1,101 research outputs found
Coding Schemes for Achieving Strong Secrecy at Negligible Cost
We study the problem of achieving strong secrecy over wiretap channels at
negligible cost, in the sense of maintaining the overall communication rate of
the same channel without secrecy constraints. Specifically, we propose and
analyze two source-channel coding architectures, in which secrecy is achieved
by multiplexing public and confidential messages. In both cases, our main
contribution is to show that secrecy can be achieved without compromising
communication rate and by requiring only randomness of asymptotically vanishing
rate. Our first source-channel coding architecture relies on a modified wiretap
channel code, in which randomization is performed using the output of a source
code. In contrast, our second architecture relies on a standard wiretap code
combined with a modified source code termed uniform compression code, in which
a small shared secret seed is used to enhance the uniformity of the source code
output. We carry out a detailed analysis of uniform compression codes and
characterize the optimal size of the shared seed.Comment: 15 pages, two-column, 5 figures, accepted to IEEE Transactions on
Information Theor
Increasing Physical Layer Security through Scrambled Codes and ARQ
We develop the proposal of non-systematic channel codes on the AWGN wire-tap
channel. Such coding technique, based on scrambling, achieves high transmission
security with a small degradation of the eavesdropper's channel with respect to
the legitimate receiver's channel. In this paper, we show that, by implementing
scrambling and descrambling on blocks of concatenated frames, rather than on
single frames, the channel degradation needed is further reduced. The usage of
concatenated scrambling allows to achieve security also when both receivers
experience the same channel quality. However, in this case, the introduction of
an ARQ protocol with authentication is needed.Comment: 5 pages, 4 figures; Proc. IEEE ICC 2011, Kyoto, Japan, 5-9 June 201
Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints
The intrinsic hardware imperfection of WiFi chipsets manifests itself in the
transmitted signal, leading to a unique radiometric fingerprint. This
fingerprint can be used as an additional means of authentication to enhance
security. In fact, recent works propose practical fingerprinting solutions that
can be readily implemented in commercial-off-the-shelf devices. In this paper,
we prove analytically and experimentally that these solutions are highly
vulnerable to impersonation attacks. We also demonstrate that such a unique
device-based signature can be abused to violate privacy by tracking the user
device, and, as of today, users do not have any means to prevent such privacy
attacks other than turning off the device.
We propose RF-Veil, a radiometric fingerprinting solution that not only is
robust against impersonation attacks but also protects user privacy by
obfuscating the radiometric fingerprint of the transmitter for non-legitimate
receivers. Specifically, we introduce a randomized pattern of phase errors to
the transmitted signal such that only the intended receiver can extract the
original fingerprint of the transmitter. In a series of experiments and
analyses, we expose the vulnerability of adopting naive randomization to
statistical attacks and introduce countermeasures. Finally, we show the
efficacy of RF-Veil experimentally in protecting user privacy and enhancing
security. More importantly, our proposed solution allows communicating with
other devices, which do not employ RF-Veil.Comment: ACM Sigmetrics 2021 / In Proc. ACM Meas. Anal. Comput. Syst., Vol. 4,
3, Article 44 (December 2020
- âŠ