LDPC-based coded cooperative jamming codes

We present a practical coded cooperative jamming scheme for the problem of secure communications over the two-way wiretap channel. We design low-density parity-check (LDPC) based codes whose codewords interfere at the eavesdropper's terminal, thus providing secrecy. We show that our scheme can guarantee low information leakage rate, and we assess its precise performance for classical and spatially coupled LDPC codes.

[1]  Xiang He,et al.  On the role of feedback in two-way secure communication , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.

[2]  Alexandre J. Pierrot,et al.  Strongly Secure Communications Over the Two-Way Wiretap Channel , 2010, IEEE Transactions on Information Forensics and Security.

[3]  Kenta Kasai,et al.  Spatially coupled codes over the multiple access channel , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[4]  Rüdiger L. Urbanke,et al.  Modern Coding Theory , 2008 .

[5]  Mikael Skoglund,et al.  Rate-equivocation optimal spatially coupled LDPC codes for the BEC wiretap channel , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[6]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[7]  Moustafa Youssef,et al.  The Two-Way Wiretap Channel: Achievable Regions and Experimental Results , 2011 .

[8]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[9]  Kamil Sh. Zigangirov,et al.  Time-varying periodic convolutional codes with low-density parity-check matrix , 1999, IEEE Trans. Inf. Theory.

[10]  John M. Shea,et al.  LDPC code design for the BPSK-constrained Gaussian wiretap channel , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[11]  Andrew Thangaraj,et al.  Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes , 2010, IEEE Transactions on Information Forensics and Security.

[12]  Mikael Skoglund,et al.  Equivocation of eve using two edge type LDPC codes for the binary erasure wiretap channel , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[13]  Rüdiger L. Urbanke,et al.  Threshold Saturation via Spatial Coupling: Why Convolutional LDPC Ensembles Perform So Well over the BEC , 2010, IEEE Transactions on Information Theory.

[14]  Byung-Jae Kwak,et al.  LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.

[15]  Alexander Vardy,et al.  Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.

[16]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .