Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless Networks
We propose a threshold secret sharing scheme for secure communications in multiple input and multiple output wireless networks. In the proposed scheme, the base station divides the secret data into Nmin parts using a polynomial of degree T-1 (T≤Nmin) and transmits the divided data to the legitimate...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2018-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2018/4143061 |
id |
doaj-04cc39d76a1f4994ab06dcf62c1cd2a1 |
---|---|
record_format |
Article |
spelling |
doaj-04cc39d76a1f4994ab06dcf62c1cd2a12020-11-25T01:34:29ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772018-01-01201810.1155/2018/41430614143061Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless NetworksJungho Myung0Keunyoung Kim1Taehong Kim2Electronics and Telecommunications Research Institute (ETRI), Republic of KoreaElectronics and Telecommunications Research Institute (ETRI), Republic of KoreaSchool of Information and Communication Engineering, Chungbuk National University, Republic of KoreaWe propose a threshold secret sharing scheme for secure communications in multiple input and multiple output wireless networks. In the proposed scheme, the base station divides the secret data into Nmin parts using a polynomial of degree T-1 (T≤Nmin) and transmits the divided data to the legitimate user by beamforming with multiple spatial dimensions. Then, at the user, the secret data can be reconstructed with a sufficient number (≥T) of divided parts by using the Lagrange interpolating polynomial. However, it is difficult for the eavesdropper to correctly estimate the T parts due to the difference between the main channel with beamforming and the eavesdropping channel in the physical layer, which results in the failure of secret data reconstruction. The numerical results show that the eavesdropping probability of the proposed scheme is lower than those of conventional schemes. Moreover, we analyze the symbol-error-rate and show that the theoretical result is well aligned with simulation results.http://dx.doi.org/10.1155/2018/4143061 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Jungho Myung Keunyoung Kim Taehong Kim |
spellingShingle |
Jungho Myung Keunyoung Kim Taehong Kim Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless Networks Wireless Communications and Mobile Computing |
author_facet |
Jungho Myung Keunyoung Kim Taehong Kim |
author_sort |
Jungho Myung |
title |
Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless Networks |
title_short |
Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless Networks |
title_full |
Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless Networks |
title_fullStr |
Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless Networks |
title_full_unstemmed |
Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless Networks |
title_sort |
threshold secret sharing transmission against passive eavesdropping in mimo wireless networks |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8669 1530-8677 |
publishDate |
2018-01-01 |
description |
We propose a threshold secret sharing scheme for secure communications in multiple input and multiple output wireless networks. In the proposed scheme, the base station divides the secret data into Nmin parts using a polynomial of degree T-1 (T≤Nmin) and transmits the divided data to the legitimate user by beamforming with multiple spatial dimensions. Then, at the user, the secret data can be reconstructed with a sufficient number (≥T) of divided parts by using the Lagrange interpolating polynomial. However, it is difficult for the eavesdropper to correctly estimate the T parts due to the difference between the main channel with beamforming and the eavesdropping channel in the physical layer, which results in the failure of secret data reconstruction. The numerical results show that the eavesdropping probability of the proposed scheme is lower than those of conventional schemes. Moreover, we analyze the symbol-error-rate and show that the theoretical result is well aligned with simulation results. |
url |
http://dx.doi.org/10.1155/2018/4143061 |
work_keys_str_mv |
AT junghomyung thresholdsecretsharingtransmissionagainstpassiveeavesdroppinginmimowirelessnetworks AT keunyoungkim thresholdsecretsharingtransmissionagainstpassiveeavesdroppinginmimowirelessnetworks AT taehongkim thresholdsecretsharingtransmissionagainstpassiveeavesdroppinginmimowirelessnetworks |
_version_ |
1725071723392401408 |