On Caching with Finite Blocklength Coding for Secrecy over the Binary Erasure Wiretap Channel

In this paper, we show that caching can aid in achieving secure communications by considering a wiretap scenario where the transmitter and legitimate receiver share access to a secure cache, and an eavesdropper is able to tap transmissions over a binary erasure wiretap channel during the delivery phase of a caching protocol. The scenario under consideration gives rise to a new channel model for wiretap coding that allows the transmitter to effectively choose a subset of bits to erase at the eavesdropper by caching the bits ahead of time. The eavesdropper observes the remainder of the coded bits through the wiretap channel for the general case. In the wiretap type-II scenario, the eavesdropper is able to choose a set of revealed bits only from the subset of bits not cached. We present a coding approach that allows efficient use of the cache to realize a caching gain in the network, and show how to use the cache to optimize the information theoretic security in the choice of a finite blocklength code and the choice of the cached bit set. To our knowledge, this is the first work on explicit algorithms for secrecy coding in any type of caching network.

[1]  Matthieu R. Bloch,et al.  Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.

[2]  Donald F. Towsley,et al.  The Role of Caching in Future Communication Systems and Networks , 2018, IEEE Journal on Selected Areas in Communications.

[3]  A. Robert Calderbank,et al.  Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.

[4]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[5]  Aylin Yener,et al.  The Caching Broadcast Channel with a Wire and Cache Tapping Adversary of Type II: Multiple Library Files , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[6]  Nuwan S. Ferdinand,et al.  Coded caching with non-identical user demands , 2017, 2017 15th Canadian Workshop on Information Theory (CWIT).

[7]  Holger Boche,et al.  Type II wiretap channel with an active eavesdropper in finite blocklength regime , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[8]  Aylin Yener,et al.  The Wiretap Channel with a Cache , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).

[9]  Willie K. Harrison,et al.  Quantifying equivocation for finite blocklength wiretap codes , 2017, 2017 IEEE International Conference on Communications (ICC).

[10]  Aylin Yener,et al.  A New Wiretap Channel Model and Its Strong Secrecy Capacity , 2017, IEEE Transactions on Information Theory.

[11]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[12]  Deniz Gündüz,et al.  Coded caching for a large number of users , 2016, 2016 IEEE Information Theory Workshop (ITW).

[13]  Deniz Gündüz,et al.  Caching and Coded Delivery Over Gaussian Broadcast Channels for Energy Efficiency , 2018, IEEE Journal on Selected Areas in Communications.

[14]  Li Tang,et al.  Coded Caching Schemes With Reduced Subpacketization From Linear Block Codes , 2017, IEEE Transactions on Information Theory.

[15]  Aylin Yener,et al.  Wiretap channel II with a noisy main channel , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[16]  Deniz Gündüz,et al.  Fundamental Limits of Coded Caching: Improved Delivery Rate-Cache Capacity Tradeoff , 2017, IEEE Transactions on Communications.

[17]  Michele A. Wigger,et al.  Coded caching for wiretap broadcast channels , 2017, 2017 IEEE Information Theory Workshop (ITW).

[18]  T. Moon Error Correction Coding: Mathematical Methods and Algorithms , 2005 .

[19]  Reihaneh Safavi-Naini,et al.  A Model for Adversarial Wiretap Channels , 2016, IEEE Transactions on Information Theory.

[20]  Aylin Yener,et al.  The Caching Broadcast Channel with a Wire and Cache Tapping Adversary of Type II , 2018, 2018 IEEE Information Theory Workshop (ITW).

[21]  Urs Niesen,et al.  Fundamental limits of caching , 2012, 2013 IEEE International Symposium on Information Theory.

[22]  Matthieu R. Bloch,et al.  Attributes of Generators for Best Finite Blocklength Coset Wiretap Codes over Erasure Channels , 2019, 2019 IEEE International Symposium on Information Theory (ISIT).

[23]  Matthieu R. Bloch,et al.  On Dual Relationships of Secrecy Codes , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).