|
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
|
Distributed Transmission for Secure Wireless Links Based on a Secret-Sharing Method
Masaaki YAMANAKA ShenCong WEI Jingbo ZOU Shuichi OHNO Shinichi MIYAMOTO Seiichi SAMPEI
Publication
IEICE TRANSACTIONS on Communications
Vol.E102-B
No.12
pp.2286-2296 Publication Date: 2019/12/01 Publicized: 2019/06/17 Online ISSN: 1745-1345
DOI: 10.1587/transcom.2018EBP3284 Type of Manuscript: PAPER Category: Wireless Communication Technologies Keyword: distributed transmission, secret-sharing method, Reed-Solomon code, two-way communication, one-time pad,
Full Text: PDF(2.5MB)>>
Summary:
This paper proposes a secure distributed transmission method that establishes multiple transmission routes in space to a destination. In the method, the transmitted information is divided into pieces of information by a secret-sharing method, and the generated pieces are separately transmitted to the destination through different transmission routes using individually-controlled antenna directivities. As the secret-sharing method can divide the transmitted information into pieces in such a manner that nothing about the original information is revealed unless all the divided pieces are obtained, the secrecy of the transmitted information is greatly improved from an information-theoretic basis. However, one problem is that it does not perform well in the vicinity around the receiver. This is due to the characteristics of distributed transmission that all distributed pieces of information must eventually gather at the destination; an eavesdropper can obtain the necessary pieces to reconstruct the original information. Then, this paper expands the distributed transmission method into a two-way communication scheme. By adopting the distributed transmission in both communication directions, a secure link can be provided as a feedback channel to enhance the secrecy of the transmitted information. The generation of the shared pieces of information is given with signal forms, and the secrecy of the proposed method is evaluated based on the signal transmission error rates as determined by computer simulation.
|
|
|