Title
Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice
Abstract
Physical layer (PHY) security has aroused great research interest in recent years, exploiting physical uncertainty of wireless channels to provide communication secrecy without placing any computational restrictions on the adversaries under the information-theoretic security model. Particularly, researches have been focused on investigating Wyner's Wiretap Channel for constructing practical wiretap codes that can achieve simultaneous transmission secrecy and reliability. While theoretically sound, PHY security through the wiretap channel has never been realized in practice, and the feasibility and physical limitations of implementing such channels in the real world are yet to be well understood. In this paper, we design and implement a practical opportunistic secret communication system over the wireless wiretap channel for the first time to our best knowledge. We show that, our system can achieve nearly perfect secrecy given a fixed codeword length by carefully controlling the structure of the parity-check matrix of wiretap codes to strike the proper balance between the transmission rate and secrecy. Our system is implemented and evaluated extensively on a USRP N210-based testbed. The experimental results demonstrate the physical limitations and the feasibility of building practical wiretap channels in both the worst channel case and the case where the sender has only the knowledge of instantaneous channel capacities. Our system design and implementation successfully attempts towards bridging the gap between the theoretical wiretap channel and its practice, alleviating the unrealistic and strong assumptions imposed by the theoretical model.
Year
DOI
Venue
2015
10.1145/2810103.2813702
ACM Conference on Computer and Communications Security
Keywords
Field
DocType
Wiretap channel, physical layer security, channel capacity, low-density parity check code
Computer security,Computer science,Secrecy,Communication channel,Communications system,Communication source,Physical layer,Information-theoretic security,Channel capacity,Computer security model
Conference
Citations 
PageRank 
References 
1
0.35
15
Authors
7
Name
Order
Citations
PageRank
Qian Wang13091152.46
Kui Ren27927355.27
Guan-Cheng Li3142.19
Chenbo Xia410.35
Xiaobing Chen510.35
Zhibo Wang678679.49
Qin Zou7438.58