Please use this identifier to cite or link to this item: https://hdl.handle.net/10316/106885
Title: Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
Authors: Harrison, Willie K.
Beard, Elise
Dye, Scott
Holmes, Erin
Nelson, Kaela
Gomes, Marco A. C. 
Vilela, João P. 
Keywords: physical-layer security; equivocation; Gaussian wiretap channel; concatenated coding
Issue Date: 1-Aug-2019
Publisher: MDPI
Project: This research was funded by the following entities and projects: the US National Science Foundation (Grant Award Number 1761280), projects SWING2 (PTDC/EEI-TEL/3684/2014) and MobiWise (P2020 SAICTPAC/001/2015), funded by Fundos Europeus Estruturais e de Investimento (FEEI) through Programa Operacional Competitividade e Internacionalização—COMPETE 2020, and by National Funds from FCT—Fundação para a Ciência e a Tecnologia, through projects POCI-01-0145-FEDER-016753 and UID/EEA/50008/2019, and European Union’s ERDF (European Regional Development Fund). 
Serial title, monograph or event: Entropy
Volume: 21
Issue: 8
Abstract: In this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy and the secrecy benefit, to be used over real-world channels and finite blocklength instantiations of coding layers, and use this new approach to show the fundamental reliability and security implications of several coding mechanisms that have traditionally been used for physical-layer security. We perform a systematic/structured analysis of the effect of error-control coding, scrambling, interleaving, and coset coding, as coding layers of a secrecy system. Using this new approach, scrambling and interleaving are shown to be of no effect in increasing information theoretic security, even when measuring the effect at the output of the eavesdropper's decoder. Error control coding is shown to present a trade-off between secrecy and reliability that is dictated by the chosen code and the signal-to-noise ratios at the legitimate and eavesdropping receivers. Finally, the benefits of secrecy coding are highlighted, and it is shown how one can shape the secrecy benefit according to system specifications using combinations of different layers of coding to achieve both reliable and secure throughput.
URI: https://hdl.handle.net/10316/106885
ISSN: 1099-4300
DOI: 10.3390/e21080755
Rights: openAccess
Appears in Collections:I&D CISUC - Artigos em Revistas Internacionais
I&D IT - Artigos em Revistas Internacionais

Show full item record

SCOPUSTM   
Citations

4
checked on Apr 22, 2024

WEB OF SCIENCETM
Citations

2
checked on Apr 2, 2024

Page view(s)

33
checked on Apr 23, 2024

Download(s)

6
checked on Apr 23, 2024

Google ScholarTM

Check

Altmetric

Altmetric


This item is licensed under a Creative Commons License Creative Commons