Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
139 tokens/sec
GPT-4o
47 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Non-Systematic Codes for Physical Layer Security (1004.4520v1)

Published 26 Apr 2010 in cs.IT and math.IT

Abstract: This paper is a first study on the topic of achieving physical layer security by exploiting non-systematic channel codes. The chance of implementing transmission security at the physical layer is known since many years in information theory, but it is now gaining an increasing interest due to its many possible applications. It has been shown that channel coding techniques can be effectively exploited for designing physical layer security schemes, able to ensure that an unauthorized receiver, experiencing a channel different from that of the the authorized receiver, is not able to gather any information. Recently, it has been proposed to exploit puncturing techniques in order to reduce the security gap between the authorized and unauthorized channels. In this paper, we show that the same target can also be achieved by using non-systematic codes, able to scramble information bits within the transmitted codeword.

Citations (67)

Summary

We haven't generated a summary for this paper yet.