product and concatenated codes,” IEICE Technical Report, ISEC2007-76, Sept. 2007. [12] V. Tarokh, N. Seshadri, and A. Calderbank, “Space time codes for high data rate wireless communication: Performance criterion and code construction,” IEEE Trans. Inf. Theory, vol.44, no.2, pp.744-765, March 1998. [6] K. Kurosawa and W. Ogata, Introduction to modern cryptography, Corona Publishing, 2004. [9] S. Yamasaki, T.K. Matsushima, and K. Ohno, “On a secret sharing scheme with systematic Reed-Solomon codes and its applications,” IEICE Technical Report, IT2013-88, March 2014. [1] N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M.D. Renzo, “Safeguarding 5G wireless communication networks using physical layer security,” IEEE Commun, Mag., vol.53, no.4, pp.20-27, April 2015. [3] Y.-W.P. Hong, P.-C. Lan, and C.-C.J. Kuo, “Enhancing physical-layer secrecy in multiantenna wireless systems,” IEEE Signal Process. Mag., vol.30, no.5, pp.29-40, Sept. 2013. [11] C. Kawashima, T. Yoshida, and T.K. Matsushima. “A study on hierarchical secret sharing schemes using product codes,” 2008 Symposium on Cryptography and Information Security (SCIC2008), pp.22-25, Jan. 2008 11 12 13 1 2 3 4 5 6 7 8 9 10 |
References_xml | – reference: [7] R.J. McEliece and D.V. Sarwate, “On sharing secrets and Reed-Solomon codes,” Commun. ACM, vol.24, no.9, pp.583-584, 1981. – reference: [10] C. Kawashima, T. Yoshida, and T.K. Matsushima, “Study on hierarchical secret sharing schemes using product and concatenated codes,” IEICE Technical Report, ISEC2007-76, Sept. 2007. – reference: [12] V. Tarokh, N. Seshadri, and A. Calderbank, “Space time codes for high data rate wireless communication: Performance criterion and code construction,” IEEE Trans. Inf. Theory, vol.44, no.2, pp.744-765, March 1998. – reference: [4] Y.-W.P. Hong, P.-C. Lan, and C.-C.J. Kuo, Signal processing approaches to secure physical layer communications in multi-antenna wireless systems, Springer briefs in electrical and computer eng., 2014. – reference: [3] Y.-W.P. Hong, P.-C. Lan, and C.-C.J. Kuo, “Enhancing physical-layer secrecy in multiantenna wireless systems,” IEEE Signal Process. Mag., vol.30, no.5, pp.29-40, Sept. 2013. – reference: [2] R. Bassily, E. Ekrem, X. He, E. Tekin, J. Xie, M.R. Bloch, S. Ulukus, and A. Yener, “Cooperative security at the physical layer,” IEEE Signal Process. Mag., vol.30, no.5, pp.16-28, Sept. 2013. – reference: [6] K. Kurosawa and W. Ogata, Introduction to modern cryptography, Corona Publishing, 2004. – reference: [9] S. Yamasaki, T.K. Matsushima, and K. Ohno, “On a secret sharing scheme with systematic Reed-Solomon codes and its applications,” IEICE Technical Report, IT2013-88, March 2014. – reference: [11] C. Kawashima, T. Yoshida, and T.K. Matsushima. “A study on hierarchical secret sharing schemes using product codes,” 2008 Symposium on Cryptography and Information Security (SCIC2008), pp.22-25, Jan. 2008 – reference: [1] N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M.D. Renzo, “Safeguarding 5G wireless communication networks using physical layer security,” IEEE Commun, Mag., vol.53, no.4, pp.20-27, April 2015. – reference: [5] A. Shamir, “How to share a secret,” Commun. ACM, vol.22, no.11, pp.612-613, 1979. – reference: [13] B. Vucetic and J. Yuan, Space-Time Coding, John Wiley & Sons Ltd., 2003. – reference: [8] S. Yamasaki, T.K. Matsushima, and K. Ohno, “A security enhancement scheme for wireless packet communications using secret sharing and precoding,” IEICE Technical Report, SIS2013-51, Dec. 2013. – ident: 12 doi: 10.1109/18.661517 – ident: 11 – ident: 13 doi: 10.1002/047001413X – ident: 7 doi: 10.1145/358746.358762 – ident: 1 doi: 10.1109/MCOM.2015.7081071 – ident: 10 – ident: 3 doi: 10.1109/MSP.2013.2256953 – ident: 6 – ident: 9 – ident: 4 doi: 10.1007/978-981-4560-14-6 – ident: 8 – ident: 2 doi: 10.1109/MSP.2013.2260875 – ident: 5 doi: 10.1145/359168.359176 |
SSID | ssj0018215 ssib053832749 ssib002991706 ssib036429076 ssib036429077 ssib023157076 |
Score | 2.0559335 |
Snippet | Secret sharing is a method of information protection for security. The information is divided into n shares and reconstructed from any k shares, but no... |
SourceID | proquest crossref jstage |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 830 |
SubjectTerms | Computer information security Encryption Errors Exchange multi-antenna transmission Packet transmission physical layer security Reed-Solomon codes Secrecy aspects secret sharing Terminals Wireless communication |
Title | A Security Enhancement Technique for Wireless Communications Using Secret Sharing and Physical Layer Secrecy Transmission |
URI | https://www.jstage.jst.go.jp/article/transinf/E99.D/4/E99.D_2015ICP0010/_article/-char/en https://www.proquest.com/docview/1808112099 |
Volume | E99.D |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
ispartofPNX | IEICE Transactions on Information and Systems, 2016/04/01, Vol.E99.D(4), pp.830-838 |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bj5NAFJ7U1Qd98LJqrLeMiW8bKpQBhkfSZVOsa9a0TfaNwDDY1RXMlj6sv8af6jnMDKXuRl1foJkME-D7ejhnzo2Qt2PBClAbfMsNC89iDMwdzgSzgszmwpfScTlmIx9_9KdL9v7UOx0MfvailjZNPhI_rs0r-R9UYQxwxSzZGyDbLQoD8BvwhSMgDMd_wjjS2-WgSMfVCvFrXfuLri4rxhBifOs5yrOdXJD1gQoWmKPaqOo2m3TFEwPdhwz0cTVDXKoy6MCKtUFSq7RJnExibDVh-o63DghdkLUx0c7rXmV0FDIg6-fRLGk3X1f1mVidXdQd-NFivpxPk-OoZVP9rf5aH8xG_Q0KlTlp9hiBBKAPKHErlYQNmGc5rqrAbkRwHIajwx7bWE-kcu230V9nVQvmiuD3cOvkqH1WGMeQPS-ZnKDFu_3QGef-b9-_LioR7SFYJzWrpL1VbpHbYzBEsEfG7NPWT8XHqkeGeVCdnAmrvLvuXnaUnztfQP__fFUJaDWbxUNyX5skNFL8ekQGstonD0y7D6ql_z6516td-ZhcRtSQj_bIRzvyUSAANeSju-SjLfmoIh_V5KPAE2rIR1vyUU0-2iffE7I8iheTqaX7eFjCC-zG4jkY9bmUrCiEn7GyCO2ccRD8WDvR8WQQ5h5zitItbTTXAz8osiDLCzt3Ah76ufuU7FV1JZ8R6oSOJ8pScifIWclFKAq_lLaQY8HLomRD4poXnApd5B57rZynfwJ3SKzuqu-qyMtf5icKu262FgHb2cDo9DBl-ty7tpuKWZUgxIbkjYE_hdeI7rqskvVmnTrYFKdNbX9-w_t7Qe7iH1HtFL4ke83FRr4C3bnJX7f0_QUsa8vz |
linkProvider | Colorado Alliance of Research Libraries |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Security+Enhancement+Technique+for+Wireless+Communications+Using+Secret+Sharing+and+Physical+Layer+Secrecy+Transmission&rft.jtitle=IEICE+transactions+on+information+and+systems&rft.au=YAMASAKI%2C+Shoichiro&rft.au=MATSUSHIMA%2C+Tomoko+K.&rft.date=2016&rft.issn=0916-8532&rft.eissn=1745-1361&rft.volume=E99.D&rft.issue=4&rft.spage=830&rft.epage=838&rft_id=info:doi/10.1587%2Ftransinf.2015ICP0010&rft.externalDBID=n%2Fa&rft.externalDocID=10_1587_transinf_2015ICP0010 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0916-8532&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0916-8532&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0916-8532&client=summon |