Title:
Coding techniques for multi-user physical layer security
Coding techniques for multi-user physical layer security
dc.contributor.advisor | Bloch, Matthieu R. | |
dc.contributor.author | Pierrot, Alexandre Jean Louis J. | |
dc.contributor.committeeMember | Weitnauer, Mary Ann | |
dc.contributor.committeeMember | Feron, Eric | |
dc.contributor.committeeMember | McLaughlin, Steven W. | |
dc.contributor.committeeMember | Barry, John R. | |
dc.contributor.department | Electrical and Computer Engineering | |
dc.date.accessioned | 2015-09-21T14:23:08Z | |
dc.date.available | 2015-09-21T14:23:08Z | |
dc.date.created | 2015-08 | |
dc.date.issued | 2015-07-14 | |
dc.date.submitted | August 2015 | |
dc.date.updated | 2015-09-21T14:23:08Z | |
dc.description.abstract | The fast development of wireless networks, which are intrinsically exposed to eavesdropping, has created a growing concern for confidentiality. While classical cryptographic schemes require a key provided by the end-user, physical-layer security leverages the randomness of the physical communication medium as a source of secrecy. The main benefit of physical-layer security techniques is their relatively low cost and their ability to combine with any existing security mechanisms. This dissertation provides an analysis including the theoretical study of the two-way wiretap channel to obtain a better insight into how to design coding mechanisms, practical tests with experimental systems, and the design of actual codes. From a theoretical standpoint, the study confirms the benefits of combining several multi-user coding techniques including cooperative jamming, coded cooperative jamming and secret key generation. For these different mechanisms, the trade-off between reliability, secrecy and communication rate is clarified under a stringent strong secrecy metric. Regarding the design of practical codes, spatially coupled LDPC codes, which were originally designed for reliability, are modified to develop a coded cooperative jamming code. Finally, a proof-of-principle practical wireless system is provided to show how to implement a secret key generation system on experimental programmable radios. This testbed is then used to assess the realistic performance of such systems in terms of reliability, secrecy and rate. | |
dc.description.degree | Ph.D. | |
dc.format.mimetype | application/pdf | |
dc.identifier.uri | http://hdl.handle.net/1853/53836 | |
dc.language.iso | en_US | |
dc.publisher | Georgia Institute of Technology | |
dc.subject | Physical layer security | |
dc.subject | Cooperative jamming | |
dc.subject | Secret key generation | |
dc.subject | Resolvability | |
dc.subject | Strong secrecy | |
dc.subject | Two-way wiretap channel | |
dc.subject | Multi-user security | |
dc.title | Coding techniques for multi-user physical layer security | |
dc.type | Text | |
dc.type.genre | Dissertation | |
dspace.entity.type | Publication | |
local.contributor.advisor | Bloch, Matthieu R. | |
local.contributor.corporatename | School of Electrical and Computer Engineering | |
local.contributor.corporatename | College of Engineering | |
relation.isAdvisorOfPublication | d929b8f6-f25d-4a74-8ba6-cf69760b7c61 | |
relation.isOrgUnitOfPublication | 5b7adef2-447c-4270-b9fc-846bd76f80f2 | |
relation.isOrgUnitOfPublication | 7c022d60-21d5-497c-b552-95e489a06569 | |
thesis.degree.level | Doctoral |
Files
Original bundle
1 - 1 of 1
- Name:
- PIERROT-DISSERTATION-2015.pdf
- Size:
- 13.68 MB
- Format:
- Adobe Portable Document Format
- Description:
License bundle
1 - 4 of 4