Secure bits through queues
We investigate the idea of providing information-theoretic security at the network and data link layers by exploiting the timing information resulting from queuing of packets between a source, an intended receiver, and other users in a network. Specifically, we consider the secure transmission of me...
Saved in:
Published in | 2009 IEEE Information Theory Workshop on Networking and Information Theory pp. 37 - 41 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.06.2009
|
Subjects | |
Online Access | Get full text |
ISBN | 1424445353 9781424445356 |
DOI | 10.1109/ITWNIT.2009.5158537 |
Cover
Loading…
Abstract | We investigate the idea of providing information-theoretic security at the network and data link layers by exploiting the timing information resulting from queuing of packets between a source, an intended receiver, and other users in a network. Specifically, we consider the secure transmission of messages by encoding them onto the interarrival timing of packets that enter parallel queues. By leveraging recent results on the secrecy capacity of arbitrary wiretap channels, achievable secrecy rates are obtained. We also show that equivalent secrecy rates can be achieved using a deterministic encoding strategy, which provides an example contrasting the fact that for many memoryless channels a stochastic encoder is required to achieve non-zero secrecy rates. |
---|---|
AbstractList | We investigate the idea of providing information-theoretic security at the network and data link layers by exploiting the timing information resulting from queuing of packets between a source, an intended receiver, and other users in a network. Specifically, we consider the secure transmission of messages by encoding them onto the interarrival timing of packets that enter parallel queues. By leveraging recent results on the secrecy capacity of arbitrary wiretap channels, achievable secrecy rates are obtained. We also show that equivalent secrecy rates can be achieved using a deterministic encoding strategy, which provides an example contrasting the fact that for many memoryless channels a stochastic encoder is required to achieve non-zero secrecy rates. |
Author | Dunn, B.P. Bloch, M. Laneman, J.N. |
Author_xml | – sequence: 1 givenname: B.P. surname: Dunn fullname: Dunn, B.P. organization: Dept. of Electr. Eng., Univ. of Notre Dame, Notre Dame, IN, USA – sequence: 2 givenname: M. surname: Bloch fullname: Bloch, M. organization: Dept. of Electr. Eng., Univ. of Notre Dame, Notre Dame, IN, USA – sequence: 3 givenname: J.N. surname: Laneman fullname: Laneman, J.N. organization: Dept. of Electr. Eng., Univ. of Notre Dame, Notre Dame, IN, USA |
BookMark | eNo1j81OwzAQhBdBJUjJC9BLXiBhN_bG8RFVUCJVcCCIYxXbGxoELeTnwNtTRJnLaKRvRpoIznb7nQAsCDMitNdV_fJQ1VmOaDMmLlmZE4itKUnnWmtWhTqF6D-wmkH0y1pUJZpziIfhDQ_iQ9PQBVw9iZ96SVw3Dsm47ffT6zb5mmSS4RJmbfM-SHz0OTzf3dbL-3T9uKqWN-u0I8Nj6jXbwDqgzgsrzLZoKVc2kLSBikBktC-w9NYZh9qYUDrVNg6btvHBWa_msPjb7URk89l3H03_vTl-Uz8qVkEs |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ITWNIT.2009.5158537 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781424445363 1424445361 |
EndPage | 41 |
ExternalDocumentID | 5158537 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AARBI AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IERZE OCL RIE RIL |
ID | FETCH-LOGICAL-i175t-c459d54d04269e5596f1239d1efd16d1174c608c9b7b0477d8b3fab0afacdb9c3 |
IEDL.DBID | RIE |
ISBN | 1424445353 9781424445356 |
IngestDate | Wed Aug 27 02:04:32 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
LCCN | 2009903807 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-c459d54d04269e5596f1239d1efd16d1174c608c9b7b0477d8b3fab0afacdb9c3 |
PageCount | 5 |
ParticipantIDs | ieee_primary_5158537 |
PublicationCentury | 2000 |
PublicationDate | 2009-June |
PublicationDateYYYYMMDD | 2009-06-01 |
PublicationDate_xml | – month: 06 year: 2009 text: 2009-June |
PublicationDecade | 2000 |
PublicationTitle | 2009 IEEE Information Theory Workshop on Networking and Information Theory |
PublicationTitleAbbrev | ITWNIT |
PublicationYear | 2009 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000558571 |
Score | 1.5064131 |
Snippet | We investigate the idea of providing information-theoretic security at the network and data link layers by exploiting the timing information resulting from... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 37 |
SubjectTerms | Communication system security Cryptography Data security Information security Information theory Intelligent networks Memoryless systems Protocols Stochastic processes Timing |
Title | Secure bits through queues |
URI | https://ieeexplore.ieee.org/document/5158537 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3LSwMxEMaHtidPKq1ofbAHj2672c1jcxZLK7R42GJvJZMHFKEV3V7615vso6J48LbZhZAQlh_fZOYbgHvlBApGgr8dwZhy52JMmYtVwhxLqeK6ynafL_h0SZ9XbNWBh2MtjLW2Sj6zo_BY3eWbnd6HUNnYs9fTRXSh64VbXat1jKckzH8TpK3doixjWWvp1Ix54zpEEjmeFa-LWVH7VTbT_uivUuFlcgrzdmF1VsnbaF_iSB9-eTb-d-VnMPgu5Itejog6h47d9mFYxdhthJvyM2r69EQeDx4QA1hOnorHady0SIg3nvtlrCmThlETlJC0Xh1w51EkDbHOEG6I1xuaJ7mWKDChQpgcM6cwUU5pg1JnF9Db7rb2EiIvhTnPwx9pkLpUKC2cdEhMzoxEnV5BP-xr_V67YKybLQ3_fn0NJ_W9S4hX3ECv_NjbW4_vEu-qc_sCbR6U_A |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ1LSwMxEMeHWg96UmlF62sPHt12s5vH5iyWVtviYYu9lUweUIRWdPfipzf7aEXx4C0PCAkh_JjJzH8AbpUTKBgp9e0IhpQ7F2LMXKgi5lhMFddVtPt0xkdz-rhgixbc7XJhrLVV8Jntl83qL99sdFG6ygaevZ4uYg_2PfeprLO1dh6ViPlZQbbZW5QlLNmKOjV93ugOkUgOxtnLbJzVipXNwj8qrFSAGR7BdLu1Oq7ktV_k2Nefv1Qb_7v3Y-h-p_IFzztInUDLrjvQq7zsNsBV_hE0lXoCDwiPiC7Mhw_Z_ShsiiSEK0_-PNSUScOoKW0hab19wJ2HkTTEOkO4Id7i0DxKtUSBERXCpJg4hZFyShuUOjmF9nqztmcQeGOY87R8kwapi4XSwkmHxKTMSNTxOXTKcy3fah2MZXOk3t_DN3AwyqaT5WQ8e7qAw_oXpvReXEI7fy_slYd5jtfVHX4BemCYTA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+IEEE+Information+Theory+Workshop+on+Networking+and+Information+Theory&rft.atitle=Secure+bits+through+queues&rft.au=Dunn%2C+B.P.&rft.au=Bloch%2C+M.&rft.au=Laneman%2C+J.N.&rft.date=2009-06-01&rft.pub=IEEE&rft.isbn=9781424445356&rft.spage=37&rft.epage=41&rft_id=info:doi/10.1109%2FITWNIT.2009.5158537&rft.externalDocID=5158537 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424445356/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424445356/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424445356/sc.gif&client=summon&freeimage=true |