skip to main content
10.1145/2810103.2813702acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice

Published: 12 October 2015 Publication History

Abstract

Physical layer (PHY) security has aroused great research interest in recent years, exploiting physical uncertainty of wireless channels to provide communication secrecy without placing any computational restrictions on the adversaries under the information-theoretic security model. Particularly, researches have been focused on investigating Wyner's Wiretap Channel for constructing practical wiretap codes that can achieve simultaneous transmission secrecy and reliability. While theoretically sound, PHY security through the wiretap channel has never been realized in practice, and the feasibility and physical limitations of implementing such channels in the real world are yet to be well understood. In this paper, we design and implement a practical opportunistic secret communication system over the wireless wiretap channel for the first time to our best knowledge. We show that, our system can achieve nearly perfect secrecy given a fixed codeword length by carefully controlling the structure of the parity-check matrix of wiretap codes to strike the proper balance between the transmission rate and secrecy. Our system is implemented and evaluated extensively on a USRP N210-based testbed. The experimental results demonstrate the physical limitations and the feasibility of building practical wiretap channels in both the worst channel case and the case where the sender has only the knowledge of instantaneous channel capacities. Our system design and implementation successfully attempts towards bridging the gap between the theoretical wiretap channel and its practice, alleviating the unrealistic and strong assumptions imposed by the theoretical model.

References

[1]
Bergmans, P. Random coding theorem for broadcast channels with degraded components. IEEE Transactions on Information Theory 19, 2 (1973), 197--207.
[2]
Bloch, M., and Barros, J. Physical-layer security: from information theory to security engineering. Cambridge University Press, 2011.
[3]
Chou, T.-H., Draper, S. C., and Sayeed, A. M. Key generation using external source excitation: Capacity, reliability, and secrecy exponent. IEEE Transactions on Information Theory 58, 4 (2012), 2455--2474.
[4]
Cover, T. M. Comments on broadcast channels. IEEE Transactions on information theory 44, 6 (1998), 2524--2530.
[5]
Gallager, R. G. Low-density parity-check codes. IEEE Transactions on Information Theory 8, 1 (1962), 21--28.
[6]
Gungor, O., Tan, J., Koksal, C. E., El-Gamal, H., and Shroff, N. B. Secrecy outage capacity of fading channels. IEEE Transactions on Information Theory 59, 9 (2013), 5379--5397.
[7]
Kanukurthi, B., and Reyzin, L. Key agreement from close secrets over unsecured channels. In Proc. of EUROCRYPT'09 (2009), pp. 206--223.
[8]
Khalil, K., Koyluoglu, O. O., Gamal, H. E., and Youssef, M. Opportunistic secrecy with a strict delay constraint. IEEE Transactions on Communications 61, 11 (2013), 4700--4709.
[9]
Leung-Yan-Cheong, S., and Hellman, M. E. The gaussian wire-tap channel. IEEE Transactions on Information Theory 24, 4 (1978), 451--456.
[10]
Ling, C., Luzzi, L., Belfiore, J., and Stehlé, D. Semantically secure lattice codes for the gaussian wiretap channel. IEEE Transactions on Information Theory 60, 10 (2012), 6399--6416.
[11]
Mahdavifar, H., and Vardy, A. Achieving the secrecy capacity of wiretap channels using polar codes. IEEE Transactions on Information Theory 57, 10 (2011), 6428--6443.
[12]
Mao, Z., Koksal, C. E., and Shroff, N. B. Achieving full secrecy rate with low packet delays: An optimal control approach. IEEE Journal on Selected Areas in Communications 31, 9 (2013), 1944--1956.
[13]
Mathur, S., Trappe, W., Mandayam, N., Ye, C., and Reznik, A. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proc. of MobiCom'08 (2008), ACM, pp. 128--139.
[14]
Meister, B., and Oettli, W. On the capacity of a discrete, constant channel. Information and Control 11, 3 (1967), 341--351.
[15]
Pan, B., Kemao, Q., Huang, L., and Asundi, A. Phase error analysis and compensation for nonsinusoidal waveforms in phase-shifting digital fringe projection profilometry. Optics Letters 34, 4 (2009), 416--418.
[16]
Patwari, N., Croft, J., Jana, S., and Kasera, S. K. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Computing 9, 1 (2010), 17--30.
[17]
Seidel, S. Y., and Rappaport, T. S. 914 mhz path loss prediction models for indoor wireless communications in multifloored buildings. IEEE Transactions on Antennas and Propagation 40, 2 (1992), 207--217.
[18]
Sharon, E., Litsyn, S., and Goldberger, J. An efficient message-passing schedule for ldpc decoding. In Proc. of IEEE Convention of Electrical and Electronics Engineers (2004), IEEE, pp. 223--226.
[19]
Thangaraj, A., Dihidar, S., Calderbank, A. R., McLaughlin, S. W., and Merolla, J.-M. Applications of ldpc codes to the wiretap channel. IEEE Transactions on Information Theory 53, 8 (2007), 2933--2945.
[20]
Wyner, A. D. The wire-tap channel. The Bell System Technical Journal 54, 8 (1975), 1355--1387.

Cited By

View all
  • (2024)Covert Communication With Acoustic NoiseIEEE/ACM Transactions on Networking10.1109/TNET.2023.328669232:1(207-221)Online publication date: Feb-2024
  • (2022)Furtively Connecting IoT Devices with Acoustic Noise2022 21st ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)10.1109/IPSN54338.2022.00023(195-207)Online publication date: May-2022
  • (2018)Stash in a flashProceedings of the 16th USENIX Conference on File and Storage Technologies10.5555/3189759.3189775(169-185)Online publication date: 12-Feb-2018
  • Show More Cited By

Index Terms

  1. Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
    October 2015
    1750 pages
    ISBN:9781450338325
    DOI:10.1145/2810103
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 October 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. channel capacity
    2. low-density parity check code
    3. physical layer security
    4. wiretap channel

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CCS'15
    Sponsor:

    Acceptance Rates

    CCS '15 Paper Acceptance Rate 128 of 660 submissions, 19%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)17
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 03 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Covert Communication With Acoustic NoiseIEEE/ACM Transactions on Networking10.1109/TNET.2023.328669232:1(207-221)Online publication date: Feb-2024
    • (2022)Furtively Connecting IoT Devices with Acoustic Noise2022 21st ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)10.1109/IPSN54338.2022.00023(195-207)Online publication date: May-2022
    • (2018)Stash in a flashProceedings of the 16th USENIX Conference on File and Storage Technologies10.5555/3189759.3189775(169-185)Online publication date: 12-Feb-2018
    • (2018)Secret Key Establishment via RSS Trajectory Matching Between Wearable DevicesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2017.276802013:3(802-817)Online publication date: Mar-2018
    • (2018)Jamming Strategies for Physical Layer SecurityIEEE Wireless Communications10.1109/MWC.2017.170001525:1(148-153)Online publication date: 1-Feb-2018
    • (2016)A Novel Active Warden Technique for Image Steganography2016 IEEE Global Communications Conference (GLOBECOM)10.1109/GLOCOM.2016.7841524(1-6)Online publication date: 4-Dec-2016

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media