Next Article in Journal
A Distributed NFV-Enabled Edge Cloud Architecture for ICN-Based Disaster Management Services
Next Article in Special Issue
A Comparative Study of On-Body Radio-Frequency Links in the 420 MHz–2.4 GHz Range
Previous Article in Journal
On the Influence of Infra-Red Sensor in the Accurate Estimation of Grinding Temperatures
Previous Article in Special Issue
Performance Evaluation of a Quality of Service Control Scheme in Multi-Hop WBAN Based on IEEE 802.15.6
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secrecy Capacity of a Class of Erasure Wiretap Channels in WBAN

1
School of Communication Engineering, Xi’an University of Science and Technology, Xi’an 710054, China
2
School of Information and Control Engineering, China University of Mining and Technology, Xuzhou 221116, China
3
State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 10071, China
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(12), 4135; https://doi.org/10.3390/s18124135
Submission received: 31 October 2018 / Revised: 21 November 2018 / Accepted: 22 November 2018 / Published: 26 November 2018
(This article belongs to the Special Issue Wireless Body Area Networks and Connected Health)

Abstract

:
In wireless body area networks (WBANs), the secrecy of personal health information is vulnerable to attacks due to the openness of wireless communication. In this paper, we study the security problem of WBANs, where there exists an attacker or eavesdropper who is able to observe data from part of sensors. The legitimate communication within the WBAN is modeled as a discrete memoryless channel (DMC) by establishing the secrecy capacity of a class of finite state Markov erasure wiretap channels. Meanwhile, the tapping of the eavesdropper is modeled as a finite-state Markov erasure channel (FSMEC). A pair of encoder and decoder are devised to make the eavesdropper have no knowledge of the source message, and enable the receiver to recover the source message with a small decoding error. It is proved that the secrecy capacity can be achieved by migrating the coding scheme for wiretap channel II with the noisy main channel. This method provides a new idea solving the secure problem of the internet of things (IoT).

1. Introduction

Due to the openness of wireless communication, the personal health information, which is exchanged on the wireless channel in WBAN, is readily fetched and attacked by hackers. To address this issue, there are usually two ways to enhance the security of wireless communications: one is the security guaranteed by information theory in Refs. [1,2,3], another is the security verified by the computational complexity in Refs. [4,5]. In this paper, we aim to study the secure transmission problem in WBAN on the basis of the information theory. Here, the secure transmission indicates the way to code the transmitted data so that the attackers cannot get the data. The concept of wiretap channel is introduced by Wyner in Ref. [6]. In his model, the source message was sent to the targeted user via a discrete memoryless channel (DMC). Meanwhile, an eavesdropper was able to tap the transmitted data via a second DMC. It was supposed that the eavesdropper knew the encoding scheme and decoding scheme. The object was to find a pair of encoder and decoder such that the eavesdropper’s level of confusion on the source message was as high as possible, while the receiver could recover the transmitted data with a small decoding error. Wyner’s wiretap channel model is called the discrete memoryless wiretap channel, since the main channel output was taken as the input of the wiretap channel in Ref. [7].
After Wyner’s pioneering work, the models of wiretap channels have been studied from various aspects. Csiszar and Korner considered a more general wiretap channel model called the broadcast channels with confidential messages (BCCs) in Ref. [8]. The wiretap channel was not necessarily a degraded version of the main channel. Moreover, they also considered the case where public data was supposed to be broadcasted through both main channel and wiretap channel. The degraded wiretap channels with discrete memoryless side information accessed by the encoder were considered in Refs. [9,10,11]. BCCs with causal side information were studied in Ref. [12]. Communication models with channel states known at the receiver were considered in Refs. [13,14]. Ozarow and Wyner considered another wiretap channel model called wiretap channel of type II [15]. The secrecy capacity was established there. In that model, the source data was encoded into N digital symbols and transmitted to the targeted user through a binary noiseless channel. Meanwhile, the eavesdropper was able to observe an arbitrary μ -subcollection of those symbols.
In the last few decades, a lot of capacity problems related to the wiretap channel II were studied. A special class of non-DMC wiretap channel was studied in Ref. [16]. The main channel was a DMC instead of noiseless, and the eavesdropper observed μ < N digital symbols through a uniform distribution. An extension of wiretap channel II was studied in Ref. [17], where the main channel was a DMC and the eavesdropper was able to observe μ digital bits through arbitrary strategies.
The model of finite-state Markov channel was first introduced by Gilbert [18] and Elliott [19]. They studied a kind of Markov channel model with two states, which is known as the Gilbert–Elliott channel. In their channel model, one state was related to a noiseless channel and the other state was related to a totally noisy channel. Wang in Ref. [20] extended the Gilbert–Elliott channel and considered the case with finite states.
This paper discusses finite-state Markov erasure wiretap channel (FSME-WTC) (see Figure 1). In this new model, the source data W is encoded into N digital symbols, denoted by X N , and transmitted to the targeted user through a DMC. The eavesdropper is able to observe the transmitted symbols through a finite-state erasure Markov channel (FSMEC). Secrecy capacity of this new communication model is established, based on the coding scheme devised by the authors in Ref. [17].
The model of FSME-WTC can be applied to model the security problem of WBAN readily. Let us suppose that there are N sensors in WBAN. Then, we can treat the collection of symbols obtained from the sensors as a digital sequence of length N transimitted over an imaginary channel. The imaginary channel is not DMC because the symbols from the sensors are correlated. Markov chain is an important model to characterize the correlation of random variables since it will not bring too much complexity of the system. The wiretap channel is set as an erasure channel to model the situation where the attacker in WBAN is able to tap data from only part of the sensors. Thus, our model of FSME-WTC is to ensure that the attacker is not able to get any information from the WBAN when he/she can only observe data from at most N α sensors.
The importance of this model is obvious. As the technology of 5G advances towards the stage of commercial applications, wireless networks are becoming more and more significant in our daily lives [21,22]. Therefore, the security problem of wireless communication is critical from the aspects of both theory and engineering. Meanwhile, the finite state Markov channel is a common model to character the properties of wireless communication. Hence, the results of this paper are meaningful to many kinds of wireless networks with high confidentiality requirements, such as WBAN and IoT.
The remainder of this paper is organized as follows. The formal statements of Finite-state Markov Erasure Wiretap Channel and the capacity results are given in Section 2 (see also Figure 1). The secrecy capacity of this model is established in Theorem 1. Some concrete examples of this communication model are given in Section 3. The converse part of Theorem 1, relying on Fano’s inequality and Proposition 1, is proved in Section 4. The direct part of Theorem 1, based on Theorem 1 in [17], is proved in Section 5. Section 6 gives the proof of Proposition 1, and Section 7 finally concludes this paper.

