LDPC codes for physical layer security
Journal Title: Vojnotehnički glasnik - Year 2018, Vol 66, Issue 4
Abstract
Wireless communication is ubiquitous in today's society. Unfortunately, wireless transmission is by the nature of broadcasting suitable for eavesdropping. These links are usually secured by encryption protocols that rely on cryptographic algorithms whose security is based on complexity of calculation and inability to calculate in real time. The hypothesis in the field of information theory is that the eavesdropper has unlimited computer capabilities, and the use of common cryptographic protocols is uncertain. Instead, it is assumed that the legitimate recipient of the message has a better communication channel than the intrusion listening. Based on this physical advantage, it is possible to use random encoding schemes for the transmission of information at the physical level. These schemes function without the prior exchange of secret keys securely, so protection at this layer tends to significantly simplify key management in communication systems. At the end of the last and the beginning of this century, there was an idea that LDPC codes should be applied to protect data at the physical layer. In this paper, the Wyner model of the communication channel was used, and LDPC codes were constructed for the transmission of information through this channel. A comparison of the basic algorithm and its modification was made based on the following parameters: transmission of mutual information, bit-error rate and execution time. An algorithm for different sizes of LDPC codes was also performed based on the above parameters.
Authors and Affiliations
Sonja Kuljanski Marić
LDPC codes for physical layer security
Wireless communication is ubiquitous in today's society. Unfortunately, wireless transmission is by the nature of broadcasting suitable for eavesdropping. These links are usually secured by encryption protocols that rely...
Realization of a TCP Syn Flood Attack using Kali Linux
Denial-of-Service (DoS) is a type of attack that attempts to prevent legitimate users from accessing network services. This is accomplished by overloading network services or by excessive connectivity, causing a drop in...
A note on the Meir-Keeler theorem in the context of b-metric spaces
In this note we consider the famous Meir-Keeler's theorem in the context of b-metric spaces. Our result generalizes, improves, compliments, unifies and enriches several known ones in the existing literature. Also, our pr...
Mechanical properties and microstructures of bio-inert layers of chrome oxide coatings deposited by the APS process
Plasma spray Cr2O3 ceramic layers are used as a separate coating or as a supplement to bio-reactive organic composite ceramics Ca10(PO4)6(OH)2-Al2O3-ZrO2-Cr2O3 and other bio-inert ceramics in composites of the types Al2O...
Serious games in military applications
Serious games as one of the most important trends in e-learning are presented in this paper. An intensive use of information and communication technologies has led to major changes in traditional military education. One...