TY - GEN
T1 - Securing inductively-coupled communication
AU - Varshney, Lav R.
AU - Grover, Pulkit
AU - Sahai, Anant
PY - 2012
Y1 - 2012
N2 - Communication over inductively-coupled links is becoming prevalent in service delivery for medical, financial, and physical security applications and so there is a growing need to prevent eavesdropping. This paper presents circuit-theoretic and communication-theoretic models of inductively-coupled communication systems. Due to coupling, the presence of an eavesdropper detunes the transfer function between the legitimate users. It is shown this detuning can be detected to reveal the presence of the eavesdropper. Further, if capacity-approaching codes are employed, neither the eavesdropper nor the legitimate receiver are able to reconstruct the transmitted message with low error probability, effectively destroying the message. Building on this insight, a coding-based secure communication protocol for inductively-coupled communication, inspired by quantum key distribution, is developed. The notion of security is defined operationally in terms of probabilities rather than through traditional notions of equivocation.
AB - Communication over inductively-coupled links is becoming prevalent in service delivery for medical, financial, and physical security applications and so there is a growing need to prevent eavesdropping. This paper presents circuit-theoretic and communication-theoretic models of inductively-coupled communication systems. Due to coupling, the presence of an eavesdropper detunes the transfer function between the legitimate users. It is shown this detuning can be detected to reveal the presence of the eavesdropper. Further, if capacity-approaching codes are employed, neither the eavesdropper nor the legitimate receiver are able to reconstruct the transmitted message with low error probability, effectively destroying the message. Building on this insight, a coding-based secure communication protocol for inductively-coupled communication, inspired by quantum key distribution, is developed. The notion of security is defined operationally in terms of probabilities rather than through traditional notions of equivocation.
UR - http://www.scopus.com/inward/record.url?scp=84860454412&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84860454412&partnerID=8YFLogxK
U2 - 10.1109/ITA.2012.6181821
DO - 10.1109/ITA.2012.6181821
M3 - Conference contribution
AN - SCOPUS:84860454412
SN - 9781467314725
T3 - 2012 Information Theory and Applications Workshop, ITA 2012 - Conference Proceedings
SP - 47
EP - 53
BT - 2012 Information Theory and Applications Workshop, ITA 2012 - Conference Proceedings
T2 - 2012 Information Theory and Applications Workshop, ITA 2012
Y2 - 5 February 2012 through 10 February 2012
ER -