2. Notations, Definitions and the Main Results

Throughout this paper, N is the set of positive integers. [ 1 : N ] = { 1 , 2 , , N } is the set of positive integers no greater than N for any N N . For any index set I [ 1 : N ] and random vector Y N = ( Y 1 , Y 2 , , Y N ) , denote by Y I N = ( Y 1 , Y 2 , , Y N ) the “projection” of Y N onto the index set I such that Y i = Y i for all i I , and Y i = ? , otherwise.
Let Y be any finite alphabet not containing the “error” letter ? and Y I N = { ( y 1 , y 2 , , y N ) : y i Y for i I , and i = ? for i I } . It follows that Y I N is distributed on Y I N for any random vector Y N over Y N .
Example 1.
Let N = 5 , I = 1 , 3 and X = 0 , 1 . Then,
X I N = { ( 0 ? 0 ? ? ) , ( 0 ? 1 ? ? ) , ( 1 ? 0 ? ? ) , ( 1 ? 1 ? ? ) } .
Let X N = ( X 1 , X 2 , X 3 , X 4 , X 5 ) be an arbitrary random vector distributed on X N . Then, the random vector X I N = ( X 1 , ? , X 3 , ? , ? ) is distributed on X I N .
Definition 1. (Encoder)
Let the source message W be uniformly distributed on a certain message set W . The (stochastic) encoder q E is specified by a matrix of conditional probability q E ( x N | w ) with x N X N and w W . The value of q E ( x N | w ) specifies the probability that we encode message w encoded into the sequence x N .
Definition 2. (Main channel)
The main channel is a DMC, whose input alphabet is X and output alphabet is Y , where ? X Y . The transition probability matrix of the main channel is denoted by Q M C ( y | x ) with x X and y Y . The input and output of the main channel are denoted by X N and Y N , respectively. For any x N X N and y N Y N , it follows that
P r { X N = x N , Y N = y N } = P r { X N = x N } Q M C ( y N | x N ) ,
where
Q M C ( y N | x N ) = i = 1 N Q M C ( y i | x i ) .
Remark 1.
From the property of DMC, it holds that
H ( Y N | X N ) = i = 1 N H ( Y i | X i ) .
Definition 3. (Wiretap channel)
Let T n , n N be the channel state of FSMEC at time n satisfying that T 1 T 2 T N forms a Markov chain. The transition of channel states is homogeneous, i.e., the conditional probability P r { T n = t n | T n 1 = t n 1 } is independent from the time index n. Moreover, the channel states are stationary, i.e., T 1 , T 2 , , T N , share a generic probability distribution p T on a common finite set T of channel states. Moreover, let Q T ( t | t ) be the probability that the state at the next time slot is changed to t when the state is t currently. It follows that
P r { T N = t N } = p T ( t 1 ) · i = 2 N Q T ( t i | t i 1 )
for t N T N . The input of FSMEC is a digital sequence Y N , which is actually the main channel output. Denote by Z N the wiretap channel output. For each time slot n, the channel is either totally noisy, i.e., Z n = ? or totally noiseless, i.e., Z n = Y n , which depends on the value of T n . Thus, the channel output Z n is totally determined by the channel input Y n and the channel state T n . Let T 1 be the set of states under which the channel is noiseless. Then, it follows that T 0 = T T 1 contains the states where the channel is totally noisy. Denote by Q W C ( z | y , t ) the probability that the channel outputs z when the channel input is y and the channel state is t. It follows that
Q W C ( z | y , t ) = δ ( z , y ) t T 1 , δ ( z , ? ) , t T 0 ,
