An encryption aware physical layer security system

Due to their broadcast nature, wireless systems are vulnerable in the physical layer. While many physical layer security techniques are being developed, current security solutions are based on encryption techniques. This paper analyzes the relation between encryption techniques and physical layer security approaches and proposes a new encryption-aware multilayer security framework. The proposed framework optimizes transmit power by taking the adopted encryption technique into account, while guaranteeing both a quality of service (QoS) level for the legitimate receiver and a secrecy constraint against the eavesdropper. Numerical results are given for two most widely used symmetric encryption techniques, the data encryption (DES) and the advanced encryption (AES) standards. Numerical results show that the proposed encryption-aware physical layer security system achieves a better power efficiency when compared to the classical physical layer security approaches.

[1]  Il-Min Kim,et al.  BER-Based Physical Layer Security With Finite Codelength: Combining Strong Converse and Error Amplification , 2014, IEEE Transactions on Communications.

[2]  Gerd Ascheid,et al.  Beamforming Aided Interference Management with Improved Secrecy for Correlated Channels , 2014, 2014 IEEE 79th Vehicular Technology Conference (VTC Spring).

[3]  Byung-Jae Kwak,et al.  LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.

[4]  Matthew J. B. Robshaw,et al.  The Block Cipher Companion , 2011, Information Security and Cryptography.

[5]  OpenSSL OpenSSL : The open source toolkit for SSL/TSL , 2002 .

[6]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[7]  Gerd Ascheid,et al.  Adaptive Physical Layer Security Framework for Wireless Systems , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).

[8]  Jos F. Sturm,et al.  A Matlab toolbox for optimization over symmetric cones , 1999 .

[9]  Marco Baldi,et al.  Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.

[10]  Mustafa M. Matalgah,et al.  Modified-DES encryption algorithm with improved BER performance in wireless communication , 2011, 2011 IEEE Radio and Wireless Symposium.

[11]  François Gagnon,et al.  On Convexity of Error Rates in Digital Communications , 2013, IEEE Transactions on Information Theory.

[12]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[13]  H. Zimmermann,et al.  OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.

[14]  Chunxiao Jiang,et al.  Statistical Characterization of Decryption Errors in Block-Ciphered Systems , 2015, IEEE Transactions on Communications.