LDPC codes for physical layer security
Abstract
Wireless communication is ubiquitous in today's society. Unfortunately, wireless transmission is by the nature of broadcasting suitable for eavesdropping. These links are usually secured by encryption protocols that rely on cryptographic algorithms whose security is based on complexity of calculation and inability to calculate in real time. The hypothesis in the field of information theory is that the eavesdropper has unlimited computer capabilities, and the use of common cryptographic protocols is uncertain. Instead, it is assumed that the legitimate recipient of the message has a better communication channel than the intrusion listening. Based on this physical advantage, it is possible to use random encoding schemes for the transmission of information at the physical level. These schemes function without the prior exchange of secret keys securely, so protection at this layer tends to significantly simplify key management in communication systems. At the end of the last and the beginning of this century, there was an idea that LDPC codes should be applied to protect data at the physical layer. In this paper, the Wyner model of the communication channel was used, and LDPC codes were constructed for the transmission of information through this channel. A comparison of the basic algorithm and its modification was made based on the following parameters: transmission of mutual information, bit-error rate and execution time. An algorithm for different sizes of LDPC codes was also performed based on the above parameters.
References
Baldi, M. 2014. QC-LDPC Code-Based Cryptography: Chapter Low-Density Parity-Check Codes. Springer, pp.5-23.
Gallager, R.G. 1962. Low-density parity-check codes. IRE Transactions on Information Theory, January, pp.21-28.
Ghen, L., & Gong, G. 2012. Communication System Security: Chapter Physical-Layer Security. CRC Press, pp.583-611.
Ozarow, L.H., & Wyner, A.D. 1984. Wire-tap channel II. AT&T Bell Laboratories Technical Journal, 63(10), pp.2135-2157. Available at: https://doi.org/10.1002/j.1538-7305.1984.tb00072.x.
Shannon, C.E. 1948. A mathematical theory of communication. The Bell System Technical Journal, 27(3), pp.379-423.
Shannon, C.E. 1949. Communication theory of secrecy systems. The Bell System Technical Journal, 28(4), pp.656-715.
Wyner, A.D. 1975. The wire-tap channel. The Bell Systems Technical Journal, 54(8), pp.1355-1387.
Proposed Creative Commons Copyright Notices
Proposed Policy for Military Technical Courier (Journals That Offer Open Access)
Authors who publish with this journal agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).