Abstract

In this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy and the secrecy benefit, to be used over real-world channels and finite blocklength instantiations of coding layers, and use this new approach to show the fundamental reliability and security implications of several coding mechanisms that have traditionally been used for physical-layer security. We perform a systematic/structured analysis of the effect of error-control coding, scrambling, interleaving, and coset coding, as coding layers of a secrecy system. Using this new approach, scrambling and interleaving are shown to be of no effect in increasing information theoretic security, even when measuring the effect at the output of the eavesdropper’s decoder. Error control coding is shown to present a trade-off between secrecy and reliability that is dictated by the chosen code and the signal-to-noise ratios at the legitimate and eavesdropping receivers. Finally, the benefits of secrecy coding are highlighted, and it is shown how one can shape the secrecy benefit according to system specifications using combinations of different layers of coding to achieve both reliable and secure throughput.

Highlights

  • Physical-layer security [1] is currently undergoing a resurgence of interest and activity, regarding progressing towards real-world application of information theoretic security principles [2,3,4]

  • Since the metric is a practical one, its application to finite blocklength codes with known explicit constructions is highlighted. Along with this new security metric, we present the idea of a code’s secrecy benefit, which, over the Gaussian wiretap channel, shows the increase in confusion at the eavesdropper for the coded scenario over the uncoded scenario as a function of signal-to-noise ratio

  • We show that keyless layers of scrambling and interleaving provide no secrecy benefit over the uncoded case, error-control coding layers can be used to increase security or reliability depending on the signal-to-noise ratios at the legitimate and eavesdropping receivers, and the secrecy benefit of coset-based secrecy codes can be shaped using error-control coding

Read more

Summary

Introduction

Physical-layer security [1] is currently undergoing a resurgence of interest and activity, regarding progressing towards real-world application of information theoretic security principles [2,3,4]. The contributions of this paper include a systematic and structured analysis of error-control coding, interleaving, scrambling, and coset-based secrecy coding, as layers in a physical-layer security coding system We chose these layers so as to represent fundamentally different approaches to coding for secrecy over the Gaussian wiretap channel, and leave additional layers of coding, such as other constructions of wiretap codes [8,9], for future work. We assign capital letters to random variables and matrices, lowercase letters to realizations of random variables, calligraphic letters to ranges of random variables, superscripts to indicate the size of vectors and matrices, and subscripts to index the elements of vectors and matrices

System Model
Metrics
Layers of Coding for Reliable Data Transfer
Error-Control Coding Leaks Information
Error-Control Coding Shapes Practical Secrecy
Practical Security Coding Layers
Information Theoretic Security Coding Layers
Results and Discussion
Algebraic Code Examples with Inter-Block Processing
Code Examples with Intra-Block Processing Only
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.