Title:
Coding techniques for multi-user physical layer security

dc.contributor.advisor Bloch, Matthieu R.
dc.contributor.author Pierrot, Alexandre Jean Louis J.
dc.contributor.committeeMember Weitnauer, Mary Ann
dc.contributor.committeeMember Feron, Eric
dc.contributor.committeeMember McLaughlin, Steven W.
dc.contributor.committeeMember Barry, John R.
dc.contributor.department Electrical and Computer Engineering
dc.date.accessioned 2015-09-21T14:23:08Z
dc.date.available 2015-09-21T14:23:08Z
dc.date.created 2015-08
dc.date.issued 2015-07-14
dc.date.submitted August 2015
dc.date.updated 2015-09-21T14:23:08Z
dc.description.abstract The fast development of wireless networks, which are intrinsically exposed to eavesdropping, has created a growing concern for confidentiality. While classical cryptographic schemes require a key provided by the end-user, physical-layer security leverages the randomness of the physical communication medium as a source of secrecy. The main benefit of physical-layer security techniques is their relatively low cost and their ability to combine with any existing security mechanisms. This dissertation provides an analysis including the theoretical study of the two-way wiretap channel to obtain a better insight into how to design coding mechanisms, practical tests with experimental systems, and the design of actual codes. From a theoretical standpoint, the study confirms the benefits of combining several multi-user coding techniques including cooperative jamming, coded cooperative jamming and secret key generation. For these different mechanisms, the trade-off between reliability, secrecy and communication rate is clarified under a stringent strong secrecy metric. Regarding the design of practical codes, spatially coupled LDPC codes, which were originally designed for reliability, are modified to develop a coded cooperative jamming code. Finally, a proof-of-principle practical wireless system is provided to show how to implement a secret key generation system on experimental programmable radios. This testbed is then used to assess the realistic performance of such systems in terms of reliability, secrecy and rate.
dc.description.degree Ph.D.
dc.format.mimetype application/pdf
dc.identifier.uri http://hdl.handle.net/1853/53836
dc.language.iso en_US
dc.publisher Georgia Institute of Technology
dc.subject Physical layer security
dc.subject Cooperative jamming
dc.subject Secret key generation
dc.subject Resolvability
dc.subject Strong secrecy
dc.subject Two-way wiretap channel
dc.subject Multi-user security
dc.title Coding techniques for multi-user physical layer security
dc.type Text
dc.type.genre Dissertation
dspace.entity.type Publication
local.contributor.advisor Bloch, Matthieu R.
local.contributor.corporatename School of Electrical and Computer Engineering
local.contributor.corporatename College of Engineering
relation.isAdvisorOfPublication d929b8f6-f25d-4a74-8ba6-cf69760b7c61
relation.isOrgUnitOfPublication 5b7adef2-447c-4270-b9fc-846bd76f80f2
relation.isOrgUnitOfPublication 7c022d60-21d5-497c-b552-95e489a06569
thesis.degree.level Doctoral
Files
Original bundle
Now showing 1 - 1 of 1
Thumbnail Image
Name:
PIERROT-DISSERTATION-2015.pdf
Size:
13.68 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 4 of 4
No Thumbnail Available
Name:
LICENSE_3.txt
Size:
3.88 KB
Format:
Plain Text
Description:
No Thumbnail Available
Name:
LICENSE_2.txt
Size:
3.88 KB
Format:
Plain Text
Description:
No Thumbnail Available
Name:
LICENSE_1.txt
Size:
3.88 KB
Format:
Plain Text
Description:
No Thumbnail Available
Name:
LICENSE.txt
Size:
3.88 KB
Format:
Plain Text
Description: