Cargando…
Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
In this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy and the secrecy benefit, to be used over real-wor...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7515284/ https://www.ncbi.nlm.nih.gov/pubmed/33267469 http://dx.doi.org/10.3390/e21080755 |
_version_ | 1783586781854171136 |
---|---|
author | Harrison, Willie K. Beard, Elise Dye, Scott Holmes, Erin Nelson, Kaela Gomes, Marco A. C. Vilela, João P. |
author_facet | Harrison, Willie K. Beard, Elise Dye, Scott Holmes, Erin Nelson, Kaela Gomes, Marco A. C. Vilela, João P. |
author_sort | Harrison, Willie K. |
collection | PubMed |
description | In this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy and the secrecy benefit, to be used over real-world channels and finite blocklength instantiations of coding layers, and use this new approach to show the fundamental reliability and security implications of several coding mechanisms that have traditionally been used for physical-layer security. We perform a systematic/structured analysis of the effect of error-control coding, scrambling, interleaving, and coset coding, as coding layers of a secrecy system. Using this new approach, scrambling and interleaving are shown to be of no effect in increasing information theoretic security, even when measuring the effect at the output of the eavesdropper’s decoder. Error control coding is shown to present a trade-off between secrecy and reliability that is dictated by the chosen code and the signal-to-noise ratios at the legitimate and eavesdropping receivers. Finally, the benefits of secrecy coding are highlighted, and it is shown how one can shape the secrecy benefit according to system specifications using combinations of different layers of coding to achieve both reliable and secure throughput. |
format | Online Article Text |
id | pubmed-7515284 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-75152842020-11-09 Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach Harrison, Willie K. Beard, Elise Dye, Scott Holmes, Erin Nelson, Kaela Gomes, Marco A. C. Vilela, João P. Entropy (Basel) Article In this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy and the secrecy benefit, to be used over real-world channels and finite blocklength instantiations of coding layers, and use this new approach to show the fundamental reliability and security implications of several coding mechanisms that have traditionally been used for physical-layer security. We perform a systematic/structured analysis of the effect of error-control coding, scrambling, interleaving, and coset coding, as coding layers of a secrecy system. Using this new approach, scrambling and interleaving are shown to be of no effect in increasing information theoretic security, even when measuring the effect at the output of the eavesdropper’s decoder. Error control coding is shown to present a trade-off between secrecy and reliability that is dictated by the chosen code and the signal-to-noise ratios at the legitimate and eavesdropping receivers. Finally, the benefits of secrecy coding are highlighted, and it is shown how one can shape the secrecy benefit according to system specifications using combinations of different layers of coding to achieve both reliable and secure throughput. MDPI 2019-08-01 /pmc/articles/PMC7515284/ /pubmed/33267469 http://dx.doi.org/10.3390/e21080755 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Harrison, Willie K. Beard, Elise Dye, Scott Holmes, Erin Nelson, Kaela Gomes, Marco A. C. Vilela, João P. Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach |
title | Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach |
title_full | Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach |
title_fullStr | Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach |
title_full_unstemmed | Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach |
title_short | Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach |
title_sort | implications of coding layers on physical-layer security: a secrecy benefit approach |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7515284/ https://www.ncbi.nlm.nih.gov/pubmed/33267469 http://dx.doi.org/10.3390/e21080755 |
work_keys_str_mv | AT harrisonwilliek implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach AT beardelise implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach AT dyescott implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach AT holmeserin implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach AT nelsonkaela implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach AT gomesmarcoac implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach AT vilelajoaop implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach |