Application cases of secrecy coding in communication nodes and terminals

Application cases of secrecy coding in communication nodes and terminals

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Trusted Communications with Physical Layer Security for 5G and Beyond — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The objective of this chapter is to study practical coding techniques to provide security to wireless systems. First, the chapter will briefly introduce theoretical results relevant to low density parity check (LDPC) codes, polar codes and lattice coding for the wiretap channel. Then, it will propose practical secrecy-coding schemes able to provide a reliable and confidential wireless communication link betweenAlice and Bob. Finally, these practical wiretap codes are implemented in WiFi and long-term evolution (LTE) testbeds, and their confidentiality performance is evaluated using the bit-error rate (BER) as it is a simple and practical the metric for secrecy. The reader is referred to [1] for a throughout survey on recent advances related to the design of wiretap codes for information-theoretic metrics such as strong secrecy and semantic secrecy.

Chapter Contents:

  • 20.1 Introduction
  • 20.2 Theoretical aspects of secrecy coding
  • 20.2.1 Wiretap coding for discrete wiretap channels
  • LDPC codes for discrete wiretap channels
  • Polar codes for discrete wiretap channels
  • 20.2.2 Wiretap coding for Gaussian wiretap channels
  • Construction of polar lattices codes
  • Polar lattices for Gaussian wiretap channels
  • 20.2.3 Wiretap coding for MIMO and fading channels
  • 20.3 Integration of secrecy-coding techniques into existing radio access technologies
  • 20.3.1 Radio advantage establishment - case of MIMO transmission
  • Artificial noise and beamforming processing
  • AN and BF for initiating secrecy-coding schemes
  • Power of the jamming signal - case of colocated transmit antennas
  • Impact of the locations of antennas that transmit user and jamming signals
  • 20.3.2 Description of the practical secrecy-coding scheme
  • Construction of the outer code using polar codes
  • Construction of the outer code using Reed-Muller codes
  • Decoding algorithm for polar and Reed-Muller codes
  • Practical metrics for secrecy
  • Practical designed secrecy codes
  • 20.3.3 Performance analysis of designed secrecy codes
  • 20.3.4 Simulation results on LTE signals
  • Configuration of simulations
  • Simulation of transmitting and processing of the secret encoded LTE signals
  • Results of simulations under LTE carrier transmission mode TM7-discussion
  • 20.3.5 Experimental results on WiFi signals
  • Configuration of experiments
  • Transmission and processing of the secret encoded WiFi signals
  • Experimental results in line-of-sight geometry (LOS) - Discussion
  • 20.3.6 Tuning of the radio advantage for OFDM/QPSK wave forms such as WiFi and LTE signals - considerations on radio engineering
  • 20.4 Conclusion: security upgrades provided to future radio access technologies
  • References

Inspec keywords: parity check codes; wireless LAN; Long Term Evolution; channel coding; telecommunication network reliability

Other keywords: wiretap codes; low-density parity check codes; secrecy-coding schemes; BER; polar codes; semantic secrecy; wireless communication link reliability; confidential wireless communication link; lattice coding; long-term evolution; wiretap channel; LTE testbeds; wireless systems; communication nodes; WiFi; LDPC codes; bit-error rate; information-theoretic metrics

Subjects: Codes; Mobile radio systems; Reliability

Preview this chapter:
Zoom in

Application cases of secrecy coding in communication nodes and terminals, Page 1 of 2

| /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch20-1.gif /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch20-2.gif

Related content

This is a required field
Please enter a valid email address