Coding techniques for multi-user physical layer security
The fast development of wireless networks, which are intrinsically exposed to eavesdropping, has created a growing concern for confidentiality. While classical cryptographic schemes require a key provided by the end-user, physical-layer security leverages the randomness of the physical communication...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
Georgia Institute of Technology
2015
|
Subjects: | |
Online Access: | http://hdl.handle.net/1853/53836 |
id |
ndltd-GATECH-oai-smartech.gatech.edu-1853-53836 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-GATECH-oai-smartech.gatech.edu-1853-538362015-11-19T15:31:54ZCoding techniques for multi-user physical layer securityPierrot, Alexandre Jean Louis J.Physical layer securityCooperative jammingSecret key generationResolvabilityStrong secrecyTwo-way wiretap channelMulti-user securityThe fast development of wireless networks, which are intrinsically exposed to eavesdropping, has created a growing concern for confidentiality. While classical cryptographic schemes require a key provided by the end-user, physical-layer security leverages the randomness of the physical communication medium as a source of secrecy. The main benefit of physical-layer security techniques is their relatively low cost and their ability to combine with any existing security mechanisms. This dissertation provides an analysis including the theoretical study of the two-way wiretap channel to obtain a better insight into how to design coding mechanisms, practical tests with experimental systems, and the design of actual codes. From a theoretical standpoint, the study confirms the benefits of combining several multi-user coding techniques including cooperative jamming, coded cooperative jamming and secret key generation. For these different mechanisms, the trade-off between reliability, secrecy and communication rate is clarified under a stringent strong secrecy metric. Regarding the design of practical codes, spatially coupled LDPC codes, which were originally designed for reliability, are modified to develop a coded cooperative jamming code. Finally, a proof-of-principle practical wireless system is provided to show how to implement a secret key generation system on experimental programmable radios. This testbed is then used to assess the realistic performance of such systems in terms of reliability, secrecy and rate.Georgia Institute of TechnologyBloch, Matthieu R.2015-09-21T14:23:08Z2015-09-21T14:23:08Z2015-082015-07-14August 20152015-09-21T14:23:08ZDissertationapplication/pdfhttp://hdl.handle.net/1853/53836en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
topic |
Physical layer security Cooperative jamming Secret key generation Resolvability Strong secrecy Two-way wiretap channel Multi-user security |
spellingShingle |
Physical layer security Cooperative jamming Secret key generation Resolvability Strong secrecy Two-way wiretap channel Multi-user security Pierrot, Alexandre Jean Louis J. Coding techniques for multi-user physical layer security |
description |
The fast development of wireless networks, which are intrinsically exposed to eavesdropping, has created a growing concern for confidentiality. While classical cryptographic schemes require a key provided by the end-user, physical-layer security leverages the randomness of the physical communication medium as a source of secrecy. The main benefit of physical-layer security techniques is their relatively low cost and their ability to combine with any existing security mechanisms. This dissertation provides an analysis including the theoretical study of the two-way wiretap channel to obtain a better insight into how to design coding mechanisms, practical tests with experimental systems, and the design of actual codes. From a theoretical standpoint, the study confirms the benefits of combining several multi-user coding techniques including cooperative jamming, coded cooperative jamming and secret key generation. For these different mechanisms, the trade-off between reliability, secrecy and communication rate is clarified under a stringent strong secrecy metric. Regarding the design of practical codes, spatially coupled LDPC codes, which were originally designed for reliability, are modified to develop a coded cooperative jamming code. Finally, a proof-of-principle practical wireless system is provided to show how to implement a secret key generation system on experimental programmable radios. This testbed is then used to assess the realistic performance of such systems in terms of reliability, secrecy and rate. |
author2 |
Bloch, Matthieu R. |
author_facet |
Bloch, Matthieu R. Pierrot, Alexandre Jean Louis J. |
author |
Pierrot, Alexandre Jean Louis J. |
author_sort |
Pierrot, Alexandre Jean Louis J. |
title |
Coding techniques for multi-user physical layer security |
title_short |
Coding techniques for multi-user physical layer security |
title_full |
Coding techniques for multi-user physical layer security |
title_fullStr |
Coding techniques for multi-user physical layer security |
title_full_unstemmed |
Coding techniques for multi-user physical layer security |
title_sort |
coding techniques for multi-user physical layer security |
publisher |
Georgia Institute of Technology |
publishDate |
2015 |
url |
http://hdl.handle.net/1853/53836 |
work_keys_str_mv |
AT pierrotalexandrejeanlouisj codingtechniquesformultiuserphysicallayersecurity |
_version_ |
1718130922762534912 |