Table of Contents
ISRN Communications and Networking
Volume 2011, Article ID 502987, 9 pages
Research Article

Joint Scheme for Physical Layer Error Correction and Security

Department of Electrical Engineering, University of North Texas, Denton, TX 76207, USA

Received 31 August 2010; Accepted 21 September 2010

Academic Editors: M.-S. Hwang, C. Pomalaza-Ráez, Y. M. Tseng, and A. Vaccaro

Copyright © 2011 Oluwayomi Adamo and M. R. Varanasi. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. D. Wyner, “The wire-tap channel,” Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1387, 1975. View at Google Scholar · View at Scopus
  2. M. Healy, T. Newe, and E. Lewis, “Analysis of hardware encryption versus software encryption on wireless sensor network motes,” in Smart Sensors and Sensing Technology, vol. 20 of Lecture Notes in Electrical Engineering, pp. 3–14, Springer, 2008.
  3. A. Zúquete and J. Barros, “Physical-layer encryption with stream ciphers,” in Proceedings of IEEE International Symposium on Information Theory (ISIT '08), pp. 106–110, July 2008. View at Publisher · View at Google Scholar
  4. A. Ahmad, A. Biri, and H. Afifi, “Study of a new physical layer encryption concept,” in Proceedings of the 5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (MASS '08), pp. 860–865, October 2008. View at Publisher · View at Google Scholar
  5. C. N. Mathur, A mathematical framework for combining error correctionand encryption, Ph.D. dissertation, Stevens Institute of Technology, Hoboken, NJ, USA, 2007.
  6. T. Pionteck, T. Staake, T. Stiefmeier, L. D. Kabulepa, and M. Glesner, “Design of a reconfigurable AES encryption/decryption engine for mobile terminals,” in Proceedings of IEEE International Symposium on Circuits and Systems, vol. 2, pp. 545–548, May 2004.
  7. T. Hwang and T. R. N. Rao, “Secret error-correcting codes (secc),” in Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology, pp. 540–563, 1988.
  8. R. J. Mceliece, “A public-key cryptosystem based on algebraic codingtheory,” Tech. Rep., DSN Progress Rep., Jet Propulsion Laboratory, Pasadena, Calif, USA, 1978. View at Google Scholar
  9. T. R. N. Rao and K. Nam, “Private-key algebraic-code encryptions,” IEEE Transactions on Information Theory, vol. 35, no. 4, pp. 829–833, 1989. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. T. R. N. Rao, “Joint encryption and error correction schemes,” in Proceedings of the 11th Annual International Symposium on Computer Architecture, pp. 240–241, 1984.
  11. C. N. Mathur, K. Narayan, and K. P. Subbalakshmi, “On the design of error-correcting ciphers,” EURASIP Journal on Wireless Communications and Networking, vol. 2006, Article ID 42871, 12 pages, 2006. View at Publisher · View at Google Scholar
  12. J. Daemen and V. Rijmen, The Design of Rijndael: AES—The Advanced Encryption Standard, Springler, Berlin, Germany, 2002.
  13. C. H. Meyer and S. M. Matyas, Cryptography: A New Dimension inComputer Data Security, John Wiley & Sons, New York, NY, USA, 1982.
  14. R. Struik and J. van Tilburg, “The rao-nam scheme is insecure against a chosen-plaintext attack,” in Proceedings of the 7th Annual International Cryptology Conference on Advances in Cryptology, pp. 445–457, 1987.
  15. Q. Su and Y. Xiao, “Design of LDPC-based error correcting cipher,” in Proceedings of the 2nd IET International Conference on Wireless, Mobile and Multimedia Networks (ICWMMN '08), pp. 470–474, October 2008.
  16. P. L'ecuyer and R. Simard, “TestU01: a C library for empirical testing of random number generators,” ACM Transactions on Mathematical Software, vol. 33, no. 4, Article ID 1268777, 2007. View at Publisher · View at Google Scholar