Visible to the public Security Analysis of Forward Error Correction Codes in Relay Aided Networks

TitleSecurity Analysis of Forward Error Correction Codes in Relay Aided Networks
Publication TypeConference Paper
Year of Publication2018
AuthorsDemir, Mehmet özgÜn, Kurty, GÜne Karabulut, Dartmannz, Guido, Ascheidx, Gerd, Pusane, Ali Emre
Conference Name2018 Global Information Infrastructure and Networking Symposium (GIIS)
Date Publishedoct
KeywordsChannel models, composability, cryptographic methods, cryptography, cyber physical systems, data confidentiality, decentralized relay nodes, Decoding, eavesdropper, encoding, energy efficiency requirements, Error control codes, error correction codes, error probability, error statistics, FEC coding schemes, forward error correction, forward error correction codes, Golay codes, industrial wireless sensor networks, IWSN setups, iwsns, McEliece cryptosystem., Metrics, network coding, nonfunctional requirements, physical layer security, physical layer security scheme, physical layer security techniques, Predictive Metrics, pubcrawl, random error vector, Receivers, relay aided network security, relay aided networks, Relays, reliability, Resiliency, secure communication, security, security level, security performance, transmission, transmitted information, Wireless sensor networks

Network security and data confidentiality of transmitted information are among the non-functional requirements of industrial wireless sensor networks (IWSNs) in addition to latency, reliability and energy efficiency requirements. Physical layer security techniques are promising solutions to assist cryptographic methods in the presence of an eavesdropper in IWSN setups. In this paper, we propose a physical layer security scheme, which is based on both insertion of an random error vector to forward error correction (FEC) codewords and transmission over decentralized relay nodes. Reed-Solomon and Golay codes are selected as FEC coding schemes and the security performance of the proposed model is evaluated with the aid of decoding error probability of an eavesdropper. The results show that security level is highly based on the location of the eavesdropper and secure communication can be achieved when some of channels between eavesdropper and relay nodes are significantly noisier.

Citation Keydemir_security_2018