Skip to main content

Low Complex System for Physical Layer Security Using NLFG and QCLDPC Code

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 467))

Abstract

In practical communication applications, the channels for intended users and eavesdroppers are not error-free and Wyner’s wiretap channel model deals with the scenario. Using this model, the security of a stand-alone stream cipher can be strengthened by exploiting the properties of physical layer. In this paper, a joint channel coding and light weight cryptography for setting a Gaussian wiretap channel is proposed. The scheme is based on a keyed Quasi Cyclic Low Density Parity Check (QCLDPC) encoder and light weight stream cipher based on Linear Feedback Shift Register (LFSR). The significant contribution is that, highly complex non-linear function that provides security in a Non-Linear Filter Generator (NLFG) is replaced by a simple non-linear function without compromising security. Enhanced security with lesser complexity is achieved by embedding security in channel encoder. Results show that attacker cannot extract the secret key because of the errors introduced in the physical layer due to unknown structure of the channel encoder.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fan, X., Mandal, K., Gong, G.: WG-8: A Light-Weight Stream Cipher for Resource-Constrained Smart Devices. In: Singh, K., Awasthi, A.K. (eds.) QShine 2013. LNICST, vol. 115, pp. 617–632. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  2. Dichtl, M.: On nonlinear filter generators. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 103–106. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  3. Teo, S.-G., Simpson, L.R., Dawson, E.: Bias in the nonlinear filter generator output sequence. International Journal of Cryptology Research 2, 27–37 (2010)

    Google Scholar 

  4. Thangaraj, A., Dihidar, S., Calderbank, A.R., McLaughlin, S.W., Merolla, J.M.: Applications of LDPC codes to the wiretap channel. IEEE Transactions on Information Theory 53, 2933–2945 (2007)

    Article  MathSciNet  Google Scholar 

  5. Wong, C.W., Wong, T.F., Shea, J.M.: LDPC code design for the BPSK-constrained Gaussian wiretap channel. In: IEEE GLOBECOM Workshop (2011)

    Google Scholar 

  6. Harrison, W.K., Mclaughlin, S.W.: Physical-layer security: Combining error control coding and cryptography. In: Proc. IEEE Int. Conf. Communications, Dresden, Germany, pp. 1–5 (2009)

    Google Scholar 

  7. Harrison, W., Almeida, J., Bloch, M., McLaughlin, S., Barros, J.: Coding for secrecy: An overview of error-control coding techniques for physical-layer security. IEEE Signal Processing Magazine 30(5), 41–50 (2013)

    Article  Google Scholar 

  8. Klinc, D., Ha, J., McLaughlin, S.W., Barros, J., Kwak, B.J.: LDPC codes for the Gaussian wiretap channel. IEEE Transactions on Information Forensics and Security 6, 532–540 (2011)

    Article  Google Scholar 

  9. Baldi, M., Bianchi, M., Chiaraluce, F.: Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: A security gap analysis. IEEE Transactions on Information Forensics and Security 7, 883–894 (2012)

    Article  Google Scholar 

  10. Zhou, L., Wu, D., Zheng, B., Guizani, M.: Joint physical-application layer security for wireless multimedia delivery. IEEE Communications Magazine 52(3), 66–72 (2014)

    Article  Google Scholar 

  11. Tanner, R.M., Sridhara, D., Sridharan, A., Fuja, T.E., Costello Jr., D.J.: LDPC block and convolutional codes based on circulant matrices. IEEE Transactions on Information Theory 50, 2966–2984 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  12. Fossorier, M.P.: Quasicyclic low-density parity-check codes from circulant permutation matrices. IEEE Transactions on Information Theory 50, 1788–1793 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  13. Costello, D., Lin, S.: Error Control Coding. Pearson Higher Education (2011)

    Google Scholar 

  14. Li, Z., Chen, L., Zeng, L., Lin, S., Fong, W.H.: Efficient encoding of quasi-cyclic low-density parity-check codes. IEEE Transactions on Communications 54, 71–81 (2006)

    Article  Google Scholar 

  15. Biasi, F.P., Barreto, P.S., Misoczki, R., Ruggiero, W.V.: Scaling efficient code-based cryptosystems for embedded platforms. Journal of Cryptographic Engineering 4(2), 123–134 (2014)

    Article  Google Scholar 

  16. Fossorier, M.P., Mihaljevic, M., Imai, H.: Reduced complexity iterative decoding of low-density parity check codes based on belief propagation. IEEE Transactions on Communications 47, 673–680 (1999)

    Article  Google Scholar 

  17. Chen, J., Dholakia, A., Eleftheriou, E., Fossorier, M.P., Hu, X.Y.: Reduced-complexity decoding of LDPC codes. IEEE Transactions on Communications 53, 1288–1299 (2005)

    Article  Google Scholar 

  18. Peters, C.: Information-set decoding for linear codes over F q . In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol. 6061, pp. 81–94. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  19. Meier, W., Staffelbach, O.: Fast correlation attacks on certain stream ciphers. Journal of Cryptology 1, 159–176 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  20. Jonsson, F., Johansson, T.: A fast correlation attack on LILI-128. Information Processing Letter 81, 127–132 (2002)

    Article  MathSciNet  Google Scholar 

  21. Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press (1996)

    Google Scholar 

  22. Chepyzhov, V.V., Johansson, T., Smeets, B.: A simple algorithm for fast correlation attacks on stream ciphers. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 181–195. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Stuart, C.M., Deepthi, P.P. (2014). Low Complex System for Physical Layer Security Using NLFG and QCLDPC Code. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds) Security in Computing and Communications. SSCC 2014. Communications in Computer and Information Science, vol 467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44966-0_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-44966-0_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-44965-3

  • Online ISBN: 978-3-662-44966-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics