104 research outputs found

    Increasing Physical Layer Security through Scrambled Codes and ARQ

    Full text link
    We develop the proposal of non-systematic channel codes on the AWGN wire-tap channel. Such coding technique, based on scrambling, achieves high transmission security with a small degradation of the eavesdropper's channel with respect to the legitimate receiver's channel. In this paper, we show that, by implementing scrambling and descrambling on blocks of concatenated frames, rather than on single frames, the channel degradation needed is further reduced. The usage of concatenated scrambling allows to achieve security also when both receivers experience the same channel quality. However, in this case, the introduction of an ARQ protocol with authentication is needed.Comment: 5 pages, 4 figures; Proc. IEEE ICC 2011, Kyoto, Japan, 5-9 June 201

    Coding with Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis

    Full text link
    This study examines the use of nonsystematic channel codes to obtain secure transmissions over the additive white Gaussian noise (AWGN) wire-tap channel. Unlike the previous approaches, we propose to implement nonsystematic coded transmission by scrambling the information bits, and characterize the bit error rate of scrambled transmissions through theoretical arguments and numerical simulations. We have focused on some examples of Bose-Chaudhuri-Hocquenghem (BCH) and low-density parity-check (LDPC) codes to estimate the security gap, which we have used as a measure of physical layer security, in addition to the bit error rate. Based on a number of numerical examples, we found that such a transmission technique can outperform alternative solutions. In fact, when an eavesdropper (Eve) has a worse channel than the authorized user (Bob), the security gap required to reach a given level of security is very small. The amount of degradation of Eve's channel with respect to Bob's that is needed to achieve sufficient security can be further reduced by implementing scrambling and descrambling operations on blocks of frames, rather than on single frames. While Eve's channel has a quality equal to or better than that of Bob's channel, we have shown that the use of a hybrid automatic repeat-request (HARQ) protocol with authentication still allows achieving a sufficient level of security. Finally, the secrecy performance of some practical schemes has also been measured in terms of the equivocation rate about the message at the eavesdropper and compared with that of ideal codes.Comment: 29 pages, 10 figure

    A Physical Layer Secured Key Distribution Technique for IEEE 802.11g Wireless Networks

    Full text link
    Key distribution and renewing in wireless local area networks is a crucial issue to guarantee that unauthorized users are prevented from accessing the network. In this paper, we propose a technique for allowing an automatic bootstrap and periodic renewing of the network key by exploiting physical layer security principles, that is, the inherent differences among transmission channels. The proposed technique is based on scrambling of groups of consecutive packets and does not need the use of an initial authentication nor automatic repeat request protocols. We present a modification of the scrambling circuits included in the IEEE 802.11g standard which allows for a suitable error propagation at the unauthorized receiver, thus achieving physical layer security.Comment: 9 pages, 7 figures. Accepted for publication in IEEE Wireless Communications Letters. Copyright transferred to IEE

    LDPC coded transmissions over the Gaussian broadcast channel with confidential messages

    Full text link
    We design and assess some practical low-density parity-check (LDPC) coded transmission schemes for the Gaussian broadcast channel with confidential messages (BCC). This channel model is different from the classical wiretap channel model as the unauthorized receiver (Eve) must be able to decode some part of the information. Hence, the reliability and security targets are different from those of the wiretap channel. In order to design and assess practical coding schemes, we use the error rate as a metric of the performance achieved by the authorized receiver (Bob) and the unauthorized receiver (Eve). We study the system feasibility, and show that two different levels of protection against noise are required on the public and the secret messages. This can be achieved in two ways: i) by using LDPC codes with unequal error protection (UEP) of the transmitted information bits or ii) by using two classical non-UEP LDPC codes with different rates. We compare these two approaches and show that, for the considered examples, the solution exploiting UEP LDPC codes is more efficient than that using non-UEP LDPC codes.Comment: 5 pages, 5 figures, to be presented at IEEE ICT 201

    Low-power Secret-key Agreement over OFDM

    Get PDF
    Information-theoretic secret-key agreement is perhaps the most practically feasible mechanism that provides unconditional security at the physical layer to date. In this paper, we consider the problem of secret-key agreement by sharing randomness at low power over an orthogonal frequency division multiplexing (OFDM) link, in the presence of an eavesdropper. The low power assumption greatly simplifies the design of the randomness sharing scheme, even in a fading channel scenario. We assess the performance of the proposed system in terms of secrecy key rate and show that a practical approach to key sharing is obtained by using low-density parity check (LDPC) codes for information reconciliation. Numerical results confirm the merits of the proposed approach as a feasible and practical solution. Moreover, the outage formulation allows to implement secret-key agreement even when only statistical knowledge of the eavesdropper channel is available.Comment: 9 pages, 4 figures; this is the authors prepared version of the paper with the same name accepted for HotWiSec 2013, the Second ACM Workshop on Hot Topics on Wireless Network Security and Privacy, Budapest, Hungary 17-19 April 201

    Practical LDPC coded modulation schemes for the fading broadcast channel with confidential messages

