Application cases of secrecy coding in communication nodes and terminals

Christiane Kameni Ngassa, Cong Ling, François Delaveau, Sandrine Boumard, Nir Shapira, Ling Liu, Renaud Molière, Adrian Kotelba, Jani Suomalainen

    Research output: Chapter in Book/Report/Conference proceedingChapter or book articleProfessional

    Abstract

    The objective of this chapter is to study practical coding techniques to provide security to wireless systems. First, the chapter will briefly introduce theoretical results relevant to low density parity check (LDPC) codes, polar codes and lattice coding for the wiretap channel. Then, it will propose practical secrecy-coding schemes able to provide a reliable and confidential wireless communication link betweenAlice and Bob. Finally, these practical wiretap codes are implemented in WiFi and long-term evolution (LTE) testbeds, and their confidentiality performance is evaluated using the bit-error rate (BER) as it is a simple and practical the metric for secrecy. The reader is referred to [1] for a throughout survey on recent advances related to the design of wiretap codes for information-theoretic metrics such as strong secrecy and semantic secrecy.
    Original languageEnglish
    Title of host publicationTrusted Communications with Physical Layer Security for 5G and Beyond
    PublisherInstitution of Engineering and Technology IET
    Pages501-531
    ISBN (Print)9781785612367
    DOIs
    Publication statusPublished - 2017
    MoE publication typeD2 Article in professional manuals or guides or professional information systems or text book material

    Keywords

    • fading channels
    • cellular radio
    • OFDM modulation
    • telecommunication security
    • cognitive radio
    • space division multiplexing
    • 5G mobile communication
    • MIMO communication
    • relay networks

    Fingerprint Dive into the research topics of 'Application cases of secrecy coding in communication nodes and terminals'. Together they form a unique fingerprint.

  • Cite this

    Kameni Ngassa, C., Ling, C., Delaveau, F., Boumard, S., Shapira, N., Liu, L., Molière, R., Kotelba, A., & Suomalainen, J. (2017). Application cases of secrecy coding in communication nodes and terminals. In Trusted Communications with Physical Layer Security for 5G and Beyond (pp. 501-531). Institution of Engineering and Technology IET. https://doi.org/10.1049/PBTE076E_ch20