Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Physical Layer Coding and Cryptanalysis for the Secure Communications

  • Conference paper
  • First Online:
New Trends in Computer Technologies and Applications (ICS 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1723))

Included in the following conference series:

  • 745 Accesses

Abstract

The privacy and security are highly requested in the cooperative communication system. The information is sent to the destination with the help of relays. In the system, there might be the eavesdroppers playing the role of the relay. It suffers the system security. Traditionally, the complex and difficult encryption scheme would be applied to a higher network layer. It is not suitable to apply to the equipment with low computing resources. According to Shannon Theory, positive secrecy capacity could support secure communications. In this work, based on the information theorem, the secrecy capacity analysis in the communication is given. Consider the difference between the amount of information at the source and that at the transmitter, the positive secrecy capacity with memory coding scheme under the lossless communication environment might be obtained. Then, the communication security could be implemented with the physical coding scheme. In this work, the physical layer coding schemes are examined. According to the degree of the freedom of the codeword, the secure communication could be achieved. It could be found the secrecy capacity could increase with coding rate decreasing with the multiple code assignments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Li, L., Zhou, X., Xu, H., Li, G.Y., Wang, D., Soong, A.: Simplified relay selection and power allocation in cooperative cognitive radio systems. IEEE Trans. Wireless Commun. 10(1), 33–36 (2011)

    Article  Google Scholar 

  2. Harrison, W.K., Almeida, J., McLaughlin, S.W., Barros, J.: Coding for cryptographic security enhancement using stopping sets. IEEE Trans. Inf. Forens. Security 6(3), 575–584 (2011)

    Article  Google Scholar 

  3. Chou, Y., Zhu, J., Wang, X., Leung, V.C.: Improving physical-layer security in wireless communications using diversity techniques. IEEE Network 29(1), 42–48 (2015)

    Article  Google Scholar 

  4. Wang, Y., Noubir, G.: Distributed cooperation and diversity for hybrid wireless networks. IEEE Trans. Mob. Comput. 12(3), 596–608 (2013)

    Article  Google Scholar 

  5. Chen, J.S., Yang, C.-.Y., Hwang, M.S.: The capacity analysis in the secure cooperative communication system. Int. J. Netw. Secur. 19(6), 863–869 (2017)

    Google Scholar 

  6. Shiu, Y.S., Chang, S.Y., Wu, H.C., Huang, S.C.H., Chen, H.H.: Physical layer security in wireless networks: a tutorial. IEEE Wirel. Commun. 18(2), 66–74 (2011)

    Article  Google Scholar 

  7. Ozarow, L.H., Wyner, A.D.: Wire-tap channel II. Bell Syst. Tech. J. 63(10), 2135–2157 (1984)

    MATH  Google Scholar 

  8. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)

    Article  MATH  Google Scholar 

  9. Kim, K.J., et al.: Low-density parity-check codes for ATSC 3.9. IEEE Trans. Broadcasting 62(1), 189–196 (2016)

    Google Scholar 

  10. Nair, J.V.: A study of secrecy codes and their real-world performance, Master thesis, University of Colorado at Colorado (2017)

    Google Scholar 

  11. Bloch, M., Barros, J.: Physical-Layer Security from Information Theory to Security Engineering, Cambridge (2011)

    Google Scholar 

  12. Yang, C.-Y., Yao, J.F., Yen, C.E., Hwang, M.-S.: Overview on physical layer security in low earth orbit (LEO) satellite system. In: Proceedings of 2021 IEEE ICCE-TW, pp. 1–2 (2021)

    Google Scholar 

Download references

Acknowledgement

This work was supported by the Ministry of Science and Technology, Taiwan, under grants MOST 110-2221-E-845-002- and MOST 111-2221-E-845-003-.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ming-Hsiang Hwang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, CY., Lin, CB., Yao, JF.J.F., Hwang, MH. (2022). Physical Layer Coding and Cryptanalysis for the Secure Communications. In: Hsieh, SY., Hung, LJ., Klasing, R., Lee, CW., Peng, SL. (eds) New Trends in Computer Technologies and Applications. ICS 2022. Communications in Computer and Information Science, vol 1723. Springer, Singapore. https://doi.org/10.1007/978-981-19-9582-8_51

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-9582-8_51

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-9581-1

  • Online ISBN: 978-981-19-9582-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics