Security Analysis of Forward Error Correction Codes in Relay Aided Networks
Title | Security Analysis of Forward Error Correction Codes in Relay Aided Networks |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Demir, Mehmet özgÜn, Kurty, GÜne Karabulut, Dartmannz, Guido, Ascheidx, Gerd, Pusane, Ali Emre |
Conference Name | 2018 Global Information Infrastructure and Networking Symposium (GIIS) |
Date Published | oct |
Keywords | Channel models, composability, cryptographic methods, cryptography, cyber physical systems, data confidentiality, decentralized relay nodes, Decoding, eavesdropper, encoding, energy efficiency requirements, Error control codes, error correction codes, error probability, error statistics, FEC coding schemes, forward error correction, forward error correction codes, Golay codes, industrial wireless sensor networks, IWSN setups, iwsns, McEliece cryptosystem., Metrics, network coding, nonfunctional requirements, physical layer security, physical layer security scheme, physical layer security techniques, Predictive Metrics, pubcrawl, random error vector, Receivers, relay aided network security, relay aided networks, Relays, reliability, Resiliency, secure communication, security, security level, security performance, transmission, transmitted information, Wireless sensor networks |
Abstract | Network security and data confidentiality of transmitted information are among the non-functional requirements of industrial wireless sensor networks (IWSNs) in addition to latency, reliability and energy efficiency requirements. Physical layer security techniques are promising solutions to assist cryptographic methods in the presence of an eavesdropper in IWSN setups. In this paper, we propose a physical layer security scheme, which is based on both insertion of an random error vector to forward error correction (FEC) codewords and transmission over decentralized relay nodes. Reed-Solomon and Golay codes are selected as FEC coding schemes and the security performance of the proposed model is evaluated with the aid of decoding error probability of an eavesdropper. The results show that security level is highly based on the location of the eavesdropper and secure communication can be achieved when some of channels between eavesdropper and relay nodes are significantly noisier. |
DOI | 10.1109/GIIS.2018.8635659 |
Citation Key | demir_security_2018 |
- relay aided networks
- Metrics
- network coding
- nonfunctional requirements
- physical layer security
- physical layer security scheme
- physical layer security techniques
- Predictive Metrics
- pubcrawl
- random error vector
- Receivers
- relay aided network security
- McEliece cryptosystem.
- Relays
- Reliability
- Resiliency
- secure communication
- security
- security level
- security performance
- transmission
- transmitted information
- wireless sensor networks
- Error control codes
- composability
- cryptographic methods
- Cryptography
- cyber physical systems
- data confidentiality
- decentralized relay nodes
- Decoding
- eavesdropper
- encoding
- energy efficiency requirements
- Channel models
- error correction codes
- error probability
- error statistics
- FEC coding schemes
- forward error correction
- forward error correction codes
- Golay codes
- industrial wireless sensor networks
- IWSN setups
- iwsns