where
δ ( a , b ) = 1 , a = b , 0 , a b .
For any y N Y N , z N Z N and t N T N , it is readily obtained that
P r { Y N = y N , Z N = z N | T N = t N } = P r { Y N = y N } i = 1 N Q W C ( z i | y i , t i ) .
Remark 2.
Throughout this paper, it is supposed that T N is independent from W, X N and Y N .
Proposition 1.
X n Z n T n forms a Markov chain for every 1 n N .
Proof. 
The proof of Proposition 1 is given in Section 6. Proposition 1 would be used to establish the converse part of Theorem 1 (see Section 4). □
Definition 4. (Decoder)
The decoder is specified by a mapping f D : Y N W . To be particular, the estimation of the source message is W ^ = Y N , where Y N is the main channel output. The average decoding error probability is denoted by P e = P r { W W ^ } .
Definition 5. (Achievability)
A positive real number R is said to be achievable, if, for any real number ε > 0 , one can find an integer N 0 such that, for any N > N 0 , there exists a pair of encoder and decoder of length of length N satisfying that
1 N l o g | W | > R ε , 1 N I ( W ; Y N ) < ε a n d P e < ε .
Definition 6. (Secrecy capacity)
A real number C s is said to be the secrecy capacity of the communication model if it is achievable for every 0 R C s and unachievable for every R > C s .
Theorem 1.
Let B n be the function of T n defined in Definition 3 such that B n = 1 if T n T 1 , and B n = 0 , otherwise. If it follows that
lim N P r { | 1 N n = 1 N B n α | < ι } = 1
for any ι > 0 , the secrecy capacity of the communication model in Figure 1 is ( 1 α ) C M , where C M is the capacity of the main channel, i.e.,
C M = max P X I ( X ; Y ) .
Proof. 
The proof of Theorem 1 is divided into the following two parts. The first part, given in Section 4, proves that every achievable real number R must satisfy R ( 1 α ) C M , which is the converse half of the theorem. The second part, given in Section 5, proves that every real number R satisfying 0 R ( 1 α ) C M is achievable, which is the direct half. □
Theorem 1 claims that, if the Markov chain { T n } satisfies Label (2), then the secrecy capacity of the wiretap channel model depicted in Figure 1 is ( 1 α ) C M . In the rest of this section, we will introduce a class of Markov chains satisfying (2) in Theorem 2, and provide the secrecy capacity of the related wiretap channel model in Corollary 1.
A stationary Markov chain is call ergodic if, for each pair of states t , t T , it is possible to go from state t to t in expected finite steps. One can prove that, if a Markov of chain is ergodic, the stationary probability distribution of the state is unique.
Theorem 2. (Law of Large Number for Markov Chain)
If the Markov chain { T n } is ergodic, let π be the unique stationary distribution of the state. Then, it follows that
lim N 1 N i = 1 N I ( T n = t ) = π ( t )
for each channel state t, where I ( T n = t ) is 1 or 0, indicating whether T n = t is true or not.
With the theorem above, we immediately obtain that
Corollary 1.
If the Markov chain { T n } is ergodic with the unique stationary distribution π over T , then the secrecy capacity of the wiretap channel model depicted in Figure 1 is given by
C s = ( 1 π ( T 1 ) ) C M ,
where C M is the capacity of the main channel, and
π ( T 1 ) = t T 1 π ( t ) .

