Physical-layer security: practical aspects of channel coding and cryptography
نویسنده
چکیده
ACKNOWLEDGEMENTS Let me start at the beginning and thank my parents. They provided a glorious childhood for me and my siblings in a small town in northern Utah. They are extremely diligent and humble, and they raised their family to appreciate traditional Christian values. No matter where my career leads, if I can only duplicate their success with their children, then I will have no regrets. Thank you Mom and Dad. Next, I want to say thank you to my Ph. Steve hired me into his group at a time when most faculty probably wouldn't have been willing to take on new students. So Steve, thank you for letting me join the group, for guiding me in my research, for opening up the world to me, for teaching me to write, for letting me teach your class on occasion, and for involving me with Whisper Communications. I will always be grateful for the many diverse experiences that made up my Ph.D., and you were the driving force behind nearly all of them. Also, a very sincere thank you to the members of my Ph.D. dissertation committee: I appreciate the time you spent serving on my committee and the guidance you provided one-on-one to me. In that same vein, I should thank the other faculty at you João for helping me discover a meaningful problem and publish it within three months. Thank you also for picking me, my family, and our eight suitcases up from the airport, for helping us find a place to live, for taking us to the beach, for feeding us pancakes, and for entertaining us with your family symphony. iv During the last two years of my Ph.D., I started working with some of the best people I know in a very cool start-up company called Whisper Communications. Thank you Steve, Jeff, Cenk, and Demijan. I learned a lot from each one of you, and will always call you my friends. Gerhard. Thanks for reading my bills for me and telling me how to pay them (Fausto), helping me find contact solution (also Fausto), taking me to Bola em Jogo for futebol, teaching me about Portugal, and, of course, solving research problems with me. Although I appear to be the last of the McLaughlins for now, I still assert that our research group was very active and productive. Some of my best friends from my years at …
منابع مشابه
An efficient secure channel coding scheme based on polar codes
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...
متن کاملOptimal SVD-based Precoding for Secret Key Extraction from Correlated OFDM Sub-Channels
Secret key extraction is a crucial issue in physical layer security and a less complex and, at the same time, a more robust scheme for the next generation of 5G and beyond. Unlike previous works on this topic, in which Orthogonal Frequency Division Multiplexing (OFDM) sub-channels were considered to be independent, the effect of correlation between sub-channels on the secret key rate is address...
متن کاملNetwork Coding and Wireless Physical-layer Secret-key Generation: From Unequal Erasure Protection (UEP) to Unequal Security Protection (USP)
The general abstraction of this thesis is the relationships between two seemingly unrelated topics, which are network coding and wireless physical-layer secret-key generation (WPSG). As build-ups to such relationships, some specific aspects of each topic are discussed in detail at first. To begin with, network coding issues of unequal erasure protection (UEP) and degree distribution distortion ...
متن کاملPhysical Layer Security for RF Satellite Channels in the Finite-length Regime
Secure communications is becoming increasingly relevant in the development of space technology. Well established cryptographic technology is already in place and is expected to continue to be so. On the other hand, information theoretical security emerges as a post-quantum versatile candidate to complement overall security strength. In order to prove such potential, performance analysis methods...
متن کاملAnalysis of Short Blocklength Codes for Secrecy
In this paper we provide secrecy metrics applicable to physical-layer coding techniques with finite blocklengths over Gaussian and fading wiretap channel models. Our metrics go beyond some of the known practical secrecy measures, such as bit error rate and security gap, so as to make lower bound probabilistic guarantees on error rates over short blocklengths both preceding and following a secre...
متن کاملA Chaos MIMO Transmission Scheme for Channel Coding and Physical-Layer Security
In recent wireless communication systems, security is ensured mainly in the upper-layer techniques such as a password or a cryptography processing. However, security needs not be restricted to the upperlayer and the addition of physical-layer security also would yield a much more robust system. Therefore, in this paper, we exploit chaos communication and propose a chaos multiple-input multiple-...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012