Department of Mathematics
 Search | Help | Login | pdf version | printable version

Math @ Duke



Publications [#235928] of Robert Calderbank

Papers Published

  1. Aggarwal, V; Lai, L; Calderbank, AR; Poor, HV, Wiretap channel type II with an active eavesdropper, IEEE International Symposium on Information Theory - Proceedings (2009), pp. 1944-1948 [doi]
    (last updated on 2018/10/19)

    The wiretap channel type II with an active eavesdropper is considered in this paper. Compared with the eavesdropper model considered in much of the literature, the eavesdropper considered here can not only overhear but also modify the signal transmitted over the channel. Two modification modelsare considered. In the first model, the eavesdropper erases the bits it observes. In the second model, the eavesdropper modifies the bits it observes. For this channel with memory (introduced bythe activity of the eavesdropper), one should conduct the worst case scenario analysis. Novel concatenated coding schemes that provide perfect security for the communications are developed for both models to give bounds on the achievable secrecy rate. The technique to modify the inner code to maintain the secrecyproperties of the outer code may be of independent interest. © 2009 IEEE.
ph: 919.660.2800
fax: 919.660.2821

Mathematics Department
Duke University, Box 90320
Durham, NC 27708-0320