3. Examples

This section gives two simple examples of FSMEC defined in Definition 3. Example 2 is for discrete memoryless erasure channel (DMEC) and Example 3 is for a simple two-state FSMEC.
Example 2.
Suppose that the set of channel states T = 0 , 1 with T 1 = 1 and T 0 = 0 . Meanwhile, let
p T ( 0 ) = Q t ( 0 | 0 ) = Q t ( 0 | 1 ) = 1 α
and
p T ( 1 ) = Q t ( 1 | 0 ) = Q t ( 1 | 1 ) = α .
The state transition diagram of the channel states in this example is depicted in Figure 2. It is obvious that the FSMEC is in fact specialized into a DMEC with the transition probability
Q W C ( z | y ) = α , z = y , 1 α , z = ? , 0 , o t h e r w i s e .
From Theorem 2 in Ref. [6], the secrecy capacity of the communication model in Figure 1, with DMEC as the wiretap channel, is
max P X I ( X : Y | Z )   = max P X I ( X ; Y ) I ( X ; Z )   = ( a ) max P X I ( X ; Y | T ) I ( X ; Z | T )   = max P X { [ I ( X ; Y | T = 0 ) I ( X ; Z | T = 0 ) ] P T ( 0 ) + [ I ( X ; Y | T = 1 ) I ( X ; Z | T = 1 ) ] P T ( 1 ) }   = ( b ) max P X I ( X ; Y | T = 0 ) P T ( 0 )   = ( c ) max P X I ( X ; Y ) P T ( 0 )   = ( d ) ( 1 α ) C M ,
where X and Y are the input and output of the main channel, respectively, and Z is the output of the wiretap channel under the channel state T; ( a ) follows from the facts that X Z T forms a Markov chain (cf. Proposition 1) and T is independent from X and Y; ( b ) follows from the fact that Y = Z when T = 1 , and Z is determined when T = 0 ; ( c ) follows from the assumption that T is independent from X and Y; and ( d ) follows from (3) and (4).
Clearly, Formula (2) holds with B n = T n . Thus, in this case, the result of Theorem 1 in this paper coincides with that of Theorem 2 in Ref. [6].
Example 3.
Let T = 0 , 1 , T 1 = 1 , T 0 = 0 ,
p T ( 0 ) = p T ( 1 ) = 1 2 ,
Q t ( 0 | 0 ) = Q t ( 1 | 1 ) = p ,
Q t ( 1 | 0 ) = Q t ( 0 | 1 ) = 1 p ,
and B n = T n . We arrive at a simple two-state Markov erasure channel whose transition diagram is depicted in Figure 3. Furthermore, observe that
D n = 1 N B n = D n = 1 N T n = E n = 1 N T n 2 E n = 1 N T n 2 = n = 1 N m = 1 N E [ T n T m ] N 2 4 = n = 1 N ( N n ) 2 ( 2 p 1 ) n ,
where the last equality follows because E [ T n T m ] = 1 2 when m = n , and
E [ T n T m ] = P r { T m = 1 , T n = 1 } = P r { T m = 1 , T n 1 = 1 , T n = 1 } + P r { T m = 1 , T n 1 = 0 , T n = 1 } = P r { T m = 1 , T n 1 = 1 } Q T ( 1 | 1 ) + P r { T m = 1 , T n 1 = 0 } Q T ( 1 | 0 ) = E [ T m T n 1 ] p + ( 1 2 E [ T m T n 1 ] ) ( 1 p ) = ( 2 p 1 ) E [ T m T n 1 ] + 1 p 2 = = ( 2 p 1 ) n m E [ T m T m ] + 1 p 2 i = 1 n m 1 ( 2 p 1 ) i = 1 + ( 2 p 1 ) n m 4
when m < n . It is obvious that
lim N 1 N 2 D n = 1 n B n = 0
for 0 < p < 1 . Formula (2) is then established immediately from the Markov Large Number Law. Applying Theorem 1, the secrecy capacity of the communication model in this case is 1 2 C ( p ) . Figure 4 shows the relationship between the secrecy capacity and the crossover probability p in this example.

