Filters








219 Hits in 3.7 sec

Applications of LDPC Codes to the Wiretap Channel [article]

Andrew Thangaraj, Souvik Dihidar, A. R. Calderbank, Steven McLaughlin, Jean-Marc Merolla
2007 arXiv   pre-print
We provide an alternative view of the proof for secrecy capacity of wire tap channels and show how capacity achieving codes can be used to achieve the secrecy capacity for any wiretap channel.  ...  For the special case of a noiseless main channel and binary erasure channel, we consider encoder and decoder design for codes achieving secrecy on the wiretap channel; we show that it is possible to construct  ...  EFFICIENTLY DECODABLE SECRECY CODES FOR NOISELESS MAIN CHANNEL AND ERASURE WIRETAP CHANNEL SYSTEMS The main advantage of using LDPC codes for error correction over regular erasure channels is that the  ... 
arXiv:cs/0411003v3 fatcat:hfggzri6ljfovfrkh5omdj72aq

LDPC codes for physical layer security
LDPC kodovi za potrebe zaštite podataka na fizičkom nivou

Sonja Kuljanski-Marić
2018 Vojnotehnički Glasnik  
In this paper, the Wyner model of the communication channel was used, and LDPC codes were constructed for the transmission of information through this channel.  ...  At the end of the last and the beginning of this century, there was an idea that LDPC codes should be applied to protect data at the physical layer.  ...  LDPC codes of the form Bit error rate for the codes of the form m) C(n, This feature was compared to pure BER on the channel (between the modulator and the QPSK demodulator) and the total BER on the  ... 
doi:10.5937/vojtehg66-14776 fatcat:slmsi26o7rbazgb5lj4rnlt364

Secret-Sharing LDPC Codes for the BPSK-Constrained Gaussian Wiretap Channel

Chan Wong Wong, Tan F. Wong, John M. Shea
2011 IEEE Transactions on Information Forensics and Security  
To accommodate practical constraints of finite block length and limited decoding complexity, fixed irregular LDPC codes are also designed to replace the regular LDPC code ensemble in the proposed secret  ...  It is shown that a secret sharing scheme that employs a random ensemble of regular low density parity check (LDPC) codes can achieve the key capacity of the BPSK-constrained Gaussian wiretap channel asymptotically  ...  First, based on the linearity of LDPC codes, the memoryless nature of the Gaussian wiretap channel, the chosen distribution of X n , and the symbol-by-symbol hard decision performed to obtainỸ n at the  ... 
doi:10.1109/tifs.2011.2139208 fatcat:fajxyns35zeczi2gre5unk6xry

Secure Nested Codes for Type II Wiretap Channels [article]

Ruoheng Liu, Yingbin Liang, H. Vincent Poor, Predrag Spasojevic
2007 arXiv   pre-print
The proposed secure coding scheme is extended to a type II binary symmetric wiretap channel.  ...  This paper considers the problem of secure coding design for a type II wiretap channel, where the main channel is noiseless and the eavesdropper channel is a general binary-input symmetric-output memoryless  ...  Moreover, Approach I can be extended to the general AWGN wiretap channel (the main channel is also a BI-AWGN channel) by constructing a nested LDPC code pair. B.  ... 
arXiv:0706.3752v1 fatcat:hjwm76wr45euxa6xrzn7y54tke

Randomized Serially Concatenated LDGM Codes for the Gaussian Wiretap Channel

Alireza Nooraiepour, Tolga M. Duman
2018 IEEE Communications Letters  
We study the application of a special class of lowdensity parity-check codes to the wiretap channel.  ...  Index Terms-Low density parity check (LDPC) codes, low density generator matrix (LDGM) codes, Gaussian wiretap channel, security gap.  ...  Duman , Fellow, IEEE Abstract-We study the application of a special class of lowdensity parity-check codes to the wiretap channel.  ... 
doi:10.1109/lcomm.2018.2789346 fatcat:ygvlqbqh3rhxngtaptenqopury

Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel

Marco Baldi, Giacomo Ricciutelli, Nicola Maturo, Franco Chiaraluce
2015 2015 IEEE International Conference on Communication Workshop (ICCW)  
In this work we study the reliability and secrecy performance achievable by practical LDPC codes over the Gaussian wiretap channel.  ...  Moreover, based on the secrecy metrics we adopt to achieve this target, we propose a code optimization algorithm which allows to design irregular LDPC codes able to approach the ultimate performance limits  ...  The same approach is followed in [6] to assess the performance of punctured LDPC codes over the Gaussian wiretap channel.  ... 
doi:10.1109/iccw.2015.7247218 dblp:conf/icc/BaldiRMC15 fatcat:p35yxrasknc5dne5ov2xar3jby

Implementation of Physical Layer Key Distribution using Software Defined Radios

S. Kambala, R. Vaidyanathaswami, A. Thangaraj
2013 Defence Science Journal  
In this paper, we present a brief tutorial introduction to the Wiretap channel, followed by an application of the physical layer model to a class of Key Distribution protocols.  ...  Studies have been made to quantify the amount of secrecy that can be reaped by combining channel coding with security protocols.  ...  The result is applicable for large values of n, but LDPC codes are usually used with block length running into thousands.  ... 
doi:10.14429/dsj.63.3758 fatcat:my4bslsjlbeink2enaehnerzxi

