Secret communication when the eavesdropper might be an active adversary

Andrey Garnaev, Wade Trappe

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Scopus citations

Abstract

We study how secret communication can be effected by the fact that an adversary’s capability to eavesdrop on a collection of communications from a base station to a set of users may be restricted and unknown to the transmitter. In this situation, the eavesdropping adversary might have to choose which user to eavesdrop upon if it cannot eavesdrop upon the full set. Thus, the transmitter must make a decision on how to better maintain secret communication, and to do this it must take into account that the eavesdropper might possibly be passive or could be an active adversary that must actively make a choice about which user to eavesdrop upon. Using an example of a Bayesian game-theoretical model with unknown eavesdropping capacity we show why it is important to incorporate in a secret transmission protocol the possibility of an eavesdropper having restricted eavesdropping capacity. Also, since the equilibrium strategies are obtained explicitly, we establish some interesting properties that can guide deployment of such a system.

Original languageEnglish (US)
Title of host publicationMultiple Access Communications - 7th International Workshop, MACOM 2014, Proceedings
EditorsMagnus Jonsson, Alexey Vinel, Boris Bellalta, Evgeny Belyaev
PublisherSpringer Verlag
Pages121-136
Number of pages16
ISBN (Electronic)9783319102610
DOIs
StatePublished - 2014
Externally publishedYes
Event10th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2013 - Egham, United Kingdom
Duration: Aug 11 2013Aug 12 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8715

Other

Other10th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2013
Country/TerritoryUnited Kingdom
CityEgham
Period8/11/138/12/13

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Keywords

  • Active eavesdropper
  • Bayesian game
  • Eavesdropping
  • Equilibrium strategies
  • Secret communication

Fingerprint

Dive into the research topics of 'Secret communication when the eavesdropper might be an active adversary'. Together they form a unique fingerprint.

Cite this