Feasibility of short blocklength Reed-Muller codes for physical layer security in real environment
- URL: http://arxiv.org/abs/2501.03449v2
- Date: Thu, 09 Jan 2025 17:51:32 GMT
- Title: Feasibility of short blocklength Reed-Muller codes for physical layer security in real environment
- Authors: Md Munibun Billah, Tyler Sweat, Willie K. Harrison,
- Abstract summary: We investigate the application of Reed-Muller (RM) codes for Physical-layer security in a real world wiretap channel scenario.
We implement a coset coding scheme that leverages the hierarchical structure of RM codes to secure data transmission.
Experimental results indicate that RM codes can achieve robust security even in practical environments affected by real-world channel impairments.
- Score: 0.4260312058817663
- License:
- Abstract: In this paper, we investigate the application of Reed-Muller (RM) codes for Physical-layer security in a real world wiretap channel scenario. Utilizing software-defined radios (SDRs) in a real indoor environment, we implement a coset coding scheme that leverages the hierarchical structure of RM codes to secure data transmission. The generator matrix of the RM code is used to partition codewords into cosets in the usual way, where each message corresponds to a unique coset, and auxiliary bits select specific codewords within each coset. This approach enables the legitimate receiver (Bob) can decode the transmitted message with minimal information leakage to eavesdropper (Eve) thus protecting the confidentiality of the communication with the help of coset structure. Mutual information neural estimation (MINE) is used to quantify information leakage and validate the effectiveness of the scheme. Experimental results indicate that RM codes can achieve robust security even in practical environments affected by real-world channel impairments. These findings demonstrate the potential of RM codes as an efficient solution for physical-layer security, particularly for applications that require low latency and short blocklengths.
Related papers
- Application of $α$-order Information Metrics for Secure Communication in Quantum Physical Layer Design [45.41082277680607]
We study the $alpha$-order information-theoretic metrics based on R'enyi entropy.
We apply our framework to a practical scenario involving BPSK modulation over a lossy bosonic channel.
arXiv Detail & Related papers (2025-02-07T03:44:11Z) - Cryptanalysis via Machine Learning Based Information Theoretic Metrics [58.96805474751668]
We propose two novel applications of machine learning (ML) algorithms to perform cryptanalysis on any cryptosystem.
These algorithms can be readily applied in an audit setting to evaluate the robustness of a cryptosystem.
We show that our classification model correctly identifies the encryption schemes that are not IND-CPA secure, such as DES, RSA, and AES ECB, with high accuracy.
arXiv Detail & Related papers (2025-01-25T04:53:36Z) - HexaCoder: Secure Code Generation via Oracle-Guided Synthetic Training Data [60.75578581719921]
Large language models (LLMs) have shown great potential for automatic code generation.
Recent studies highlight that many LLM-generated code contains serious security vulnerabilities.
We introduce HexaCoder, a novel approach to enhance the ability of LLMs to generate secure codes.
arXiv Detail & Related papers (2024-09-10T12:01:43Z) - Physical Layer Deception with Non-Orthogonal Multiplexing [52.11755709248891]
We propose a novel framework of physical layer deception (PLD) to actively counteract wiretapping attempts.
PLD combines PLS with deception technologies to actively counteract wiretapping attempts.
We prove the validity of the PLD framework with in-depth analyses and demonstrate its superiority over conventional PLS approaches.
arXiv Detail & Related papers (2024-06-30T16:17:39Z) - CodeAttack: Revealing Safety Generalization Challenges of Large Language Models via Code Completion [117.178835165855]
This paper introduces CodeAttack, a framework that transforms natural language inputs into code inputs.
Our studies reveal a new and universal safety vulnerability of these models against code input.
We find that a larger distribution gap between CodeAttack and natural language leads to weaker safety generalization.
arXiv Detail & Related papers (2024-03-12T17:55:38Z) - Grain-128PLE: Generic Physical-Layer Encryption for IoT Networks [6.515605001492591]
Grain-128PLE is a lightweight physical layer encryption scheme that is derived from the Grain-128AEAD v2 stream cipher.
The design of Grain-128PLE maintains the structure of the main building blocks of the original Grain-128AEAD v2 stream cipher.
arXiv Detail & Related papers (2023-09-27T10:48:52Z) - Rateless Autoencoder Codes: Trading off Decoding Delay and Reliability [90.17852645780945]
This paper proposes a novel rateless autoencoder (AE)-based code design suitable for decoding the transmitted message before the noisy codeword is fully received.
The proposed rateless AEs significantly outperform the conventional AE designs for scenarios where it is desirable to trade off reliability for lower decoding delay.
arXiv Detail & Related papers (2023-01-28T15:47:14Z) - Programmable Optical Data Transmission Through Multimode Fibres Enabling
Confidentiality by Physical Layer Security [6.760806336950416]
Complex light transportation phenomena of multimode fibres can be exploited for information-theoretically secure data transmission.
Physical layer security is not crackable by quantum computers as it does not rely on mathematical complexity.
We harness effects that have long been considered limiting and have restricted the widespread use of multimode fibres.
arXiv Detail & Related papers (2022-03-01T10:28:27Z) - Safe RAN control: A Symbolic Reinforcement Learning Approach [62.997667081978825]
We present a Symbolic Reinforcement Learning (SRL) based architecture for safety control of Radio Access Network (RAN) applications.
We provide a purely automated procedure in which a user can specify high-level logical safety specifications for a given cellular network topology.
We introduce a user interface (UI) developed to help a user set intent specifications to the system, and inspect the difference in agent proposed actions.
arXiv Detail & Related papers (2021-06-03T16:45:40Z) - Secret Key Agreement with Physical Unclonable Functions: An Optimality
Summary [29.438154152702758]
A physical unclonable function (PUF) is a promising solution for local security in digital devices.
Low-complexity signal processing methods are discussed to make the information-theoretic analysis tractable.
Proposed optimal code constructions that jointly design the vector quantizer and error-correction code parameters are listed.
arXiv Detail & Related papers (2020-12-16T13:21:20Z) - Learning End-to-End Codes for the BPSK-constrained Gaussian Wiretap
Channel [1.9036571490366496]
The goal is to find codes which allow a pair of transmitter and receiver to communicate reliably and securely in the presence of an adversary.
The security is evaluated in terms of mutual information utilizing a deep learning tool called MINE.
Numerical results demonstrate that the legitimate parties can indeed establish a secure transmission in this setting.
arXiv Detail & Related papers (2020-03-23T23:26:36Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.