The search functionality is under construction.

IEICE TRANSACTIONS on Information

A Security Enhancement Technique for Wireless Communications Using Secret Sharing and Physical Layer Secrecy Transmission

Shoichiro YAMASAKI, Tomoko K. MATSUSHIMA

  • Full Text Views

    0

  • Cite this

Summary :

Secret sharing is a method of information protection for security. The information is divided into n shares and reconstructed from any k shares, but no knowledge of the information is revealed from k-1 shares. Physical layer security is a method of achieving favorable reception conditions at the destination terminal in wireless communications. In this study, we propose a security enhancement technique for wireless packet communications. The technique uses secret sharing and physical layer security to exchange a secret encryption key. The encryption key for packet information is set as the secret information in secret sharing, and the secret information is divided into n shares. Each share is located in the packet header. The base station transmits the packets to the destination terminal by using physical layer security based on precoded multi-antenna transmission. With this transmission scheme, the destination terminal can receive more than k shares without error and perfectly recover the secret information. In addition, an eavesdropper terminal can receive less than k-1 shares without error and recover no secret information. In this paper, we propose a protection technique using secret sharing based on systematic Reed-Solomon codes. The technique establishes an advantageous condition for the destination terminal to recover the secret information. The evaluation results by numerical analysis and computer simulation show the validity of the proposed technique.

Publication
IEICE TRANSACTIONS on Information Vol.E99-D No.4 pp.830-838
Publication Date
2016/04/01
Publicized
2016/01/13
Online ISSN
1745-1361
DOI
10.1587/transinf.2015ICP0010
Type of Manuscript
Special Section PAPER (Special Section on Information and Communication System Security)
Category
Network security

Authors

Shoichiro YAMASAKI
  Polytechnic University of Japan
Tomoko K. MATSUSHIMA
  Polytechnic University of Japan

Keyword