Securing inductively-coupled communication

Lav R. Varshney, Pulkit Grover, Anant Sahai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Communication over inductively-coupled links is becoming prevalent in service delivery for medical, financial, and physical security applications and so there is a growing need to prevent eavesdropping. This paper presents circuit-theoretic and communication-theoretic models of inductively-coupled communication systems. Due to coupling, the presence of an eavesdropper detunes the transfer function between the legitimate users. It is shown this detuning can be detected to reveal the presence of the eavesdropper. Further, if capacity-approaching codes are employed, neither the eavesdropper nor the legitimate receiver are able to reconstruct the transmitted message with low error probability, effectively destroying the message. Building on this insight, a coding-based secure communication protocol for inductively-coupled communication, inspired by quantum key distribution, is developed. The notion of security is defined operationally in terms of probabilities rather than through traditional notions of equivocation.

Original languageEnglish (US)
Title of host publication2012 Information Theory and Applications Workshop, ITA 2012 - Conference Proceedings
Pages47-53
Number of pages7
DOIs
StatePublished - 2012
Externally publishedYes
Event2012 Information Theory and Applications Workshop, ITA 2012 - San Diego, CA, United States
Duration: Feb 5 2012Feb 10 2012

Publication series

Name2012 Information Theory and Applications Workshop, ITA 2012 - Conference Proceedings

Other

Other2012 Information Theory and Applications Workshop, ITA 2012
CountryUnited States
CitySan Diego, CA
Period2/5/122/10/12

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems

Fingerprint Dive into the research topics of 'Securing inductively-coupled communication'. Together they form a unique fingerprint.

Cite this