Secure bits through queues

We investigate the idea of providing information-theoretic security at the network and data link layers by exploiting the timing information resulting from queuing of packets between a source, an intended receiver, and other users in a network. Specifically, we consider the secure transmission of me...

Full description

Saved in:
Bibliographic Details
Published in2009 IEEE Information Theory Workshop on Networking and Information Theory pp. 37 - 41
Main Authors Dunn, B.P., Bloch, M., Laneman, J.N.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.06.2009
Subjects
Online AccessGet full text
ISBN1424445353
9781424445356
DOI10.1109/ITWNIT.2009.5158537

Cover

Loading…
Abstract We investigate the idea of providing information-theoretic security at the network and data link layers by exploiting the timing information resulting from queuing of packets between a source, an intended receiver, and other users in a network. Specifically, we consider the secure transmission of messages by encoding them onto the interarrival timing of packets that enter parallel queues. By leveraging recent results on the secrecy capacity of arbitrary wiretap channels, achievable secrecy rates are obtained. We also show that equivalent secrecy rates can be achieved using a deterministic encoding strategy, which provides an example contrasting the fact that for many memoryless channels a stochastic encoder is required to achieve non-zero secrecy rates.
AbstractList We investigate the idea of providing information-theoretic security at the network and data link layers by exploiting the timing information resulting from queuing of packets between a source, an intended receiver, and other users in a network. Specifically, we consider the secure transmission of messages by encoding them onto the interarrival timing of packets that enter parallel queues. By leveraging recent results on the secrecy capacity of arbitrary wiretap channels, achievable secrecy rates are obtained. We also show that equivalent secrecy rates can be achieved using a deterministic encoding strategy, which provides an example contrasting the fact that for many memoryless channels a stochastic encoder is required to achieve non-zero secrecy rates.
Author Dunn, B.P.
Bloch, M.
Laneman, J.N.
Author_xml – sequence: 1
  givenname: B.P.
  surname: Dunn
  fullname: Dunn, B.P.
  organization: Dept. of Electr. Eng., Univ. of Notre Dame, Notre Dame, IN, USA
– sequence: 2
  givenname: M.
  surname: Bloch
  fullname: Bloch, M.
  organization: Dept. of Electr. Eng., Univ. of Notre Dame, Notre Dame, IN, USA
– sequence: 3
  givenname: J.N.
  surname: Laneman
  fullname: Laneman, J.N.
  organization: Dept. of Electr. Eng., Univ. of Notre Dame, Notre Dame, IN, USA
BookMark eNo1j81OwzAQhBdBJUjJC9BLXiBhN_bG8RFVUCJVcCCIYxXbGxoELeTnwNtTRJnLaKRvRpoIznb7nQAsCDMitNdV_fJQ1VmOaDMmLlmZE4itKUnnWmtWhTqF6D-wmkH0y1pUJZpziIfhDQ_iQ9PQBVw9iZ96SVw3Dsm47ffT6zb5mmSS4RJmbfM-SHz0OTzf3dbL-3T9uKqWN-u0I8Nj6jXbwDqgzgsrzLZoKVc2kLSBikBktC-w9NYZh9qYUDrVNg6btvHBWa_msPjb7URk89l3H03_vTl-Uz8qVkEs
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ITWNIT.2009.5158537
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781424445363
1424445361
EndPage 41
ExternalDocumentID 5158537
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AARBI
AAWTH
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-c459d54d04269e5596f1239d1efd16d1174c608c9b7b0477d8b3fab0afacdb9c3
IEDL.DBID RIE
ISBN 1424445353
9781424445356
IngestDate Wed Aug 27 02:04:32 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2009903807
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-c459d54d04269e5596f1239d1efd16d1174c608c9b7b0477d8b3fab0afacdb9c3
PageCount 5
ParticipantIDs ieee_primary_5158537
PublicationCentury 2000
PublicationDate 2009-June
PublicationDateYYYYMMDD 2009-06-01
PublicationDate_xml – month: 06
  year: 2009
  text: 2009-June
PublicationDecade 2000
PublicationTitle 2009 IEEE Information Theory Workshop on Networking and Information Theory
PublicationTitleAbbrev ITWNIT
PublicationYear 2009
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000558571
Score 1.5064131
Snippet We investigate the idea of providing information-theoretic security at the network and data link layers by exploiting the timing information resulting from...
SourceID ieee
SourceType Publisher
StartPage 37
SubjectTerms Communication system security
Cryptography
Data security
Information security
Information theory
Intelligent networks
Memoryless systems
Protocols
Stochastic processes
Timing
Title Secure bits through queues
URI https://ieeexplore.ieee.org/document/5158537
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3LSwMxEMaHtidPKq1ofbAHj2672c1jcxZLK7R42GJvJZMHFKEV3V7615vso6J48LbZhZAQlh_fZOYbgHvlBApGgr8dwZhy52JMmYtVwhxLqeK6ynafL_h0SZ9XbNWBh2MtjLW2Sj6zo_BY3eWbnd6HUNnYs9fTRXSh64VbXat1jKckzH8TpK3doixjWWvp1Ix54zpEEjmeFa-LWVH7VTbT_uivUuFlcgrzdmF1VsnbaF_iSB9-eTb-d-VnMPgu5Itejog6h47d9mFYxdhthJvyM2r69EQeDx4QA1hOnorHady0SIg3nvtlrCmThlETlJC0Xh1w51EkDbHOEG6I1xuaJ7mWKDChQpgcM6cwUU5pg1JnF9Db7rb2EiIvhTnPwx9pkLpUKC2cdEhMzoxEnV5BP-xr_V67YKybLQ3_fn0NJ_W9S4hX3ECv_NjbW4_vEu-qc_sCbR6U_A
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ1LSwMxEMeHWg96UmlF62sPHt12s5vH5iyWVtviYYu9lUweUIRWdPfipzf7aEXx4C0PCAkh_JjJzH8AbpUTKBgp9e0IhpQ7F2LMXKgi5lhMFddVtPt0xkdz-rhgixbc7XJhrLVV8Jntl83qL99sdFG6ygaevZ4uYg_2PfeprLO1dh6ViPlZQbbZW5QlLNmKOjV93ugOkUgOxtnLbJzVipXNwj8qrFSAGR7BdLu1Oq7ktV_k2Nefv1Qb_7v3Y-h-p_IFzztInUDLrjvQq7zsNsBV_hE0lXoCDwiPiC7Mhw_Z_ShsiiSEK0_-PNSUScOoKW0hab19wJ2HkTTEOkO4Id7i0DxKtUSBERXCpJg4hZFyShuUOjmF9nqztmcQeGOY87R8kwapi4XSwkmHxKTMSNTxOXTKcy3fah2MZXOk3t_DN3AwyqaT5WQ8e7qAw_oXpvReXEI7fy_slYd5jtfVHX4BemCYTA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+IEEE+Information+Theory+Workshop+on+Networking+and+Information+Theory&rft.atitle=Secure+bits+through+queues&rft.au=Dunn%2C+B.P.&rft.au=Bloch%2C+M.&rft.au=Laneman%2C+J.N.&rft.date=2009-06-01&rft.pub=IEEE&rft.isbn=9781424445356&rft.spage=37&rft.epage=41&rft_id=info:doi/10.1109%2FITWNIT.2009.5158537&rft.externalDocID=5158537
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424445356/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424445356/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424445356/sc.gif&client=summon&freeimage=true