LDPC codes for physical layer security

  • Sonja R. Kuljanski Marić Serbian Armed Forces, General Staff, Department for Telecommunication and Informatics (Ј-6), Center for Applied Mathematics and Electronics, Belgrade, Republic of Serbia
Keywords: LDPC codes, Physical layer security, Wyner wiretap channel,

Abstract


Wireless communication is ubiquitous in today's society. Unfortunately, wireless transmission is by the nature of broadcasting suitable for eavesdropping. These links are usually secured by encryption protocols that rely on cryptographic algorithms whose security is based on complexity of calculation and inability to calculate in real time. The hypothesis in the field of information theory is that the eavesdropper has unlimited computer capabilities, and the use of common cryptographic protocols is uncertain. Instead, it is assumed that the legitimate recipient of the message has a better communication channel than the intrusion listening. Based on this physical advantage, it is possible to use random encoding schemes for the transmission of information at the physical level. These schemes function without the prior exchange of secret keys securely, so protection at this layer tends to significantly simplify key management in communication systems. At the end of the last and the beginning of this century, there was an idea that LDPC codes should be applied to protect data at the physical layer. In this paper, the Wyner model of the communication channel was used, and LDPC codes were constructed for the transmission of information through this channel. A comparison of the basic algorithm and its modification was made based on the following parameters: transmission of mutual information, bit-error rate and execution time. An algorithm for different sizes of LDPC codes was also performed based on the above parameters.

References

Baldi, M. 2014. QC-LDPC Code-Based Cryptography: Chapter Low-Density Parity-Check Codes. Springer, pp.5-23.

Gallager, R.G. 1962. Low-density parity-check codes. IRE Transactions on Information Theory, January, pp.21-28.

Ghen, L., & Gong, G. 2012. Communication System Security: Chapter Physical-Layer Security. CRC Press, pp.583-611.

Ozarow, L.H., & Wyner, A.D. 1984. Wire-tap channel II. AT&T Bell Laboratories Technical Journal, 63(10), pp.2135-2157. Available at: https://doi.org/10.1002/j.1538-7305.1984.tb00072.x.

Shannon, C.E. 1948. A mathematical theory of communication. The Bell System Technical Journal, 27(3), pp.379-423.

Shannon, C.E. 1949. Communication theory of secrecy systems. The Bell System Technical Journal, 28(4), pp.656-715.

Wyner, A.D. 1975. The wire-tap channel. The Bell Systems Technical Journal, 54(8), pp.1355-1387.

Published
2018/09/03
Section
Professional Papers