    Full text link
    The broadcast channel with confidential messages is a well studied scenario from the theoretical standpoint, but there is still lack of practical schemes able to achieve some fixed level of reliability and security over such a channel. In this paper, we consider a quasi-static fading channel in which both public and private messages must be sent from the transmitter to the receivers, and we aim at designing suitable coding and modulation schemes to achieve such a target. For this purpose, we adopt the error rate as a metric, by considering that reliability (security) is achieved when a sufficiently low (high) error rate is experienced at the receiving side. We show that some conditions exist on the system feasibility, and that some outage probability must be tolerated to cope with the fading nature of the channel. The proposed solution exploits low-density parity-check codes with unequal error protection, which are able to guarantee two different levels of protection against noise for the public and the private information, in conjunction with different modulation schemes for the public and the private message bits.Comment: 6 pages, 4 figures, to be presented at IEEE ICC'14 - Workshop on Wireless Physical Layer Securit

    Models of Control Channels in the LTE System

    Get PDF
    DizertačnĂ­ prĂĄce se zabĂœvĂĄ zpracovĂĄnĂ­m signĂĄlu fyzickĂœch ƙídicĂ­ch kanĂĄlĆŻ systĂ©mu LTE a vyĆĄetƙovĂĄnĂ­m bitovĂ© chybovosti pƙi pƙenosu ƙídicĂ­ informace z vysĂ­lače do pƙijĂ­mače v zĂĄvislosti na podmĂ­nkĂĄch pƙíjmu. PrĂĄce je rozdělena do dvou hlavnĂ­ch částĂ­. PrvnĂ­ část prĂĄce je zaměƙena na simulaci pƙenosu ƙídicĂ­ informace LTE v zĂĄkladnĂ­m pĂĄsmu. Jsou zde prezentovĂĄny vytvoƙenĂ© simulĂĄtory ƙídicĂ­ch kanĂĄlĆŻ ve směru uplink i downlink. Simulace jsou provedeny pro vĆĄechny druhy nastavenĂ­ systĂ©mu a zĂĄkladnĂ­ modely pƙenosovĂ©ho prostƙedĂ­. Jsou zde popsĂĄny vĂœsledky vlivu pouĆŸitĂ­ MIMO technologiĂ­ na kvalitu pƙíjmu ƙídicĂ­ informace pƙedevĆĄĂ­m v ĂșnikovĂœch kanĂĄlech. DruhĂĄ část prĂĄce je zaměƙena na moĆŸnost nasazenĂ­ systĂ©mu LTE ve sdĂ­lenĂ©m pĂĄsmu ISM (2.4 GHz). Jsou zde pƙedstaveny zĂĄkladnĂ­ koncepce pouĆŸitĂ­, na jejichĆŸ zĂĄkladě je vytvoƙen scĂ©náƙ simulacĂ­. Kapitola dĂĄle popisuje tvorbu simulĂĄtoru koexistence LTE a systĂ©mu Wi-Fi v pƙenesenĂ©m pĂĄsmu ISM 2.4GHz. Jsou zde uvedeny vĂœsledky simulacĂ­ koexistence LTE a ruĆĄivĂ©ho systĂ©mu Wi-Fi provedenĂœch dle vytvoƙenĂ©ho scĂ©náƙe. VĂœsledky simulacĂ­ koexistence LTE a Wi-Fi jsou ověƙeny měƙenĂ­m v laboratornĂ­ch podmĂ­nkĂĄch. Toto porovnĂĄnĂ­ je dĆŻleĆŸitĂ© z hlediska optimalizace simulĂĄtoru koexistence. Dle vĂœsledkĆŻ obou typĆŻ simulacĂ­ a měƙenĂ­ jsou stanovena provoznĂ­ doporučenĂ­, kterĂĄ majĂ­ pƙispět k bezpečnĂ©mu a spolehlivĂ©mu vysĂ­lĂĄnĂ­ a pƙíjmu ƙídicĂ­ch informacĂ­ LTE i pƙi nepƙíznivĂœch podmĂ­nkĂĄch pƙíjmu.The doctoral thesis is focused on a signal processing in the LTE physical control channels and performance analysis of control information transmission according to receiving conditions. The thesis is divided into two parts. The first part deals with simulation of the transmission of control information in baseband. The created simulators for uplink and downlink are presented. The simulations are performed for all possible system settings and various channel models. The MIMO influence on a quality of control information reception under fading channels is also presented. The second part of the thesis is focused on LTE utilization in shared channel ISM (2.4 GHz). The basic LTE application concept for ISM band is presented. This concept is fundamental to created simulation scenario. The chapter also presents the LTE and Wi-Fi coexistence simulator in 2.4 GHz ISM passband. The coexistence simulation are presented according to simulation scenario and the results are shown. The simulated coexistence analysis results are verified in laboratory environment. The comparison of the simulated and the measured coexistence analysis results is crucial for further optimization of the coexistence simulator. Recommendations for optimal and reliable operation of LTE are specified according to the simulated and the measured results. Recommendations should be useful to the reliable transmission of LTE control information in bad receiving conditions.
    • 

    corecore