Code-Hopping Based Transmission Scheme for Wireless Physical-Layer Security

Liuguo Yin, Wentao Hao
2018 Wireless Communications and Mobile Computing  
Due to the broadcast and time-varying natures of wireless channels, traditional communication systems that provide data encryption at the application layer suffer many challenges such as error diffusion  ...  Thus she cannot select the correct LDPC matrix to recover the source message.  ...  For binary erasure wiretap channels, Thangaraj et al. [10] proposed a coding technique based on the dual of LDPC codes and showed that the secrecy capacity can be achieved by this technique.  ... 
doi:10.1155/2018/7063758 fatcat:75c4dsbtyfafhbkrkm64ryvoeu

Implementation of Physical Layer Key Distribution using Software Defined Radios

S. Kambala, R. Vaidyanathaswami, A. Thangaraj
2013 Defence Science Journal  
In this paper, we present a brief tutorial introduction to the Wiretap channel, followed by an application of the physical layer model to a class of Key Distribution protocols.  ...  Studies have been made to quantify the amount of secrecy that can be reaped by combining channel coding with security protocols.  ...  The result is applicable for large values of n, but LDPC codes are usually used with block length running into thousands.  ... 
doi:10.14429/dsj2013.6592 fatcat:cb2vfdq5a5cgjlefwphum74eui

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 IEEE Journal on Selected Areas in Communications  
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer.  ...  We review the state of art of three important physical layer security codes, including low-density parity-check (LDPC) codes, polar codes, and lattice codes. 2) Massive MIMO: Deploying large antenna arrays  ...  Other polar coding schemes for wiretap channels include the concatenation of two polar codes for the general wiretap channel [33] , the concatenation of polar and LDPC codes to minimize the security gap  ... 
doi:10.1109/jsac.2018.2825560 fatcat:nanjj67ilvdcfbmfpmo7zppqvy

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [article]

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 arXiv   pre-print
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer.  ...  This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter  ...  Other polar coding schemes for wiretap channels include the concatenation of two polar codes for the general wiretap channel [33] , the concatenation of polar and LDPC codes to minimize the security gap  ... 
arXiv:1801.05227v1 fatcat:gktqlyt4wrfhnjdxfvl3vlmhau

Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel

Qian Wang, Kui Ren, Guancheng Li, Chenbo Xia, Xiaobing Chen, Zhibo Wang, Qin Zou
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
We show that, our system can achieve nearly perfect secrecy given a fixed codeword length by carefully controlling the structure of the parity-check matrix of wiretap codes to strike the proper balance  ...  The experimental results demonstrate the physical limitations and the feasibility of building practical wiretap channels in both the worst channel case and the case where the sender has only the knowledge  ...  As the wiretap channel model, the security and reliability of the theoretical construction are feasible only when the code length n of the wiretap codes tends to infinity.  ... 
doi:10.1145/2810103.2813702 dblp:conf/ccs/WangRLXCWZ15 fatcat:eld75d35bvdxtio2yv7d5ilgtm

Low-power Secret-key Agreement over OFDM [article]

Francesco Renna, Nicola Laurenti, Stefano Tomasin, Marco Baldi, Nicola Maturo, Marco Bianchi, Franco Chiaraluce, Matthieu Bloch
2013 arXiv   pre-print
We assess the performance of the proposed system in terms of secrecy key rate and show that a practical approach to key sharing is obtained by using low-density parity check (LDPC) codes for information  ...  Moreover, the outage formulation allows to implement secret-key agreement even when only statistical knowledge of the eavesdropper channel is available.  ...  RBFR105NLC) under the"FIRB -Futuro in Ricerca 2010" funding program.  ... 
arXiv:1302.4767v1 fatcat:24ahr2egm5fbxpfivhduol325e

Implementation and Security Analysis of Practical Quantum Secure Direct Communication [article]

Ruoyang Qi, Zhen Sun, Zaisheng Lin, Penghao Niu, Wentao Hao, Liyuan Song, Qin Huang, Jiancun Gao, Liuguo Yin, Gui-Lu Long
2018 arXiv   pre-print
Here, we report an implementation of practical quantum secure communication system. The security is analyzed in the Wyner wiretap channel theory.  ...  The system uses a coding scheme based on concatenation of low density parity check (LDPC) codes, which works in a regime with realistic environment of high noise and high loss.  ...  To combat error and loss, LDPC code and pseudo-random sequence techniques are applied. The security of the system is analyzed in details using the wiretap channel theory.  ... 
arXiv:1810.11806v1 fatcat:d27sxta3ffgynnxjyjnnj22qc4

An Overview of Physical Layer Security with Finite-Alphabet Signaling [article]

Sina Rezaei Aghdam, Alireza Nooraiepour, Tolga M. Duman
2018 arXiv   pre-print
We also present an overview of practical code construction over Gaussian and fading wiretap channels, and we discuss some open problems and directions for future research.  ...  We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter.  ...  Klinc et al. [128] Punctured LDPC codes Propose puncturing information bits in LDPC codes in order to confuse Eve. M.  ... 
arXiv:1802.06401v2 fatcat:ribkfxbb7bgklf4zvqp2llhayy
« Previous Showing results 1 — 15 out of 219 results