Skip to main content

Showing 1–11 of 11 results for author: Harrison, W K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.03449  [pdf, other

    cs.IT cs.CR eess.SP

    Feasibility of short blocklength Reed-Muller codes for physical layer security in real environment

    Authors: Md Munibun Billah, Tyler Sweat, Willie K. Harrison

    Abstract: In this paper, we investigate the application of Reed-Muller (RM) codes for Physical-layer security in a real world wiretap channel scenario. Utilizing software-defined radios (SDRs) in a real indoor environment, we implement a coset coding scheme that leverages the hierarchical structure of RM codes to secure data transmission. The generator matrix of the RM code is used to partition codewords in… ▽ More

    Submitted 9 January, 2025; v1 submitted 6 January, 2025; originally announced January 2025.

    Comments: 10 pages, 10 figures

  2. arXiv:2412.05249  [pdf, other

    cs.IT eess.SP

    An Information Theoretic Analysis of Ghost Modulation

    Authors: Daniel Harman, Ashton Palacios, Philip Lundrigan, Willie K. Harrison

    Abstract: Side channels have become an essential component of many modern information-theoretic schemes. The emerging field of cross technology communications (CTC) provides practical methods for creating intentional side channels between existing communications technologies. This paper describes a theoretical foundation for one such, recently proposed, CTC scheme: Ghost Modulation (GM). Designed to modulat… ▽ More

    Submitted 6 December, 2024; originally announced December 2024.

    Comments: 7 Pages, 5 Figures

  3. arXiv:2405.15935  [pdf, other

    cs.IT

    Optimizing Secrecy Codes Using Gradient Descent

    Authors: David Hunn, Willie K. Harrison

    Abstract: Recent theoretical developments in coset coding theory have provided continuous-valued functions which give the equivocation and maximum likelihood (ML) decoding probability of coset secrecy codes. In this work, we develop a method for incorporating these functions, along with a complex set of constraints, into a gradient descent optimization algorithm. This algorithm employs a movement cost funct… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

    Comments: 25 pages, 23 figures. Submitted to Transactions on Information Theory

  4. arXiv:2401.07141  [pdf, other

    cs.IT

    Secrecy Coding for the Binary Symmetric Wiretap Channel via Linear Programming

    Authors: Ali Nikkhah, Morteza Shoushtari, Bahareh Akhbari, Willie K. Harrison

    Abstract: In this paper, we use a linear programming (LP) optimization approach to evaluate the equivocation for a wiretap channel where the main channel is noiseless, and the wiretap channel is a binary symmetric channel (BSC). Using this technique, we present an analytical limit for the achievable secrecy rate in the finite blocklength regime that is tighter than traditional fundamental limits. We also pr… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

    Comments: Submitted for possible Journal publication

  5. arXiv:1811.06591  [pdf, other

    cs.CR

    Physical-Layer Security: Does it Work in a Real Environment?

    Authors: Benjamin Jensen, Bradford Clark, Dakota Flanary, Kalin Norman, Michael Rice, Willie K. Harrison

    Abstract: This paper applies channel sounding measurements to enable physical-layer security coding. The channel measurements were acquired in an indoor environment and used to assess the secrecy capacity as a function of physical location. A variety of Reed-Muller wiretap codes were applied to the channel measurements to determine the most effective code for the environment. The results suggest that deploy… ▽ More

    Submitted 15 November, 2018; originally announced November 2018.

    Comments: 7 pages, 7 figures

  6. arXiv:1701.05484  [pdf, other

    cs.IT

    Quantifying Equivocation for Finite Blocklength Wiretap Codes

    Authors: Jack Pfister, Marco A. C. Gomes, Joao P. Vilela, Willie K. Harrison

    Abstract: This paper presents a new technique for providing the analysis and comparison of wiretap codes in the small blocklength regime over the binary erasure wiretap channel. A major result is the development of Monte Carlo strategies for quantifying a code's equivocation, which mirrors techniques used to analyze normal error correcting codes. For this paper, we limit our analysis to coset-based wiretap… ▽ More

    Submitted 19 January, 2017; originally announced January 2017.

    Comments: Submitted to ICC 2017

  7. arXiv:1509.07092  [pdf, other

    cs.CR cs.IT

    Analysis of Short Blocklength Codes for Secrecy

    Authors: Willie K. Harrison, Dinis Sarmento, João P. Vilela, Marco Gomes

    Abstract: In this paper we provide secrecy metrics applicable to physical-layer coding techniques with finite blocklengths over Gaussian and fading wiretap channel models. Our metrics go beyond some of the known practical secrecy measures, such as bit error rate and security gap, so as to make lower bound probabilistic guarantees on error rates over short blocklengths both preceding and following a secrecy… ▽ More

    Submitted 23 September, 2015; originally announced September 2015.

    Comments: 10 pages, 9 figures

  8. Physical-Layer Security over Correlated Erasure Channels

    Authors: W. K. Harrison, J. Almeida, S. W. McLaughlin, J. Barros

    Abstract: We explore the additional security obtained by noise at the physical layer in a wiretap channel model setting. Security enhancements at the physical layer have been proposed recently using a secrecy metric based on the degrees of freedom that an attacker has with respect to the sent ciphertext. Prior work focused on cases in which the wiretap channel could be modeled as statistically independent p… ▽ More

    Submitted 17 February, 2011; originally announced February 2011.

    Comments: 5 pages, 4 figures, submitted to ISIT 2011

  9. Coding for Cryptographic Security Enhancement using Stopping Sets

    Authors: W. K. Harrison, J. Almeida, S. W. McLaughlin, J. Barros

    Abstract: In this paper we discuss the ability of channel codes to enhance cryptographic secrecy. Toward that end, we present the secrecy metric of degrees of freedom in an attacker's knowledge of the cryptogram, which is similar to equivocation. Using this notion of secrecy, we show how a specific practical channel coding system can be used to hide information about the ciphertext, thus increasing the diff… ▽ More

    Submitted 15 February, 2011; originally announced February 2011.

    Comments: 13 pages, 8 figures

  10. Tandem Coding and Cryptography on Wiretap Channels: EXIT Chart Analysis

    Authors: Willie K Harrison, Steven W. McLaughlin

    Abstract: Traditional cryptography assumes an eavesdropper receives an error-free copy of the transmitted ciphertext. Wyner's wiretap channel model recognizes that at the physical layer both the intended receiver and the passive eavesdropper inevitably receive an error-prone version of the transmitted message which must be corrected prior to decryption. This paper considers the implications of using both… ▽ More

    Submitted 4 May, 2009; originally announced May 2009.

    Comments: 11 pages, 5 figures, accepted at 2009 IEEE International Symposium on Information Theory (ISIT 2009)

  11. Physical-Layer Security: Combining Error Control Coding and Cryptography

    Authors: Willie K Harrison, Steven W. McLaughlin

    Abstract: In this paper we consider tandem error control coding and cryptography in the setting of the {\em wiretap channel} due to Wyner. In a typical communications system a cryptographic application is run at a layer above the physical layer and assumes the channel is error free. However, in any real application the channels for friendly users and passive eavesdroppers are not error free and Wyner's wi… ▽ More

    Submitted 16 April, 2009; v1 submitted 2 January, 2009; originally announced January 2009.

    Comments: 12 pages, 5 figures. Submitted and accepted to the International Conference on Communications (ICC) 2009. v2: equivalent to the version that will be published in the conference proceedings. Has some altered notation from version 1 as well as slight changes in the wording to make the paper more readable and easier to understand

    ACM Class: H.1.1; K.6.5