Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
In this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy and the secrecy benefit, to be used over real-wor...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-08-01
|
Series: | Entropy |
Subjects: | |
Online Access: | https://www.mdpi.com/1099-4300/21/8/755 |
id |
doaj-03bf09e2274146ef82295f3387c0aa7c |
---|---|
record_format |
Article |
spelling |
doaj-03bf09e2274146ef82295f3387c0aa7c2020-11-24T21:23:56ZengMDPI AGEntropy1099-43002019-08-0121875510.3390/e21080755e21080755Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit ApproachWillie K. Harrison0Elise Beard1Scott Dye2Erin Holmes3Kaela Nelson4Marco A. C. Gomes5João P. Vilela6Department of Electrical and Computer Engineering, Brigham Young University, Provo, UT 84602, USADepartment of Electrical and Computer Engineering, Brigham Young University, Provo, UT 84602, USADepartment of Electrical and Computer Engineering, Brigham Young University, Provo, UT 84602, USADepartment of Mathematics and Computer Science, Colorado College, Colorado Springs, CO 80903, USADepartment of Electrical and Computer Engineering, Brigham Young University, Provo, UT 84602, USAInstituto de Telecomunicações, Department of Electrical and Computer Engineering, University of Coimbra, 3004-531 Coimbra, PortugalCISUC and Department of Informatics Engineering, University of Coimbra, 3004-531 Coimbra, PortugalIn this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy and the secrecy benefit, to be used over real-world channels and finite blocklength instantiations of coding layers, and use this new approach to show the fundamental reliability and security implications of several coding mechanisms that have traditionally been used for physical-layer security. We perform a systematic/structured analysis of the effect of error-control coding, scrambling, interleaving, and coset coding, as coding layers of a secrecy system. Using this new approach, scrambling and interleaving are shown to be of no effect in increasing information theoretic security, even when measuring the effect at the output of the eavesdropper’s decoder. Error control coding is shown to present a trade-off between secrecy and reliability that is dictated by the chosen code and the signal-to-noise ratios at the legitimate and eavesdropping receivers. Finally, the benefits of secrecy coding are highlighted, and it is shown how one can shape the secrecy benefit according to system specifications using combinations of different layers of coding to achieve both reliable and secure throughput.https://www.mdpi.com/1099-4300/21/8/755physical-layer securityequivocationGaussian wiretap channelconcatenated coding |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Willie K. Harrison Elise Beard Scott Dye Erin Holmes Kaela Nelson Marco A. C. Gomes João P. Vilela |
spellingShingle |
Willie K. Harrison Elise Beard Scott Dye Erin Holmes Kaela Nelson Marco A. C. Gomes João P. Vilela Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach Entropy physical-layer security equivocation Gaussian wiretap channel concatenated coding |
author_facet |
Willie K. Harrison Elise Beard Scott Dye Erin Holmes Kaela Nelson Marco A. C. Gomes João P. Vilela |
author_sort |
Willie K. Harrison |
title |
Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach |
title_short |
Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach |
title_full |
Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach |
title_fullStr |
Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach |
title_full_unstemmed |
Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach |
title_sort |
implications of coding layers on physical-layer security: a secrecy benefit approach |
publisher |
MDPI AG |
series |
Entropy |
issn |
1099-4300 |
publishDate |
2019-08-01 |
description |
In this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy and the secrecy benefit, to be used over real-world channels and finite blocklength instantiations of coding layers, and use this new approach to show the fundamental reliability and security implications of several coding mechanisms that have traditionally been used for physical-layer security. We perform a systematic/structured analysis of the effect of error-control coding, scrambling, interleaving, and coset coding, as coding layers of a secrecy system. Using this new approach, scrambling and interleaving are shown to be of no effect in increasing information theoretic security, even when measuring the effect at the output of the eavesdropper’s decoder. Error control coding is shown to present a trade-off between secrecy and reliability that is dictated by the chosen code and the signal-to-noise ratios at the legitimate and eavesdropping receivers. Finally, the benefits of secrecy coding are highlighted, and it is shown how one can shape the secrecy benefit according to system specifications using combinations of different layers of coding to achieve both reliable and secure throughput. |
topic |
physical-layer security equivocation Gaussian wiretap channel concatenated coding |
url |
https://www.mdpi.com/1099-4300/21/8/755 |
work_keys_str_mv |
AT williekharrison implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach AT elisebeard implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach AT scottdye implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach AT erinholmes implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach AT kaelanelson implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach AT marcoacgomes implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach AT joaopvilela implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach |
_version_ |
1725990291778830336 |