Skip to main navigation Skip to search Skip to main content

Securing inductively-coupled communication

  • University of California at Berkeley
  • Stanford University

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

15 Scopus citations

Abstract

Communication over inductively-coupled links is becoming prevalent in service delivery for medical, financial, and physical security applications and so there is a growing need to prevent eavesdropping. This paper presents circuit-theoretic and communication-theoretic models of inductively-coupled communication systems. Due to coupling, the presence of an eavesdropper detunes the transfer function between the legitimate users. It is shown this detuning can be detected to reveal the presence of the eavesdropper. Further, if capacity-approaching codes are employed, neither the eavesdropper nor the legitimate receiver are able to reconstruct the transmitted message with low error probability, effectively destroying the message. Building on this insight, a coding-based secure communication protocol for inductively-coupled communication, inspired by quantum key distribution, is developed. The notion of security is defined operationally in terms of probabilities rather than through traditional notions of equivocation.

Original languageEnglish
Title of host publication2012 Information Theory and Applications Workshop, ITA 2012 - Conference Proceedings
Pages47-53
Number of pages7
DOIs
StatePublished - 2012
Event2012 Information Theory and Applications Workshop, ITA 2012 - San Diego, CA, United States
Duration: Feb 5 2012Feb 10 2012

Publication series

Name2012 Information Theory and Applications Workshop, ITA 2012 - Conference Proceedings

Conference

Conference2012 Information Theory and Applications Workshop, ITA 2012
Country/TerritoryUnited States
CitySan Diego, CA
Period02/5/1202/10/12

Fingerprint

Dive into the research topics of 'Securing inductively-coupled communication'. Together they form a unique fingerprint.

Cite this