Coding techniques for multi-user physical layer security

The fast development of wireless networks, which are intrinsically exposed to eavesdropping, has created a growing concern for confidentiality. While classical cryptographic schemes require a key provided by the end-user, physical-layer security leverages the randomness of the physical communication...

Full description

Bibliographic Details
Main Author: Pierrot, Alexandre Jean Louis J.
Other Authors: Bloch, Matthieu R.
Format: Others
Language:en_US
Published: Georgia Institute of Technology 2015
Subjects:
Online Access:http://hdl.handle.net/1853/53836
id ndltd-GATECH-oai-smartech.gatech.edu-1853-53836
record_format oai_dc
spelling ndltd-GATECH-oai-smartech.gatech.edu-1853-538362015-11-19T15:31:54ZCoding techniques for multi-user physical layer securityPierrot, Alexandre Jean Louis J.Physical layer securityCooperative jammingSecret key generationResolvabilityStrong secrecyTwo-way wiretap channelMulti-user securityThe fast development of wireless networks, which are intrinsically exposed to eavesdropping, has created a growing concern for confidentiality. While classical cryptographic schemes require a key provided by the end-user, physical-layer security leverages the randomness of the physical communication medium as a source of secrecy. The main benefit of physical-layer security techniques is their relatively low cost and their ability to combine with any existing security mechanisms. This dissertation provides an analysis including the theoretical study of the two-way wiretap channel to obtain a better insight into how to design coding mechanisms, practical tests with experimental systems, and the design of actual codes. From a theoretical standpoint, the study confirms the benefits of combining several multi-user coding techniques including cooperative jamming, coded cooperative jamming and secret key generation. For these different mechanisms, the trade-off between reliability, secrecy and communication rate is clarified under a stringent strong secrecy metric. Regarding the design of practical codes, spatially coupled LDPC codes, which were originally designed for reliability, are modified to develop a coded cooperative jamming code. Finally, a proof-of-principle practical wireless system is provided to show how to implement a secret key generation system on experimental programmable radios. This testbed is then used to assess the realistic performance of such systems in terms of reliability, secrecy and rate.Georgia Institute of TechnologyBloch, Matthieu R.2015-09-21T14:23:08Z2015-09-21T14:23:08Z2015-082015-07-14August 20152015-09-21T14:23:08ZDissertationapplication/pdfhttp://hdl.handle.net/1853/53836en_US
collection NDLTD
language en_US
format Others
sources NDLTD
topic Physical layer security
Cooperative jamming
Secret key generation
Resolvability
Strong secrecy
Two-way wiretap channel
Multi-user security
spellingShingle Physical layer security
Cooperative jamming
Secret key generation
Resolvability
Strong secrecy
Two-way wiretap channel
Multi-user security
Pierrot, Alexandre Jean Louis J.
Coding techniques for multi-user physical layer security
description The fast development of wireless networks, which are intrinsically exposed to eavesdropping, has created a growing concern for confidentiality. While classical cryptographic schemes require a key provided by the end-user, physical-layer security leverages the randomness of the physical communication medium as a source of secrecy. The main benefit of physical-layer security techniques is their relatively low cost and their ability to combine with any existing security mechanisms. This dissertation provides an analysis including the theoretical study of the two-way wiretap channel to obtain a better insight into how to design coding mechanisms, practical tests with experimental systems, and the design of actual codes. From a theoretical standpoint, the study confirms the benefits of combining several multi-user coding techniques including cooperative jamming, coded cooperative jamming and secret key generation. For these different mechanisms, the trade-off between reliability, secrecy and communication rate is clarified under a stringent strong secrecy metric. Regarding the design of practical codes, spatially coupled LDPC codes, which were originally designed for reliability, are modified to develop a coded cooperative jamming code. Finally, a proof-of-principle practical wireless system is provided to show how to implement a secret key generation system on experimental programmable radios. This testbed is then used to assess the realistic performance of such systems in terms of reliability, secrecy and rate.
author2 Bloch, Matthieu R.
author_facet Bloch, Matthieu R.
Pierrot, Alexandre Jean Louis J.
author Pierrot, Alexandre Jean Louis J.
author_sort Pierrot, Alexandre Jean Louis J.
title Coding techniques for multi-user physical layer security
title_short Coding techniques for multi-user physical layer security
title_full Coding techniques for multi-user physical layer security
title_fullStr Coding techniques for multi-user physical layer security
title_full_unstemmed Coding techniques for multi-user physical layer security
title_sort coding techniques for multi-user physical layer security
publisher Georgia Institute of Technology
publishDate 2015
url http://hdl.handle.net/1853/53836
work_keys_str_mv AT pierrotalexandrejeanlouisj codingtechniquesformultiuserphysicallayersecurity
_version_ 1718130922762534912