Partial Unit Memory Coding and Physical Layer Security
نویسندگان
چکیده
Cryptography and coding techniques are combined to implement most of the secure communication system. In order to use coding technique, secure communication linked by the physical layer is designed with efficient coding, which provides less security gaps. In order to design such an efficient security in the physical layer, partial unit memory code (PUM) code, is investigated with few popular codes. For the completion of research, trellis encoding and decoding techniques are used throughout the simulations. Here, (8, 6, 4) PUM and (8, 4, 4) block codes are considered but (8, 6, 4) provide better security gap than other block code even though it has a higher rate. In this analysis, not only security gap is reduced for the maximum security but also it has the ability to increase the information rate within the same bandwidth. Using this (8, 6, 4) PUM encoder and decoder, information can be sent safely through the physical layer. There is a trade-off between complexity and security gap. It is obvious because it has higher information rate than other known block code.
منابع مشابه
Optimal SVD-based Precoding for Secret Key Extraction from Correlated OFDM Sub-Channels
Secret key extraction is a crucial issue in physical layer security and a less complex and, at the same time, a more robust scheme for the next generation of 5G and beyond. Unlike previous works on this topic, in which Orthogonal Frequency Division Multiplexing (OFDM) sub-channels were considered to be independent, the effect of correlation between sub-channels on the secret key rate is address...
متن کاملA Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security
Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper&rsqu...
متن کاملNetwork Coding and Wireless Physical-layer Secret-key Generation: From Unequal Erasure Protection (UEP) to Unequal Security Protection (USP)
The general abstraction of this thesis is the relationships between two seemingly unrelated topics, which are network coding and wireless physical-layer secret-key generation (WPSG). As build-ups to such relationships, some specific aspects of each topic are discussed in detail at first. To begin with, network coding issues of unequal erasure protection (UEP) and degree distribution distortion ...
متن کاملMultilevel modulated chaos MIMO transmission scheme with physical layer security
Ensuring security at the physical layer in wireless communications is important and effective because it can omit upper-layer secure protocols in ad hoc or multi-hop relay transmissions, or it can enhance security together with upper-layer protocols. To realize this system, we have proposed a chaos-based multiple-input multiple-output (MIMO) transmission scheme that enables both physical-layer ...
متن کاملEnhancing Security in the Memory Management Unit
We propose an hardware solution to several security problems that are difficult to solve on classical processor architectures, like licensing, electronic commerce, or software privacy. The memory management unit which provides multitasking and v irtual memory support is extended and given a third purpose: to supply strong hardware security support for the software layer. The principle of this e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014