Using Perfect Codes in Relay Aided Networks: A Security Analysis
Title | Using Perfect Codes in Relay Aided Networks: A Security Analysis |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Demir, Mehmet özgÜn, Alp Topal, Ozan, Dartmann, Guido, Schmeink, Anke, Ascheid, Gerd, Kurt, GüneŞ, Pusane, Ali Emre |
Conference Name | 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) |
Date Published | Oct. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-3316-4 |
Keywords | communication environments, composability, cooperative communication, CPS, CPS modeling, cps security, cryptography, Cyber-physical systems, Decoding, decoding frame error rate, distinct requirements, error injection, error probability, error statistics, FEC codes., forward error correction, forward error correction schemes, Hamming codes, human lives, Metrics, nonnegotiable concept, passive eavesdropping attacks, perfect codes, PHY-layer security approaches, physical layer operations, proper security mechanism, pubcrawl, radio networks, Receivers, relay aided networks, Relays, reliability, reliable intermediate relays, resilience, Resiliency, security, security analysis, selected FEC scheme, simulations, system operations, wireless channels |
Abstract | Cyber-physical systems (CPS) are state-of-the-art communication environments that offer various applications with distinct requirements. However, security in CPS is a nonnegotiable concept, since without a proper security mechanism the applications of CPS may risk human lives, the privacy of individuals, and system operations. In this paper, we focus on PHY-layer security approaches in CPS to prevent passive eavesdropping attacks, and we propose an integration of physical layer operations to enhance security. Thanks to the McEliece cryptosystem, error injection is firstly applied to information bits, which are encoded with the forward error correction (FEC) schemes. Golay and Hamming codes are selected as FEC schemes to satisfy power and computational efficiency. Then obtained codewords are transmitted across reliable intermediate relays to the legitimate receiver. As a performance metric, the decoding frame error rate of the eavesdropper is analytically obtained for the fragmentary existence of significant noise between relays and Eve. The simulation results validate the analytical calculations, and the obtained results show that the number of low-quality channels and the selected FEC scheme affects the performance of the proposed model. |
URL | https://ieeexplore.ieee.org/document/8923137 |
DOI | 10.1109/WiMOB.2019.8923137 |
Citation Key | demir_using_2019 |
- Reliability
- passive eavesdropping attacks
- perfect codes
- PHY-layer security approaches
- physical layer operations
- proper security mechanism
- pubcrawl
- radio networks
- Receivers
- relay aided networks
- Relays
- nonnegotiable concept
- reliable intermediate relays
- resilience
- Resiliency
- security
- Security analysis
- selected FEC scheme
- simulations
- system operations
- wireless channels
- distinct requirements
- composability
- cooperative communication
- CPS
- CPS modeling
- CPS Security
- Cryptography
- cyber-physical systems
- Decoding
- decoding frame error rate
- communication environments
- error injection
- error probability
- error statistics
- FEC codes.
- forward error correction
- forward error correction schemes
- Hamming codes
- human lives
- Metrics