A Secure Turbo Codes Design on Physical Layer Security Based on Interleaving and Puncturing

Nowadays, improving the reliability and security of the transmitted data has gained more attention with the increase in emerging power-limited and lightweight communication devices. Also, the transmission needs to meet specific latency requirements. Combining data encryption and encoding in one physical layer block has been exploited to study the effect on security and latency over traditional sequential data transmission. Some of the current works target secure error-correcting codes that may be candidates for post-quantum computing. However, modifying the popularly used channel coding techniques to guarantee secrecy and maintain the same error performance and complexity at the decoder is challenging since the structure of the channel coding blocks is altered which results in less optimal decoding performance. Also, the redundancy nature of the error-correcting codes complicates the encryption method. In this paper, we briefly review the proposed security schemes on Turbo codes. Then, we propose a secure turbo code design and compare it with the relevant security schemes in the literature. We show that the proposed method is more secure without adding complexity.

[1]  Κωνσταντίνος Μονογιός,et al.  Μετακβαντικοί κρυπτογραφικοί αλγόριθμοι (Post-Quantum Cryptography) , 2019 .

[2]  Haji M. Furqan,et al.  Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[3]  Can Zhang,et al.  Joint Channel-Encryption Coding Based on Interleaver and Multiplexer in Turbo Codes , 2018, 2018 IEEE 4th International Conference on Computer and Communications (ICCC).

[4]  Dennis Hui,et al.  Channel Coding in 5G New Radio: A Tutorial Overview and Performance Comparison with 4G LTE , 2018, IEEE Vehicular Technology Magazine.

[5]  Archana Bhise,et al.  Performance analysis of encrypted structured random interleaver , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[6]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[7]  Christian Schlegel,et al.  Trellis and Turbo Coding: Iterative and Graph-Based Error Control Coding , 2015 .

[8]  Alexandros Katsiotis,et al.  Secure encoder designs based on turbo codes , 2015, 2015 IEEE International Conference on Communications (ICC).

[9]  V. Vakili,et al.  Enhanced Secure Error Correction Code Schemes in Time Reversal UWB Systems , 2012, Wirel. Pers. Commun..

[10]  Can Zhang,et al.  Joint channel-security coding based on interleaver and puncturer in Turbo code , 2011, 2011 3rd Symposium on Web Society.

[11]  Mohammad Reza Aref,et al.  Adaptive random puncturing based secure block turbo coding , 2010, 2010 5th International Symposium on Telecommunications.

[12]  Volkan Ozduran,et al.  A COMBINED ENCRYPTION AND ERROR CORRECTION SCHEME:AES-TURBO , 2009 .

[13]  Daniel J. Bernstein,et al.  Introduction to post-quantum cryptography , 2009 .

[14]  M. Ahmadian,et al.  A Secure Channel Coding Scheme for Efficient Transmission of Remote Sensing Data over the LEO Satellite Channels , 2007, 2007 3rd International Conference on Recent Advances in Space Technologies.

[15]  Mahmoud Ahmadian,et al.  Adaptive secure channel coding based on punctured turbo codes , 2006 .

[16]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[17]  Jacqueline Grennon , 2nd Ed. , 2002, The Journal of nervous and mental disease.

[18]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[19]  A. Glavieux,et al.  Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1 , 1993, Proceedings of ICC '93 - IEEE International Conference on Communications.

[20]  T. R. N. Rao,et al.  Private-key algebraic-code encryptions , 1989, IEEE Trans. Inf. Theory.

[21]  Robert J. McEliece,et al.  A public key cryptosystem based on algebraic coding theory , 1978 .