4.6 Article

Encoding Individual Source Sequences for the Wiretap Channel

Journal

ENTROPY
Volume 23, Issue 12, Pages -

Publisher

MDPI
DOI: 10.3390/e23121694

Keywords

wiretap channel; physical layer security; semantic security; individual sequence; finite-state machine; Lempel-Ziv algorithm; side information

Ask authors/readers for more resources

In this study, we address the problem of encoding a deterministic source sequence for the degraded wiretap channel using finite-state machines as encoder and decoder. A necessary condition for reliable and secure transmission is presented, along with a lower bound on the smallest achievable bandwidth expansion factor. The bound is achievable through Lempel-Ziv compression and good channel coding, and a lower bound on the minimum necessary rate of purely random bits needed for security is also derived.
We consider the problem of encoding a deterministic source sequence (i.e., individual sequence) for the degraded wiretap channel by means of an encoder and decoder that can both be implemented as finite-state machines. Our first main result is a necessary condition for both reliable and secure transmission in terms of the given source sequence, the bandwidth expansion factor, the secrecy capacity, the number of states of the encoder and the number of states of the decoder. Equivalently, this necessary condition can be presented as a converse bound (i.e., a lower bound) on the smallest achievable bandwidth expansion factor. The bound is asymptotically achievable by Lempel-Ziv compression followed by good channel coding for the wiretap channel. Given that the lower bound is saturated, we also derive a lower bound on the minimum necessary rate of purely random bits needed for local randomness at the encoder in order to meet the security constraint. This bound too is achieved by the same achievability scheme. Finally, we extend the main results to the case where the legitimate decoder has access to a side information sequence, which is another individual sequence that may be related to the source sequence, and a noisy version of the side information sequence leaks to the wiretapper.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available