Cargando…

Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach

In this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy and the secrecy benefit, to be used over real-wor...

Descripción completa

Detalles Bibliográficos
Autores principales: Harrison, Willie K., Beard, Elise, Dye, Scott, Holmes, Erin, Nelson, Kaela, Gomes, Marco A. C., Vilela, João P.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7515284/
https://www.ncbi.nlm.nih.gov/pubmed/33267469
http://dx.doi.org/10.3390/e21080755
_version_ 1783586781854171136
author Harrison, Willie K.
Beard, Elise
Dye, Scott
Holmes, Erin
Nelson, Kaela
Gomes, Marco A. C.
Vilela, João P.
author_facet Harrison, Willie K.
Beard, Elise
Dye, Scott
Holmes, Erin
Nelson, Kaela
Gomes, Marco A. C.
Vilela, João P.
author_sort Harrison, Willie K.
collection PubMed
description In this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy and the secrecy benefit, to be used over real-world channels and finite blocklength instantiations of coding layers, and use this new approach to show the fundamental reliability and security implications of several coding mechanisms that have traditionally been used for physical-layer security. We perform a systematic/structured analysis of the effect of error-control coding, scrambling, interleaving, and coset coding, as coding layers of a secrecy system. Using this new approach, scrambling and interleaving are shown to be of no effect in increasing information theoretic security, even when measuring the effect at the output of the eavesdropper’s decoder. Error control coding is shown to present a trade-off between secrecy and reliability that is dictated by the chosen code and the signal-to-noise ratios at the legitimate and eavesdropping receivers. Finally, the benefits of secrecy coding are highlighted, and it is shown how one can shape the secrecy benefit according to system specifications using combinations of different layers of coding to achieve both reliable and secure throughput.
format Online
Article
Text
id pubmed-7515284
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75152842020-11-09 Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach Harrison, Willie K. Beard, Elise Dye, Scott Holmes, Erin Nelson, Kaela Gomes, Marco A. C. Vilela, João P. Entropy (Basel) Article In this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy and the secrecy benefit, to be used over real-world channels and finite blocklength instantiations of coding layers, and use this new approach to show the fundamental reliability and security implications of several coding mechanisms that have traditionally been used for physical-layer security. We perform a systematic/structured analysis of the effect of error-control coding, scrambling, interleaving, and coset coding, as coding layers of a secrecy system. Using this new approach, scrambling and interleaving are shown to be of no effect in increasing information theoretic security, even when measuring the effect at the output of the eavesdropper’s decoder. Error control coding is shown to present a trade-off between secrecy and reliability that is dictated by the chosen code and the signal-to-noise ratios at the legitimate and eavesdropping receivers. Finally, the benefits of secrecy coding are highlighted, and it is shown how one can shape the secrecy benefit according to system specifications using combinations of different layers of coding to achieve both reliable and secure throughput. MDPI 2019-08-01 /pmc/articles/PMC7515284/ /pubmed/33267469 http://dx.doi.org/10.3390/e21080755 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Harrison, Willie K.
Beard, Elise
Dye, Scott
Holmes, Erin
Nelson, Kaela
Gomes, Marco A. C.
Vilela, João P.
Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
title Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
title_full Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
title_fullStr Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
title_full_unstemmed Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
title_short Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
title_sort implications of coding layers on physical-layer security: a secrecy benefit approach
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7515284/
https://www.ncbi.nlm.nih.gov/pubmed/33267469
http://dx.doi.org/10.3390/e21080755
work_keys_str_mv AT harrisonwilliek implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach
AT beardelise implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach
AT dyescott implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach
AT holmeserin implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach
AT nelsonkaela implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach
AT gomesmarcoac implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach
AT vilelajoaop implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach