On Achieving Unconditional Secure Communications over Binary Symmetric Channels (BSC)

This paper investigates an unconditional communication model based on wiretap channel I. We will firstly review our previous study on build wiretap channel I in which the eavesdropper sees a binary symmetric channel (BSC) with error probability p while the main channel is error free. To make p as close to 0.5 as possible, the paper introduces a novel security code which helps turning the original system to achieve unconditional secure communications. Extensive simulation is conducted and the results verify our approach.

[1]  Hatim M. Behairy,et al.  Parallel concatenated Gallager codes , 2000 .

[2]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[3]  Andrew Thangaraj,et al.  Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes , 2010, IEEE Transactions on Information Forensics and Security.

[4]  D.J.C. MacKay,et al.  Good error-correcting codes based on very sparse matrices , 1997, Proceedings of IEEE International Symposium on Information Theory.

[5]  Reihaneh Safavi-Naini,et al.  Secret Keys from Channel Noise , 2011, IACR Cryptol. ePrint Arch..

[6]  Prasant Mohapatra,et al.  Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Ender Tekin,et al.  Correction to: "the Gaussian multiple access wire-tap channel" and "the general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming" , 2010, IEEE Trans. Inf. Theory.

[9]  Hong Wen,et al.  Build-in wiretap channel I with feedback and LDPC codes , 2009, Journal of Communications and Networks.

[10]  Shu Lin,et al.  Error control coding : fundamentals and applications , 1983 .

[11]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[12]  Mikael Skoglund,et al.  Nested Polar Codes for Wiretap and Relay Channels , 2010, IEEE Communications Letters.

[13]  A. Glavieux,et al.  Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1 , 1993, Proceedings of ICC '93 - IEEE International Conference on Communications.

[14]  Alfred O. Hero,et al.  Secure space-time communication , 2003, IEEE Trans. Inf. Theory.

[15]  Alexander Vardy,et al.  Achieving the secrecy capacity of wiretap channels using Polar codes , 2010, ISIT.

[16]  A. Robert Calderbank,et al.  Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.