BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Information-Theoretic Security in Wireless Networks: From Theory t
 o Practice - Miguel Rodrigues\, Digital Technology Group\, Cambridge
DTSTART:20060628T130000Z
DTEND:20060628T140000Z
UID:TALK5127@talks.cam.ac.uk
CONTACT:David MacKay
DESCRIPTION: Recent theoretical and practical work has shown that novel\np
 hysical-layer based security techniques have the potential to significantl
 y\nstrengthen\nthe security of wireless networks. This talk will cover the
  basic ideas\nbehind information theoretic security. In the classical sett
 ing\, two\nparties\, say Alice and Bob\, communicate with one another over
  a noisy\nchannel. However\, another party - Eve - is also capable of eave
 sdropping\nAlice's transmissions. We will characterize the rate-equivocati
 on region as\nwell as the secrecy capacity in the conventional Gaussian ch
 annel scenario.\nWe will also characterize similar quantities (outage prob
 abilities and\noutage secrecy capacities) in the wireless channel case. It
  will be shown\nthat\, in sharp contrast to the situation in the classical
  Gaussian wiretap\nchannel\, in fading channels information theoretic secu
 rity is achievable\neven when the eavesdropper enjoys a better average sig
 nal-to-noise ratio\n(SNR) than the legitimate receiver.\n\nThis talk will 
 also introduce a novel practical physical-layer based\nsecurity scheme for
  wireless networks\, where two terminals (Alice and Bob)\nexploit the rand
 omness of wireless fading channels to exchange data in an\ninformation-the
 oretically secure way. In particular\, Alice sends useful\nsymbols to Bob 
 only when the instantaneous secrecy capacity is strictly\npositive. In the
  remaining time\, a specially designed class of LDPC codes is\nused for re
 conciliation\, thus allowing the extraction of a secret key\, which\ncan b
 e distilled using privacy amplification. We believe this opportunistic\nap
 proach can be used effectively as a physical-layer complement to existing\
 ncryptographic protocols.\n\nThis work represents a joint collaboration wi
 th Joao Barros (University of\nPorto\, Portugal)\, Matthieu Bloch and Stev
 e McLaughlin (Georgia Institute of\nTechnology\, USA).\n\nShort Bio: Migue
 l Rodrigues was born in Porto\, Portugal on May 30\, 1975. He\nreceived th
 e Licenciatura degree in electrical engineering from the Faculty\nof\nEngi
 neering of the University of Porto\, Portugal in 1998 and the Ph.D.\ndegre
 e in electronic and electrical engineering from University College\nLondon
 \, U.K. in 2002.\n\nHe is currently a Senior Research Associate with the C
 omputer Laboratory\,\nUniversity of Cambridge\, U.K. He is also an Honorar
 y Senior Research Fellow\nwith the Dept. of Electronic and Electrical Engi
 neering\, University College\nLondon\, U.K. His research interests include
  information theory\,\ncommunications theory and signal processing. He has
  over 40 publications in\ninternational journals and conference proceeding
 s in these areas.\n\nDr. Rodrigues has been the recipient of doctoral and 
 postdoctoral\nfellowships from the Portuguese Foundation for Science and T
 echnology\, the\nPrize Engenheiro Ant?nio de Almeida\, the Prize Engenheir
 o Cristiano\nSpratley\, and the Merit Scholarship from the University of P
 orto\, Portugal\,\nand of the best student poster award at the Second IMA 
 International\nConference on Mathematics in Communications.\n\n
LOCATION:Ryle Seminar Room\, Cavendish Laboratory
END:VEVENT
END:VCALENDAR