4. Converse Half of Theorem 1

This section proves that every achievable real number R must satisfy R ( 1 α ) C M . The proof is based on Fano’s inequality (cf. Formula (76) in Ref. [6]) and Proposition 1.
For any give ι > 0 and ε > 0 , Formula (2) indicates that
P r { 1 N n = N B n > α ι } > 1 ε
or equivalently
P r { | I ( T N ) | > N ( α ι ) } > 1 ε
when N is sufficiently large, where
I ( t N ) = { n [ 1 : N ] : t n T 1 } .
Suppose that there exists a code of length N satisfying (1), i.e.,
1 N log | W | > R ε , 1 N I ( W ; Z N ) < ε and P e < ε .
Then, we have
N R < log | W | + N ε = H ( W ) + N ε = I ( W ; Y N ) + H ( W | Y N ) + N ε < I ( W ; Y N ) + N δ ( P e ) + N ε ,
where δ ( P e ) 0 as P e 0 , and the last inequality follows from the Fano’s inequality. Since I ( W ; Z N ) < N ε , the formula above indicates that
N R < I ( W ; Y N ) I ( W ; Z N ) + N δ ( P e ) + 2 N ε .
The value of I ( W ; Y N ) I ( W ; Z N ) is upper bounded by
I ( W ; Y N ) I ( W ; Z N )   = ( a ) I ( W ; Y N | Z N )   ( b ) I ( X N ; Y N | Z N )   = I ( X N ; Y N ) I ( X N ; Z N )   = ( c ) I ( X N ; Y N | T N ) I ( X N ; Z N | T N ) ,
where (a) and (b) follow from the fact that W X N Y N Z N forms a Markov chain, and (c) follows from Proposition 1 and the fact that T N is independent from X N and Y N .
For any t N T N , denoting Z N ( t N ) = Y I ( t N ) N , Formula (7) is further deduced by
I ( W ; Y N ) I ( W ; Z N )   I ( X N ; Y N | T N ) I ( X N ; Z N | T N )   = ( a ) I ( X N ; Y N | Z N , T N )   = t N T N I ( X N ; Y N | Z N , T N = t N ) · P r { T N = t N }   = t N T N I ( X N ; Y N | Z N ( t N ) , T N = t N ) · P r { T N = t N }   = ( b ) t N T N I ( X N ; Y N | Z N ( t N ) ) · P r { T N = t N } ,
where (a) follows because X N Y N Z N forms a Markov chain when given T N , and (b) follows because X N , Y N and Z N ( t N ) = Y I ( t N ) N are independent from T N . For any fixed t N T N , denote Z ˜ N = Z N ( t N ) . On account of the chain rule, we have
H ( Y N ) = n = 1 N H ( Y n | Y n 1 ) ,
H ( Z ˜ N ) = n = 1 N H ( Z ˜ n | Z ˜ n 1 ) ,
and
H ( Z ˜ N | X N ) = n = 1 N H ( Z ˜ n | Z ˜ n 1 , X N ) n = 1 N H ( Z ˜ n | X n ) .
Moreover, from the property of DMC, Remark 1 yields
H ( Y N | X N ) = n = 1 N H ( Y n | X n ) .
Combining Formulas (9)–(12), it follows that
I ( W ; Y N ) I ( W ; Z N ( t N ) ) n = 1 N ( H ( Y n | Y n 1 ) H ( Z ˜ n | Z ˜ n 1 ) H ( Y n | X n ) + H ( Z ˜ n | X n ) ) .
Considering that Z ˜ ( n 1 ) Y ( n 1 ) Y n Z ˜ n forms a Markov chain, we have
I ( Y n 1 ; Y n ) I ( Z ˜ n 1 ; Z ˜ n )
or equivalently
H ( Y n ) H ( Z ˜ n ) H ( Y n | Y n 1 ) H ( Z ˜ n | Z ˜ n 1 ) .
Substituting the formula above into Formula (13), we have
I ( W ; Y N ) I ( W : Z N ( t N ) )   = n = 1 N ( H ( Y n ) H ( Z ˜ n ) H ( Y n | X n ) + H ( Z ˜ n | X n ) )   = n = 1 N ( I ( X n ; Y n ) I ( X n ; Z ˜ n ) ) .
Noticing that
I ( X n ; Z ˜ n ) = 0 , t n T 1 , I ( X n ; Y n ) , t T 0 .
Formula (14) is further deduced by
I ( X N ; Y N ) I ( X N ; Z N ( t N ) ) n = 1 N I ( X n ; Y n ) I ( X n ; Z ˜ n ) = n I ( t N ) I ( X n ; Y n ) ( N | I ( t N ) | ) C M .
Substituting the formula above with Formula (8) gives
I ( X N ; Y N ) I ( X N ; Z N )   t N T N I ( X N ; Y N | Z N ( t N ) ) Pr { T N = t N }   t N T N ( N | ( t N ) | ) C M Pr { T N = t N }   Pr { ( T N ) N ( α ι ) } N ( 1 α + ι ) C M + Pr { ( T N ) < N ( α ι ) } N C M   N ( 1 α + ι + 2 ε ) C M ,
where the last inequality follows from (5). Combining (6) and the formula above yields
R < 1 α + ι + 4 ε + δ ( P e ) .
R 1 α is finally established by letting ι , ε and P e converge to 0. This completes the proof of converse half.

