Table of Contents
ISRN Communications and Networking
Volume 2011 (2011), Article ID 502987, 9 pages
http://dx.doi.org/10.5402/2011/502987
Research Article

Joint Scheme for Physical Layer Error Correction and Security

Department of Electrical Engineering, University of North Texas, Denton, TX 76207, USA

Received 31 August 2010; Accepted 21 September 2010

Academic Editors: M.-S. Hwang, C. Pomalaza-Ráez, Y. M. Tseng, and A. Vaccaro

Copyright © 2011 Oluwayomi Adamo and M. R. Varanasi. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

We present a joint scheme that combines both error correction and security at the physical layer. In conventional communication systems, error correction is carried out at the physical layer while data security is performed at an upper layer. As a result, these steps are done as separate steps. However there has been a lot of interest in providing security at the physical layer. As a result, as opposed to the conventional system, we present a scheme that combines error correction and data security as one unit so that both encryption and encoding could be carried out at the physical layer. Hence, in this paper, we present an Error Correction-Based Cipher (ECBC) that combines error correction and encryption/decryption in a single step. Encrypting and encoding or decoding and decrypting in a single step will lead to a faster and more efficient implementation. One of the challenges of using previous joint schemes in a communications channel is that there is a tradeoff between data reliability and security. However, in ECBC, there is no tradeoff between reliability and security. Errors introduced at the transmitter for randomization are removed at the receiver. Hence ECBC can utilize its full capacity to correct channel errors. We show the result of randomization test on ECBC and its security against conventional attacks. We also present the nonpipelined and pipelined hardware architecture of ECBC, and the result of the FPGA implementation of the ECBC encryption. We also compare these results with non-ECBC schemes.