Security through the Lens of Information Asymmetry

National Science Foundation

Award information

Abstract

The needs of future networks beyond 5G and Internet of Things call for a comprehensive and inclusive approach to security. By harnessing the imperfections of communication channels, physical-layer security integrates security concerns into the design of communication systems with benefits such as energy efficiency and simplified key management; physical-layer security often imposes requirements, however, which has impeded its practical adoption and deployment. Furthermore, in some applications where physical-layer security is uniquely suitable and no obvious cryptographic solution exists, such as situations requiring covertness, results to date have been disappointing in terms of predicted data transmission speeds. This project addresses these two points. The outcomes of this project can ensure secure wireless communications in future networks with minimal performance impact.

The first thrust of this project brings a new perspective to the study of cooperative security through the lens of information asymmetry against adversaries. This part of the project aims to elucidate how cooperation can provide knowledge to one user about the variations in the channel induced by the signaling of another in a manner that creates new and hitherto unforeseen advantages over an adversary. The second thrust of this project explores the benefits of information asymmetry for covert communications, including the role of channel state knowledge, which is foreseen as a key mechanism to not only circumvent the square-root law of covert communication but also to alleviat the need for a shared secret key. The impact of different-quality channel states being available at different nodes will be studied.

Publications

  1. S.-Y. Wang, K. Arumugam, and M. R. Bloch, “Bounds on Covert Capacity in the Sub-Exponential Slotted Asynchronous Regime.” submitted to IEEE Transactions on Information Theory, Sep. 2024.
  2. O. Günlü, M. Bloch, and and A. Y. Rafael F. Schaefer, “Nonasymptotic performance limits of low-latency secure integrated sensing and communication systems,” in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, Seoul, Korea, Apr. 2024.
  3. L. Luzzi, C. Ling, and M. R. Bloch, “Optimal rate-limited secret key generation from Gaussian sources using lattices,” IEEE Transactions on Information Theory, vol. 69, no. 8, pp. 4944–4960, Aug. 2023.
  4. M.-C. Chang and M. R. Bloch, “Distributed Stochastic Bandits with Corrupted and Defective Input Commands,” in Proc. of IEEE International Symposium on Information Theory, Taipei, Taiwan, Jun. 2023, pp. 1318–1323.
  5. M.-C. Chang, S.-Y. Wang, T. Erdoğan, and M. R. Bloch, “Rate and Detection-Error Exponent Tradeoff for Joint Communication and Sensing of Fixed Channel States,” IEEE Journal on Selected Areas in Information Theory, vol. 4, pp. 245–259, May 2023.
  6. O. Günlü, M. R. Bloch, R. F. Schaefer, and A. Yener, “Secure Integrated Sensing and Communication,” IEEE Journal on Selected Areas in Information Theory, vol. 4, pp. 40–53, May 2023.
  7. R. A. Chou and M. R. Bloch, “Retractable Commitment,” in Proc. of IEEE Information Theory Workshop, Saint-Malo, France, Apr. 2023, pp. 260–265.
  8. O. Günlü, M. R. Bloch, and R. Schaeffer, “Private Remote Sources for Secure Multi-Function Computation,” IEEE Transactions on Information Theory, vol. 10, no. 68, pp. 1557–9654, Oct. 2022.
  9. M.-C. Chang, S.-Y. Wang, and M. R. Bloch, “Controlled Sensing with Corrupted Commands,” in Proc. of 58th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2022.
  10. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Keyless Covert Communication via Channel State Information,” IEEE Transactions on Information Theory, vol. 68, no. 8, pp. 5440–5474, Aug. 2022.
  11. M.-C. Chang and M. R. Bloch, “Covert Best Arm Identification of Stochastic Bandits,” in Proc. of IEEE International Symposium on Information Theory, Helsinki, Finland, Jun. 2022, pp. 324–329.
  12. O. Günlü, M. R. Bloch, R. Schaefer, and A. Yener, “Secure Joint Communication and Sensing,” in Proc. of IEEE International Symposium on Information Theory, Helskinki, Finland, Jun. 2022, pp. 844–849.
  13. H. Zivari-Fard, M. R. Bloch, and A. Nosratinia, “Covert Communication in the Presence of an Uninformed, Informed, and Coordinated Jammer,” in Proc. of IEEE International Symposium on Information Theory, Helsinki, Finland, Jun. 2022.
  14. M.-C. Chang, T. Erdoğan, S.-Y. Wang, and M. R. Bloch, “Rate and Detection Error-Exponent Tradeoffs of Joint Communication and Sensing,” in Proc. of IEEE International Symposium on Joint Communications & Sensing, Vienna, Austria, Mar. 2022, pp. 1–6.
  15. M.-C. Chang and M. R. Bloch, “Covert Sequential Hypothesis Testing,” in Proc. of IEEE Information Theory Workshop, Oct. 2021, pp. 1–6.
  16. H. ZivariFard, M. R. Bloch, and A. Nosratinia, “Covert Communication via Non-Causal Cribbing from a Cooperative Jammer,” in Proc. of IEEE International Symposium on Information Theory, Jul. 2021, pp. 202–207.
  17. O. Günlü, M. Bloch, and R. F. Schaefer, “Secure Multi-Function Computation with Private Remote Sources,” in Proc. of IEEE International Symposium on Information Theory, Jul. 2021, pp. 1403–1408.
  18. M.-C. Chang and M. R. Bloch, “Covert Authentication Against a Myopic Adversary,” in Proc. of IEEE International Symposium on Information Theory, Jul. 2021, pp. 196–201.
  19. M.-C. Chang and M. R. Bloch, “Evasive Active Hypothesis Testing,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 2, pp. 735–746, Jun. 2021.
  20. M. Bloch et al., “An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 5–22, Mar. 2021.
  21. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Two-Multicast Channel with Confidential Messages,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2743–2758, 2021.