Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless Networks

We propose a threshold secret sharing scheme for secure communications in multiple input and multiple output wireless networks. In the proposed scheme, the base station divides the secret data into Nmin parts using a polynomial of degree T-1  (T≤Nmin) and transmits the divided data to the legitimate...

Full description

Bibliographic Details
Main Authors: Jungho Myung, Keunyoung Kim, Taehong Kim
Format: Article
Language:English
Published: Hindawi-Wiley 2018-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2018/4143061
id doaj-04cc39d76a1f4994ab06dcf62c1cd2a1
record_format Article
spelling doaj-04cc39d76a1f4994ab06dcf62c1cd2a12020-11-25T01:34:29ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772018-01-01201810.1155/2018/41430614143061Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless NetworksJungho Myung0Keunyoung Kim1Taehong Kim2Electronics and Telecommunications Research Institute (ETRI), Republic of KoreaElectronics and Telecommunications Research Institute (ETRI), Republic of KoreaSchool of Information and Communication Engineering, Chungbuk National University, Republic of KoreaWe propose a threshold secret sharing scheme for secure communications in multiple input and multiple output wireless networks. In the proposed scheme, the base station divides the secret data into Nmin parts using a polynomial of degree T-1  (T≤Nmin) and transmits the divided data to the legitimate user by beamforming with multiple spatial dimensions. Then, at the user, the secret data can be reconstructed with a sufficient number (≥T) of divided parts by using the Lagrange interpolating polynomial. However, it is difficult for the eavesdropper to correctly estimate the T parts due to the difference between the main channel with beamforming and the eavesdropping channel in the physical layer, which results in the failure of secret data reconstruction. The numerical results show that the eavesdropping probability of the proposed scheme is lower than those of conventional schemes. Moreover, we analyze the symbol-error-rate and show that the theoretical result is well aligned with simulation results.http://dx.doi.org/10.1155/2018/4143061
collection DOAJ
language English
format Article
sources DOAJ
author Jungho Myung
Keunyoung Kim
Taehong Kim
spellingShingle Jungho Myung
Keunyoung Kim
Taehong Kim
Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless Networks
Wireless Communications and Mobile Computing
author_facet Jungho Myung
Keunyoung Kim
Taehong Kim
author_sort Jungho Myung
title Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless Networks
title_short Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless Networks
title_full Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless Networks
title_fullStr Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless Networks
title_full_unstemmed Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless Networks
title_sort threshold secret sharing transmission against passive eavesdropping in mimo wireless networks
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8669
1530-8677
publishDate 2018-01-01
description We propose a threshold secret sharing scheme for secure communications in multiple input and multiple output wireless networks. In the proposed scheme, the base station divides the secret data into Nmin parts using a polynomial of degree T-1  (T≤Nmin) and transmits the divided data to the legitimate user by beamforming with multiple spatial dimensions. Then, at the user, the secret data can be reconstructed with a sufficient number (≥T) of divided parts by using the Lagrange interpolating polynomial. However, it is difficult for the eavesdropper to correctly estimate the T parts due to the difference between the main channel with beamforming and the eavesdropping channel in the physical layer, which results in the failure of secret data reconstruction. The numerical results show that the eavesdropping probability of the proposed scheme is lower than those of conventional schemes. Moreover, we analyze the symbol-error-rate and show that the theoretical result is well aligned with simulation results.
url http://dx.doi.org/10.1155/2018/4143061
work_keys_str_mv AT junghomyung thresholdsecretsharingtransmissionagainstpassiveeavesdroppinginmimowirelessnetworks
AT keunyoungkim thresholdsecretsharingtransmissionagainstpassiveeavesdroppinginmimowirelessnetworks
AT taehongkim thresholdsecretsharingtransmissionagainstpassiveeavesdroppinginmimowirelessnetworks
_version_ 1725071723392401408