{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:07:39Z","timestamp":1760242059797,"version":"build-2065373602"},"reference-count":22,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2018,11,26]],"date-time":"2018-11-26T00:00:00Z","timestamp":1543190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In wireless body area networks (WBANs), the secrecy of personal health information is vulnerable to attacks due to the openness of wireless communication. In this paper, we study the security problem of WBANs, where there exists an attacker or eavesdropper who is able to observe data from part of sensors. The legitimate communication within the WBAN is modeled as a discrete memoryless channel (DMC) by establishing the secrecy capacity of a class of finite state Markov erasure wiretap channels. Meanwhile, the tapping of the eavesdropper is modeled as a finite-state Markov erasure channel (FSMEC). A pair of encoder and decoder are devised to make the eavesdropper have no knowledge of the source message, and enable the receiver to recover the source message with a small decoding error. It is proved that the secrecy capacity can be achieved by migrating the coding scheme for wiretap channel II with the noisy main channel. This method provides a new idea solving the secure problem of the internet of things (IoT).<\/jats:p>","DOI":"10.3390\/s18124135","type":"journal-article","created":{"date-parts":[[2018,11,26]],"date-time":"2018-11-26T03:24:27Z","timestamp":1543202667000},"page":"4135","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secrecy Capacity of a Class of Erasure Wiretap Channels in WBAN"],"prefix":"10.3390","volume":"18","author":[{"given":"Bin","family":"Wang","sequence":"first","affiliation":[{"name":"School of Communication Engineering, Xi\u2019an University of Science and Technology, Xi\u2019an 710054, China"}]},{"given":"Jun","family":"Deng","sequence":"additional","affiliation":[{"name":"School of Communication Engineering, Xi\u2019an University of Science and Technology, Xi\u2019an 710054, China"}]},{"given":"Yanjing","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Communication Engineering, Xi\u2019an University of Science and Technology, Xi\u2019an 710054, China"},{"name":"School of Information and Control Engineering, China University of Mining and Technology, Xuzhou 221116, China"}]},{"given":"Wangmei","family":"Guo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an 10071, China"}]},{"given":"Guiguo","family":"Feng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an 10071, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,11,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2297","DOI":"10.1109\/JSYST.2017.2700438","article-title":"On the uplink secrecy capacity analysis in D2D-enabled cellular network","volume":"12","author":"Tolossa","year":"2017","journal-title":"IEEE Syst. J."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Jameel, F., Wyne, S., Kaddoum, G., and Duong, T.Q. (2018). A comprehensive survey on cooperative relaying and jamming strategies for physical layer security. IEEE Commun. Surv. Tutor.","DOI":"10.1109\/COMST.2018.2865607"},{"key":"ref_3","unstructured":"Kong, L., Vuppala, S., and Kaddoum, G. (2018). Secrecy Analysis of Random MIMO Wireless Networks over \u03b1 \u2212 \u03bc Fading Channels. IEEE Trans. Veh. Technol."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Zhang, P.N., and Ma, J. (2018). Channel Characteristic Aware Privacy Protection Mechanism in WBAN. Sensors, 18.","DOI":"10.3390\/s18082403"},{"key":"ref_5","first-page":"50","article-title":"Securing Data Communication in Wireless Body Area Networks Using Digital Signatures","volume":"23","author":"Anwar","year":"2018","journal-title":"Technol. J."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","article-title":"The Wire-Tap Channel","volume":"54","author":"Wyner","year":"1975","journal-title":"Bell Syst. Technol. J."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1561\/0100000028","article-title":"Topics in Multi-user Information Theory","volume":"4","author":"Kramer","year":"2007","journal-title":"Found. Trends Commun. Inf. Theory"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","article-title":"Broadcast channels with confidential messages","volume":"24","author":"Csiszar","year":"1978","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1109\/TIT.2007.911157","article-title":"Wiretap channel with side infor-mation","volume":"54","author":"Chen","year":"2008","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1671","DOI":"10.3390\/e14091671","article-title":"Some new results on the wiretap channel with side information","volume":"14","author":"Dai","year":"2012","journal-title":"Entropy"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Dai, B., Han Vinck, A.J., Hong, J., Luo, Y., and Zhuang, Z. (2012, January 1\u20136). Degraded Broadcast Channel with Noncausal Side Information, Confidential Messages and Noiseless Feedback. Proceedings of the 2012 IEEE International Symposium on Information Theory, Cambridge, MA, USA.","DOI":"10.1109\/ISIT.2012.6284226"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Dai, B., Luo, Y., and Han Vinck, A.J. (2010, January 16\u201318). Capacity region of broadcast channels with private message and causual side information. Proceedings of the 3rd International Conference on Image and Signal Processing (CISP 2010), Yantai, China.","DOI":"10.1109\/CISP.2010.5646806"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"672","DOI":"10.1109\/TIFS.2011.2151188","article-title":"Secrete-key agreement with channel state information at the transmitter","volume":"6","author":"Khisti","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2838","DOI":"10.1109\/TIT.2011.2181329","article-title":"Wiretap channel with causal state information","volume":"58","author":"Chia","year":"2012","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2135","DOI":"10.1002\/j.1538-7305.1984.tb00072.x","article-title":"Wire-tap channel II","volume":"63","author":"Ozarow","year":"1984","journal-title":"AT T Bell Lab. Technol. J."},{"key":"ref_16","unstructured":"He, D., and Luo, Y. (2012, January 9\u201311). A kind of non-DMC erasure wiretap chan-nel. Proceedings of the 2012 IEEE 14th International Conference on Communication Technology, Chengdu, China."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"He, D., Luo, Y., and Cai, N. (2016, January 10\u201315). Strong Secrecy Capacity of the Wiretap Channel II with DMC Main Channel. Proceedings of the 2016 IEEE International Symposium on Information Theory (ISIT), Barcelona, Spain.","DOI":"10.1109\/ISIT.2016.7541350"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1002\/j.1538-7305.1960.tb03959.x","article-title":"Capacity of a burst-noise channel","volume":"39","author":"Gilbert","year":"1960","journal-title":"Bell Syst. Technol. J."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1977","DOI":"10.1002\/j.1538-7305.1963.tb00955.x","article-title":"Estimates of error rates for codes on burst-noise channels","volume":"42","author":"Elliott","year":"1960","journal-title":"Bell Syst. Technol. J."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/25.350282","article-title":"Finite-state Markov channel\u2014A useful model for radio communication channels","volume":"44","author":"Wang","year":"1995","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Lv, N., Chen, C., Qiu, T., and Sangaiah, A.K. (2018). Deep Learning and Superpixel Feature Extraction based on Sparse Autoencoder for Change Detection in SAR Images. IEEE Trans. Ind. Inf.","DOI":"10.1109\/TII.2018.2873492"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Chen, C., Hu, J., Qiu, T., Atiquzzaman, M., and Ren, Z. (2018). CVCG: Cooperative V2V-aided Transmission Scheme Based on Coalitional Game for Popular Content Distribution in Vehicular Ad-hoc Networks. IEEE Trans. Mob. Comput.","DOI":"10.1109\/TMC.2018.2883312"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/12\/4135\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:32:02Z","timestamp":1760196722000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/12\/4135"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,26]]},"references-count":22,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2018,12]]}},"alternative-id":["s18124135"],"URL":"https:\/\/doi.org\/10.3390\/s18124135","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2018,11,26]]}}}