A Rateless Approach to Physical-Layer Security

A majority of coding constructions for physical-layer security are based on linear block codes and their cosets. One issue with these codes is that they require knowledge of channel state information (CSI) for both the friendly party and the eavesdropper in the wiretap channel prior to constructing the code. In this paper, we present a framework for rateless physical-layer security codes over the wiretap channel by introducing both fixed and adaptive variants of rateless security coding schemes. These techniques can be used to reduce the requirements on CSI prior to code construction, because the codes will either adapt to the operating parameters of the legitimate user's channel on the fly and/or target a maximum allowable probability of intercept (POI) at the eavesdropper. All channels in play are packet erasure channels (PECs), as these channels are quite pervasive in most real-world network applications. We further present the details of an actual implementation of rateless physical-layer security coding over a Wi-Fi network.

[1]  Andrew Thangaraj,et al.  Error-Control Coding for Physical-Layer Secrecy , 2015, Proceedings of the IEEE.

[2]  Matthieu R. Bloch,et al.  Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.

[3]  Steven W. McLaughlin,et al.  Coding for Cryptographic Security Enhancement Using Stopping Sets , 2011, IEEE Transactions on Information Forensics and Security.

[4]  Lajos Hanzo,et al.  Reconfigurable Rateless Codes , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[5]  Michael Luby,et al.  LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[6]  Lajos Hanzo,et al.  Myths and realities of rateless coding , 2011, IEEE Communications Magazine.

[7]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[8]  Luming Tan,et al.  Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[9]  Lajos Hanzo,et al.  Low-Density Parity-Check Codes and Their Rateless Relatives , 2011, IEEE Communications Surveys & Tutorials.

[10]  Alexander Vardy,et al.  A Cryptographic Treatment of the Wiretap Channel , 2012, IACR Cryptol. ePrint Arch..

[11]  Toshiaki Koike-Akino,et al.  Secret Key Sharing and Rateless Coding for Practical Secure Wireless Transmission , 2011 .

[12]  Cong Ling,et al.  Semantically Secure Lattice Codes for the Gaussian Wiretap Channel , 2012, IEEE Transactions on Information Theory.

[13]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[14]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[15]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[16]  Li Xiong Harnessing personal data from Internet of Things: Privacy enhancing dynamic information monitoring , 2015, 2015 International Conference on Collaboration Technologies and Systems (CTS).

[17]  G. Grimmett,et al.  Probability and random processes , 2002 .

[18]  Alberto Leon-Garcia,et al.  Probability and Random Processes For EE's (3rd Edition) , 2007 .

[19]  Alexander Vardy,et al.  Semantic Security for the Wiretap Channel , 2012, CRYPTO.

[20]  Onur Ozan Koyluoglu,et al.  Polar coding for secure transmission and key agreement , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[21]  Jonathan S. Yedidia,et al.  Rateless codes on noisy channels , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[22]  Alfred V. Aho,et al.  The Design and Analysis of Computer Algorithms , 1974 .