On dual relationships of secrecy codes

WK Harrison, MR Bloch - 2018 56th Annual Allerton …, 2018 - ieeexplore.ieee.org
We investigate properties of finite blocklength codes and their duals when used for coset
coding over the binary erasure wiretap channel (BEWC). We identify sufficient conditions …

Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper

G Anjos, D Castanheira, A Silva, A Gameiro… - IEEE …, 2018 - ieeexplore.ieee.org
The purpose of this paper is to advance the current state of physical layer security through
the design and analysis of a discrete jamming scheme that exploits the reciprocal …

Generating a binary symmetric channel for wiretap codes

WK Harrison, T Fernandes… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we fill a void between information theoretic security and practical coding over
the Gaussian wiretap channel using a three-stage encoder/decoder technique. Security is …

Attributes of generators for best finite blocklength coset wiretap codes over erasure channels

WK Harrison, MR Bloch - 2019 IEEE International Symposium …, 2019 - ieeexplore.ieee.org
The optimization of wiretap codes at finite block-length remains to date a challenging
endeavor. We show that the equivocation ensured by coset coding over a binary erasure …

Brokered communication protocol using information theoretic coding for security

S Wakid - US Patent 10,547,632, 2020 - Google Patents
(57) ABSTRACT A network device receives an enrollment request from a first device to
enroll in a brokered communication protocol for communicating with at least one second …

SDR Proof-of-Concept of Full-Duplex Jamming for Enhanced Physical Layer Security

A Silva, M Gomes, JP Vilela, WK Harrison - Sensors, 2021 - mdpi.com
In order to secure wireless communications, we consider the usage of physical-layer
security (PLS) mechanisms (ie, coding for secrecy mechanisms) combined with self …

Testbed implementation and evaluation of interleaved and scrambled coding for physical-layer security

C Martins, T Fernandes, M Gomes… - 2018 IEEE 87th …, 2018 - ieeexplore.ieee.org
This paper presents a testbed implementation and evaluation of coding for secrecy schemes
in a real environment through software defined radio platforms. These coding schemes rely …

Physical-layer security: Does it work in a real environment?

B Jensen, B Clark, D Flanary, K Norman… - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
This paper applies channel sounding measurements to enable physical-layer security
coding. The channel measurements were acquired in an indoor environment and used to …

Implications of coding layers on physical-layer security: A secrecy benefit approach

WK Harrison, E Beard, S Dye, E Holmes, K Nelson… - Entropy, 2019 - mdpi.com
In this work, we consider the pros and cons of using various layers of keyless coding to
achieve secure and reliable communication over the Gaussian wiretap channel. We define a …

SDR Testbed of Full-Duplex Jamming for Secrecy

A Silva, MAC Gomes, JP Vilela… - 2020 12th International …, 2020 - ieeexplore.ieee.org
In order to secure wireless communications, we consider the usage of physical-layer
security (PLS) mechanisms (ie coding for secrecy mechanisms) combined with self …