论文标题
物理层不安全感
Physical layer insecurity
论文作者
论文摘要
在经典的窃听模型中,爱丽丝希望与鲍勃(Bob)可靠地通信,而不会被埃夫(Eve)偷听,后者正在窃取降级的频道。实现物理层安全性的系统通常依赖于率低于爱丽丝和鲍勃渠道的香农容量的错误校正代码,因此Bob可以可靠地解码,但在Alice和Eve的范围之上,因此EVE无法可靠地解码。对于有限的块长度制度,已经提出了几个指标来表征信息泄漏。在这里,我们评估了一个新的指标,即成功指数,并证明它可以通过使用猜测随机加性噪声解码(GRAND)来损害任何中等长度代码的物理层安全性。 成功指数是误差指数的自然超容量类似物,它表征了当代码速率高于香农容量时最大似然解码是正确的概率,而该代码速率超过了Shannon的能力,这在代码长度中呈指数衰减。成功指数可用于近似评估EVE解码在超容量通道条件下正确的频率。通过使用Grand,我们证明了EVE可以限制她的解码程序,以便当她确实确定解码时,这是正确的,这是正确的,很可能会通过真实地揭示其比例来损害Alice和Bob的交流。 我们使用二进制对称通道作为工作示例,为确定成功指数的确定以及对EVE查询数阈值的评估提供一般数学表达式。由于大算法是代码书的不可知论,并且可以解码任何代码结构,因此我们为随机线性代码作为示例提供了经验结果。仿真结果证明了损害物理层安全性的实际可能性。
In the classic wiretap model, Alice wishes to reliably communicate to Bob without being overheard by Eve who is eavesdropping over a degraded channel. Systems for achieving that physical layer security often rely on an error correction code whose rate is below the Shannon capacity of Alice and Bob's channel, so Bob can reliably decode, but above Alice and Eve's, so Eve cannot reliably decode. For the finite block length regime, several metrics have been proposed to characterise information leakage. Here we assess a new metric, the success exponent, and demonstrate it can be operationalized through the use of Guessing Random Additive Noise Decoding (GRAND) to compromise the physical-layer security of any moderate length code. Success exponents are the natural beyond-capacity analogue of error exponents that characterise the probability that a maximum likelihood decoding is correct when the code-rate is above Shannon capacity, which is exponentially decaying in the code-length. Success exponents can be used to approximately evaluate the frequency with which Eve's decoding is correct in beyond-capacity channel conditions. Through the use of GRAND, we demonstrate that Eve can constrain her decoding procedure so that when she does identify a decoding, it is correct with high likelihood, significantly compromising Alice and Bob's communication by truthfully revealing a proportion of it. We provide general mathematical expressions for the determination of success exponents as well as for the evaluation of Eve's query number threshold, using the binary symmetric channel as a worked example. As GRAND algorithms are code-book agnostic and can decode any code structure, we provide empirical results for Random Linear Codes as exemplars. Simulation results demonstrate the practical possibility of compromising physical layer security.