5. Direct Half of Theorem 1

This section proves that every real number R satisfying 0 < R ( 1 α ) C M is achievable, which is the direct half of Theorem 1. It suffices to prove the achievability of ( 1 α ) C M . More precisely, for any given ε > 0 , we need to prove the existence of the encoder–decoder pair ( q E , f D ) such that
1 N log | W | > R ε , 1 N I ( W ; Z N ) < ε and P e < ε .
The proof is based on the following theorem.
Theorem 3.
(Theorem 1 in Ref. [17]). Let a real number 0 < α 1 be fixed and given. For any N N and μ = N α , denote
μ = μ ( N ) = { I [ 1 : N ] : | I | = μ } .
Then, for any real numbers ε > 0 and 0 < R < ( 1 α ) C M , one can construct a code of length N over the DMC defined in Definition 2 such that
1 N log | W | > R ε , max I μ I ( W ; Y I N ) < ε , P e < ε
when N is sufficiently large.
Proof. 
Let
α = α + ι
and
R = ( 1 α 2 ι ) C M < ( 1 α ) C M
for a small ι > 0 . Suppose that ( q E , f D ) is a code of length N satisfying
1 N log | W | > R ε > ( 1 α 2 ι ) C M ε max I μ I ( W ; Y I N ) < ε and P e < ε .
Applying the code ( q E , f D ) to the communication model in Figure 1, it is already satisfied that
1 N log | W | > ( 1 α ) C M ε and P e < ε ,
when ε and ι are sufficiently small. To establish 1 N I ( W ; Z N ) < ε , let the value of N be sufficiently large such that
P r | I ( T N ) | < N ( α + ι ) > 1 ε .
The value of I ( W ; Z N ) is upper bounded by
I ( W ; Z N )   ( a ) I ( W ; Z N | T N )   = t N T N I ( W ; Z N | T N = t N ) Pr { T N = t N }   = t N T N I ( W ; Y ( t N ) N | T N = t N ) Pr { T N = t N }   = ( b ) t N T N I ( W ; Y ( t N ) N ) Pr { T N = t N }   = t N : | ( t N ) | < N ( α + ι ) I ( W ; Y ( t N ) N ) Pr { T N = t N }   + t N : | ( t N ) | N ( α + ι ) I ( W ; Y ( t N ) N ) Pr { T N = t N }   ( c ) ε + N C M Pr { | ( T N ) | N ( α + ι ) }   d ε ( 1 + N C M ) ,
where ( a ) follows because W is independent from Z N ; ( b ) follows because Y I ( t N ) N is independent from T N ; ( c ) follows because I ( W ; Y I ( t N ) N ) H ( W ) N C M when | I ( t N ) | > N ( α + ι ) , and
I ( W ; Y I N ( t N ) ) max I μ I ( W ; Y I N ) < ε
when | I ( t N ) | < N ( α + ι ) ; and ( d ) follows from Formula (15). Consequently,
1 N I ( W ; Z N ) ε N ( 1 + N C M ) < ε ( 1 + C M ) < ε
when ε is sufficiently small. The proof of the direct half is completed. □

6. Proof of Proposition 1

This section proves that X n Z n T n forms a Markov chain for every n N , which is Proposition 1. It suffices to prove that
P r { X n = x n , Z n = z n , T n = t n } Pr { Z n = z n }   = Pr { X n = x n , Z n = z n } Pr { Z n = z n , T n = t n }
for any x n X n , t n T n and z n Z n . Suppose that x n , t n and z n are given. Denote
I ( z n ) = { 1 i n : z i ? } ,
I ( t n ) = { 1 i n : t i T 1 } .
If I ( z n ) I ( t n ) , both sides of (16) equal 0. Formula (16) is established. If I ( z n ) = I ( t n ) = I , terms in Formula (16) are deduced as follows. Firstly,
P r { X n = x n , Z n = z n , T n = t n }   = P r { X n = x n } P r { T n = t n } · P r { Z n = z n | X n = x n , T n = t n }   = P r { X n = x n } P r { T n = t n } · P r { Y n = z n | X n = x n , T n = t n }   = P r { X n = x n } P r { T n = t n } · P r { Y n = z n | X n = x n } ,
where the last equality follows because X n and Y n are independent from T n . Moreover,
P r { X n = x n , Z n = z n }   = P r { X n = x n , Y n = z n }   = P r { X n = x n } P r { Y n = z n | X n = x n } .
Finally,
P r { Z n = z n T n = t n }   = P r { Y n = z n , T n = t n }   = P r { Y n = z n } P r { T n = t n } ,
where the last equality follows because Y n is independent from T n . Combining Formulas (17)–(19) results in Formula (16) also holding for x n , z n and t n with I ( z n ) = I ( t n ) . The proof is completed.

7. Conclusions

Since the data in WBAN is highly related with the personal health, it is vital to protect this healthy information from attacks. In this paper, from the perspective of information theory, we studied the infrastructure of secure transmission system in WBAN, and solved the capacity problem of a class of finite-state Markov erasure wiretap channel for the IoT. The coding scheme used in this paper comes from the generalized wiretap channel II with the noisy main channel. The idea may be used to solve the capacity problems of other non-DMC wiretap channels. In a theoretical sense, the secure performance of our designed algorithm is not relevant with the computation capability of engaged computers and can guarantee the security of transmitted data in WBAN, by which the personal privacy could be significantly protected.

Author Contributions

Conceptualization, B.W.; Methodology, B.W.; Software, Y.S., W.G. and G.F.; Data Curation, W.G.; Writing—Original Draft Preparation, B.W.; Writing—Review & Editing, Y.S.; Supervision, J.D.; Funding Acquisition, J.D.

Funding

This research was funded by the National Natural Science Foundation of China Nos. 51804304, 61571338 and U1709218, the Natural Science Basic Research Plan of Shaanxi Province No. 2018JM5052, the Key Research and Development Plan of Shaanxi Province No. 2017ZDCXL-GY-05-01, the National Key Research and Development Program of China Nos. 2016YFE0123000, YS2017YFGH000872, and 2018YFC0808301, the Xi’an Key Laboratory of Mobile Edge Computing and Security No. 201805052-ZD3CG36, the China Postdoctoral Science Foundation No. 2015M5826, the Scientific Research Program Funded of Shaanxi Provincial Education Department No. 2016JK1501, and the Shaanxi Provincial Postdoctoral Science Foundation of Shaanxi Provincial.

Acknowledgments

The authors would like to thank Ning Cai of Shanghai Tech University for helping to prove the work in this paper. The authors are grateful to the anonymous reviewers for their constructive comments on the paper.

Conflicts of Interest

The authors declare no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

References

  1. Tolossa, Y.J.; Vuppala, S.; Kaddoum, G.; Abreu, G. On the uplink secrecy capacity analysis in D2D-enabled cellular network. IEEE Syst. J. 2017, 12, 2297–2307. [Google Scholar] [CrossRef]
  2. Jameel, F.; Wyne, S.; Kaddoum, G.; Duong, T.Q. A comprehensive survey on cooperative relaying and jamming strategies for physical layer security. IEEE Commun. Surv. Tutor. 2018. [Google Scholar] [CrossRef]
  3. Kong, L.; Vuppala, S.; Kaddoum, G. Secrecy Analysis of Random MIMO Wireless Networks over αμ Fading Channels. IEEE Trans. Veh. Technol. 2018. [Google Scholar] [CrossRef]
  4. Zhang, P.N.; Ma, J. Channel Characteristic Aware Privacy Protection Mechanism in WBAN. Sensors 2018, 18, 2403. [Google Scholar] [CrossRef] [PubMed]
  5. Anwar, M.; Abdyllah, A.H.; Butt, R.A.; Ashraf, M.W.; Qureshi, K.N.; Ullah, F. Securing Data Communication in Wireless Body Area Networks Using Digital Signatures. Technol. J. 2018, 23, 50–55. [Google Scholar]
  6. Wyner, A.D. The Wire-Tap Channel. Bell Syst. Technol. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  7. Kramer, G. Topics in Multi-user Information Theory. Found. Trends Commun. Inf. Theory 2007, 4, 265–444. [Google Scholar] [CrossRef]
  8. Csiszar, I.; Korner, J. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 1978, 24, 339–348. [Google Scholar] [CrossRef]
  9. Chen, Y.; Han Vinck, A.J. Wiretap channel with side infor-mation. IEEE Trans. Inf. Theory 2008, 54, 395–402. [Google Scholar] [CrossRef]
  10. Dai, B.; Luo, Y. Some new results on the wiretap channel with side information. Entropy 2012, 14, 1671–1702. [Google Scholar] [CrossRef]
  11. Dai, B.; Han Vinck, A.J.; Hong, J.; Luo, Y.; Zhuang, Z. Degraded Broadcast Channel with Noncausal Side Information, Confidential Messages and Noiseless Feedback. In Proceedings of the 2012 IEEE International Symposium on Information Theory, Cambridge, MA, USA, 1–6 July 2012; pp. 438–442. [Google Scholar]
  12. Dai, B.; Luo, Y.; Han Vinck, A.J. Capacity region of broadcast channels with private message and causual side information. In Proceedings of the 3rd International Conference on Image and Signal Processing (CISP 2010), Yantai, China, 16–18 October 2010; pp. 3770–3773. [Google Scholar]
  13. Khisti, A.; Diggavi, S.N.; Womell, G.W. Secrete-key agreement with channel state information at the transmitter. IEEE Trans. Inf. Forensics Secur. 2011, 6, 672–681. [Google Scholar] [CrossRef]
  14. Chia, Y.H.; El Gamal, A. Wiretap channel with causal state information. IEEE Trans. Inf. Theory 2012, 58, 2838–2849. [Google Scholar] [CrossRef]
  15. Ozarow, L.H.; Wyner, A.D. Wire-tap channel II. AT T Bell Lab. Technol. J. 1984, 63, 2135–2157. [Google Scholar] [CrossRef]
  16. He, D.; Luo, Y. A kind of non-DMC erasure wiretap chan-nel. In Proceedings of the 2012 IEEE 14th International Conference on Communication Technology, Chengdu, China, 9–11 November 2012; pp. 1082–1087. [Google Scholar]
  17. He, D.; Luo, Y.; Cai, N. Strong Secrecy Capacity of the Wiretap Channel II with DMC Main Channel. In Proceedings of the 2016 IEEE International Symposium on Information Theory (ISIT), Barcelona, Spain, 10–15 July 2016. [Google Scholar]
  18. Gilbert, E.N. Capacity of a burst-noise channel. Bell Syst. Technol. J. 1960, 39, 1253–1265. [Google Scholar] [CrossRef]
  19. Elliott, E.O. Estimates of error rates for codes on burst-noise channels. Bell Syst. Technol. J. 1960, 42, 1977–1997. [Google Scholar] [CrossRef]
  20. Wang, H.S.; Moayery, N. Finite-state Markov channel—A useful model for radio communication channels. IEEE Trans. Veh. Technol. 1995, 44, 163–171. [Google Scholar] [CrossRef]
  21. Lv, N.; Chen, C.; Qiu, T.; Sangaiah, A.K. Deep Learning and Superpixel Feature Extraction based on Sparse Autoencoder for Change Detection in SAR Images. IEEE Trans. Ind. Inf. 2018. [Google Scholar] [CrossRef]
  22. Chen, C.; Hu, J.; Qiu, T.; Atiquzzaman, M.; Ren, Z. CVCG: Cooperative V2V-aided Transmission Scheme Based on Coalitional Game for Popular Content Distribution in Vehicular Ad-hoc Networks. IEEE Trans. Mob. Comput. 2018. [Google Scholar] [CrossRef]
Figure 1. Communication model of degraded wiretap channels.
Figure 1. Communication model of degraded wiretap channels.
Sensors 18 04135 g001
Figure 2. State transition diagram of discrete memoryless erasure channels.
Figure 2. State transition diagram of discrete memoryless erasure channels.
Sensors 18 04135 g002
Figure 3. State transition diagram of a two-state Markov chain.
Figure 3. State transition diagram of a two-state Markov chain.
Sensors 18 04135 g003
Figure 4. Secrecy capacity of the two-state Markov erasure wiretap channel in Example 3.
Figure 4. Secrecy capacity of the two-state Markov erasure wiretap channel in Example 3.
Sensors 18 04135 g004

Share and Cite

MDPI and ACS Style

Wang, B.; Deng, J.; Sun, Y.; Guo, W.; Feng, G. Secrecy Capacity of a Class of Erasure Wiretap Channels in WBAN. Sensors 2018, 18, 4135. https://doi.org/10.3390/s18124135

AMA Style

Wang B, Deng J, Sun Y, Guo W, Feng G. Secrecy Capacity of a Class of Erasure Wiretap Channels in WBAN. Sensors. 2018; 18(12):4135. https://doi.org/10.3390/s18124135

Chicago/Turabian Style

Wang, Bin, Jun Deng, Yanjing Sun, Wangmei Guo, and Guiguo Feng. 2018. "Secrecy Capacity of a Class of Erasure Wiretap Channels in WBAN" Sensors 18, no. 12: 4135. https://doi.org/10.3390/s18124135

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop