Security through the Lens of Information Asymmetry

National Science Foundation

Award information

Abstract

The needs of future networks beyond 5G and Internet of Things call for a comprehensive and inclusive approach to security. By harnessing the imperfections of communication channels, physical-layer security integrates security concerns into the design of communication systems with benefits such as energy efficiency and simplified key management; physical-layer security often imposes requirements, however, which has impeded its practical adoption and deployment. Furthermore, in some applications where physical-layer security is uniquely suitable and no obvious cryptographic solution exists, such as situations requiring covertness, results to date have been disappointing in terms of predicted data transmission speeds. This project addresses these two points. The outcomes of this project can ensure secure wireless communications in future networks with minimal performance impact.

The first thrust of this project brings a new perspective to the study of cooperative security through the lens of information asymmetry against adversaries. This part of the project aims to elucidate how cooperation can provide knowledge to one user about the variations in the channel induced by the signaling of another in a manner that creates new and hitherto unforeseen advantages over an adversary. The second thrust of this project explores the benefits of information asymmetry for covert communications, including the role of channel state knowledge, which is foreseen as a key mechanism to not only circumvent the square-root law of covert communication but also to alleviat the need for a shared secret key. The impact of different-quality channel states being available at different nodes will be studied.

Publications

  1. S.-Y. Wang, K. S. K. Arumugam, and M. R. Bloch, “Bounds on Covert Capacity with Sub-Exponential Random Slot Selection,” ieee_j_it, vol. 71, no. 9, pp. 6586–6601, Sep. 2025.
  2. R. Chou and M. R. Bloch, “Multiuser Commitment over Noisy Channels.” accepted to IEEE Transactions on Information Theory, Aug. 2025.
  3. M.-C. Chang and M. R. Bloch, “Covert Sequential Sensing.” submitted to IEEE Journal of Selected Areas in Communications, Apr. 2025.
  4. O. Günlü, M. Bloch, and and A. Y. Rafael F. Schaefer, “Nonasymptotic performance limits of low-latency secure integrated sensing and communication systems,” in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, Seoul, Korea, Apr. 2024.
  5. L. Luzzi, C. Ling, and M. R. Bloch, “Optimal rate-limited secret key generation from Gaussian sources using lattices,” ieee_j_it, vol. 69, no. 8, pp. 4944–4960, Aug. 2023.
  6. M.-C. Chang and M. R. Bloch, “Distributed Stochastic Bandits with Corrupted and Defective Input Commands,” in ieee_isit, Taipei, Taiwan, Jun. 2023, pp. 1318–1323.
  7. M.-C. Chang, S.-Y. Wang, T. Erdoğan, and M. R. Bloch, “Rate and Detection-Error Exponent Tradeoff for Joint Communication and Sensing of Fixed Channel States,” ieee_j_sait, vol. 4, pp. 245–259, May 2023.
  8. O. Günlü, M. R. Bloch, R. F. Schaefer, and A. Yener, “Secure Integrated Sensing and Communication,” ieee_j_sait, vol. 4, pp. 40–53, May 2023.
  9. R. A. Chou and M. R. Bloch, “Retractable Commitment,” in ieee_itw, Saint-Malo, France, Apr. 2023, pp. 260–265.
  10. O. Günlü, M. R. Bloch, and R. Schaeffer, “Private Remote Sources for Secure Multi-Function Computation,” ieee_j_it, vol. 10, no. 68, pp. 1557–9654, Oct. 2022.
  11. M.-C. Chang, S.-Y. Wang, and M. R. Bloch, “Controlled Sensing with Corrupted Commands,” in Proc. of 58th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2022.
  12. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Keyless Covert Communication via Channel State Information,” ieee_j_it, vol. 68, no. 8, pp. 5440–5474, Aug. 2022.
  13. O. Günlü, M. R. Bloch, R. Schaefer, and A. Yener, “Secure Joint Communication and Sensing,” in ieee_isit, Helskinki, Finland, Jun. 2022, pp. 844–849.
  14. M.-C. Chang and M. R. Bloch, “Covert Best Arm Identification of Stochastic Bandits,” in ieee_isit, Helsinki, Finland, Jun. 2022, pp. 324–329.
  15. H. Zivari-Fard, M. R. Bloch, and A. Nosratinia, “Covert Communication in the Presence of an Uninformed, Informed, and Coordinated Jammer,” in ieee_isit, Helsinki, Finland, Jun. 2022.
  16. M.-C. Chang, T. Erdoğan, S.-Y. Wang, and M. R. Bloch, “Rate and Detection Error-Exponent Tradeoffs of Joint Communication and Sensing,” in Proc. of IEEE International Symposium on Joint Communications & Sensing, Vienna, Austria, Mar. 2022, pp. 1–6.
  17. M.-C. Chang and M. R. Bloch, “Covert Sequential Hypothesis Testing,” in ieee_itw, Oct. 2021, pp. 1–6.
  18. H. ZivariFard, M. R. Bloch, and A. Nosratinia, “Covert Communication via Non-Causal Cribbing from a Cooperative Jammer,” in ieee_isit, Jul. 2021, pp. 202–207.
  19. O. Günlü, M. Bloch, and R. F. Schaefer, “Secure Multi-Function Computation with Private Remote Sources,” in ieee_isit, Jul. 2021, pp. 1403–1408.
  20. M.-C. Chang and M. R. Bloch, “Covert Authentication Against a Myopic Adversary,” in ieee_isit, Jul. 2021, pp. 196–201.
  21. M.-C. Chang and M. R. Bloch, “Evasive Active Hypothesis Testing,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 2, pp. 735–746, Jun. 2021.
  22. M. Bloch et al., “An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 5–22, Mar. 2021.
  23. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Two-Multicast Channel with Confidential Messages,” ieee_j_ifs, vol. 16, pp. 2743–2758, 2021.