Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach

In this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy and the secrecy benefit, to be used over real-wor...

Full description

Bibliographic Details
Main Authors: Willie K. Harrison, Elise Beard, Scott Dye, Erin Holmes, Kaela Nelson, Marco A. C. Gomes, João P. Vilela
Format: Article
Language:English
Published: MDPI AG 2019-08-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/21/8/755
id doaj-03bf09e2274146ef82295f3387c0aa7c
record_format Article
spelling doaj-03bf09e2274146ef82295f3387c0aa7c2020-11-24T21:23:56ZengMDPI AGEntropy1099-43002019-08-0121875510.3390/e21080755e21080755Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit ApproachWillie K. Harrison0Elise Beard1Scott Dye2Erin Holmes3Kaela Nelson4Marco A. C. Gomes5João P. Vilela6Department of Electrical and Computer Engineering, Brigham Young University, Provo, UT 84602, USADepartment of Electrical and Computer Engineering, Brigham Young University, Provo, UT 84602, USADepartment of Electrical and Computer Engineering, Brigham Young University, Provo, UT 84602, USADepartment of Mathematics and Computer Science, Colorado College, Colorado Springs, CO 80903, USADepartment of Electrical and Computer Engineering, Brigham Young University, Provo, UT 84602, USAInstituto de Telecomunicações, Department of Electrical and Computer Engineering, University of Coimbra, 3004-531 Coimbra, PortugalCISUC and Department of Informatics Engineering, University of Coimbra, 3004-531 Coimbra, PortugalIn this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy and the secrecy benefit, to be used over real-world channels and finite blocklength instantiations of coding layers, and use this new approach to show the fundamental reliability and security implications of several coding mechanisms that have traditionally been used for physical-layer security. We perform a systematic/structured analysis of the effect of error-control coding, scrambling, interleaving, and coset coding, as coding layers of a secrecy system. Using this new approach, scrambling and interleaving are shown to be of no effect in increasing information theoretic security, even when measuring the effect at the output of the eavesdropper’s decoder. Error control coding is shown to present a trade-off between secrecy and reliability that is dictated by the chosen code and the signal-to-noise ratios at the legitimate and eavesdropping receivers. Finally, the benefits of secrecy coding are highlighted, and it is shown how one can shape the secrecy benefit according to system specifications using combinations of different layers of coding to achieve both reliable and secure throughput.https://www.mdpi.com/1099-4300/21/8/755physical-layer securityequivocationGaussian wiretap channelconcatenated coding
collection DOAJ
language English
format Article
sources DOAJ
author Willie K. Harrison
Elise Beard
Scott Dye
Erin Holmes
Kaela Nelson
Marco A. C. Gomes
João P. Vilela
spellingShingle Willie K. Harrison
Elise Beard
Scott Dye
Erin Holmes
Kaela Nelson
Marco A. C. Gomes
João P. Vilela
Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
Entropy
physical-layer security
equivocation
Gaussian wiretap channel
concatenated coding
author_facet Willie K. Harrison
Elise Beard
Scott Dye
Erin Holmes
Kaela Nelson
Marco A. C. Gomes
João P. Vilela
author_sort Willie K. Harrison
title Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
title_short Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
title_full Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
title_fullStr Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
title_full_unstemmed Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
title_sort implications of coding layers on physical-layer security: a secrecy benefit approach
publisher MDPI AG
series Entropy
issn 1099-4300
publishDate 2019-08-01
description In this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy and the secrecy benefit, to be used over real-world channels and finite blocklength instantiations of coding layers, and use this new approach to show the fundamental reliability and security implications of several coding mechanisms that have traditionally been used for physical-layer security. We perform a systematic/structured analysis of the effect of error-control coding, scrambling, interleaving, and coset coding, as coding layers of a secrecy system. Using this new approach, scrambling and interleaving are shown to be of no effect in increasing information theoretic security, even when measuring the effect at the output of the eavesdropper’s decoder. Error control coding is shown to present a trade-off between secrecy and reliability that is dictated by the chosen code and the signal-to-noise ratios at the legitimate and eavesdropping receivers. Finally, the benefits of secrecy coding are highlighted, and it is shown how one can shape the secrecy benefit according to system specifications using combinations of different layers of coding to achieve both reliable and secure throughput.
topic physical-layer security
equivocation
Gaussian wiretap channel
concatenated coding
url https://www.mdpi.com/1099-4300/21/8/755
work_keys_str_mv AT williekharrison implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach
AT elisebeard implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach
AT scottdye implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach
AT erinholmes implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach
AT kaelanelson implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach
AT marcoacgomes implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach
AT joaopvilela implicationsofcodinglayersonphysicallayersecurityasecrecybenefitapproach
_version_ 1725990291778830336