Beyond encryption: Stronger security for wireless communications

Nov 25, 2013
Prof. Holger Boche and Dr. Rafael Schaefer, winner of the Johann Philipp Reis Prize, discuss their novel security system for wireless communications. Credit: U. Benz/TUM

Physically, wireless communication channels are right out in the open, carried through the air on radio waves. A "wiretapper" can eavesdrop on mobile phone and data traffic without actually tapping a wire or optical fiber. An active wiretapper may also control or disturb a legitimate user's channel, or exploit side information to compromise the security of a message. Thus the last line of defense today is encryption, aimed at making the intercepted message difficult if not impossible for anyone other than the intended recipient to decipher. But cryptographic techniques are being rendered less and less secure by advances in computing.

Now, TUM researchers Prof. Holger Boche and Dr. Rafael Schaefer have devised a scheme that wrings provably strong security out of the otherwise vulnerable physical layer. This approach can prevent a would-be eavesdropper from even receiving the transmitted information. The starting point seems counter-intuitive: The scheme uses two physical channels – that is, frequency bands in a wireless system – that are inherently useless, each being incapable of securely transmitting a message.

No reception for eavesdroppers

Normally, there is nothing to be gained by combining two channels with zero capacity: Zero plus zero equals zero. "But in this case," Schaefer explains, "it's as if we're getting a positive result from adding zero to zero. We find that we are able to 'super-activate' the whole system, meaning that combining two useless channels can lead to a positive capacity to transmit confidential messages securely."

Similar results have been reported before, but only in studies of so-called quantum communications, and are not directly applicable to present-day technology. "To the best of our knowledge," Boche says, "this is the first example of super-activation – where zero plus zero is greater than zero – in classical scenarios." Boche and Schaefer have also determined how to calculate the "secrecy capacity" of physical-layer channels designed to defeat active wiretappers. In addition, they have characterized the code structure and optimal transceiver design for implementing this scheme, a further step toward practical applications.

Johann Philipp Reis Prize for Rafael Schaefer

In recognition of this research, the Frankfurt-based Association for Electrical, Electronic and Information Technologies (VDE) has just awarded the prestigious Johann Philipp Reis Prize to Rafael Schaefer. The prize, named for the German inventor of the telephone, honors researchers under 40 for outstanding contributions to communications technology. Beginning in December 2013, Schaefer is continuing his work at Princeton University as a postdoctoral researcher with Vincent Poor, professor of electrical engineering and dean of the School of Engineering and Applied Sciences.

Explore further: Creating accountable anonymity online

More information: Capacity Results and Super-Activation for Wiretap Channels with Active Wiretappers. Holger Boche and Rafael F. Schaefer. IEEE Transactions on Information Forensics and Security, Vol. 8 No. 9, September 2013, pp. 1482-1496. DOI: 10.1109/TIFS.2013.2276049

Wiretap Channels with Side Information – Strong Secrecy Capacity and Optimal Transceiver Design. Holger Boche and Rafael F. Schaefer. IEEE Transactions on Information Forensics and Security, Vol. 8 No. 8, August 2013, pp. 1397-1408. DOI: 10.1109/TIFS.2013.2271424

add to favorites email to friend print save as pdf

Related Stories

Creating accountable anonymity online

Nov 12, 2013

The World Wide Web is, in many ways, still the Wild West. Though a large portion of internet traffic is monitored and traceable, systems like the Tor Project allow users to post and share anything anonymously. Anonymous systems ...

Entanglement can help in classical communication

Mar 30, 2011

(PhysOrg.com) -- When most of us think of entanglement, our minds jump immediately to quantum communication. "Entanglement has become very well known and useful in quantum communication," Robert Prevedel tells PhysOrg.com. Preved ...

Recommended for you

What's causing the recent string of data breaches?

14 hours ago

It's Cyber Security Awareness month, which has me wondering: are we doing all we can to protect our data? To help answer this question, I sat down with Girish Bhat of Wave Systems—an important collaborator of Micron's—to ...

Court: UK spies get bulk access to NSA data

Oct 29, 2014

The British government's insistence that its spies don't use the vast espionage powers of the U.S. National Security Agency to sidestep U.K. restrictions on domestic eavesdropping was called into question by a court document ...

Georgia Tech releases 2015 Emerging Cyber Threats Report

Oct 29, 2014

In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy; abuse of trust between users and machines; attacks against the mobile ecosystem; rogue insiders; and the increasing involvement of cyberspac ...

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

freethinking
1 / 5 (8) Nov 25, 2013
Biggest story in technology, yet Physorg is ignoring it......Can someone tell me why PHYSORG is not running stories how the Obamacare website is not working and millions of people are losing their healthcare coverage?

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.