What should we learn from... Secure Communications via Physical-Layer and Information-Theoretic Techniques

You are here

Inside Signal Processing Newsletter Home Page

Top Reasons to Join SPS Today!

1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.

10 years of news and resources for members of the IEEE Signal Processing Society

What should we learn from... Secure Communications via Physical-Layer and Information-Theoretic Techniques

The wireless revolution is rightfully hailed for facilitating massive data exchanges, ranging from conversations, text, and e-mail at the personal level, to financial information, utility resource allocation, support for emergency services, and medical diagnostics at the institutional level. Such connectivity also facilitates security breaches, ranging from passive eavesdropping to active Byzantine attacks, due to the open nature of wireless channels. A future characterized by an explosion of network connected devices, comprising smart grids, smart transportation systems, smart health, and more generally the Internet of Things, opens new doors to potentially disastrous scenarios if security is not built in from the ground up: The allure of instant gratification from anywhere anytime connectivity must be tempered by the risks of unprotected exchanges with infected or harmful agents.

An intriguing result by Wyner from the 1970s showed how secure communication may be achieved at the physical layer using coding, by exploiting channel impairments that constitute a physical reality of communication systems. The standard setting is the so-called wiretap channel: This scheme has a sender (‘‘Alice’’) encode information in a manner that allows the legitimate receiver (‘‘Bob’’) to reliably decode the message, yet hides information from an eavesdropper (‘‘Eve’’). The beauty of the scheme is twofold: 1) it is keyless, in that Alice and Bob may dispense with the need to share a secret key prior to message transmission yet still achieve secure message transmission, even when Eve knows all details about the code employed; and 2) it offers stronger secrecy than standard cryptography, as it appeals to the perfect secrecy condition established by Shannon in the 1940s, sometimes called information-theoretic secrecy. Perfect secrecy, in its simplest terms, is achieved when the intercepted communication conveys no more information on the transmitted message than a random guess. In such a scenario, any computational advantage of an adversary proves irrelevant. This basic result has fueled much recent work reexamining the combination of coding and cryptographic primitives all operating at the physical layer, and appropriately dubbed ‘‘physical-layer security.’’ The intent of the special issue of the Proceedings of the IEEE, October 2015, is to highlight recent advances in the field along with remaining challenges.

Table of Contents:

Research Opportunities

SPS on Twitter

  • The 2021 IEEE International Symposium on Biomedical Imaging virtual platform is live, featuring pre-recorded talks… https://t.co/JfRAvO5hqr
  • CALL FOR PAPERS: The IEEE Journal of Selected Topics in Signal Processing is now accepting papers for a Special Iss… https://t.co/fQ25UHWidg
  • DEADLINE EXTENDED: The IEEE Journal of Selected Topics in Signal Processing is now accepting submissions for a Spec… https://t.co/AuMC67sUKd
  • The SPACE Webinar Series continues Tuesday, 6 April at 10:00 AM EDT when Dr. Ivan Dokmanić presents "Learning the G… https://t.co/4coVRWm0lc
  • NEW SPS WEBINAR: Join us on Wednesday, 28 April at 1:00 PM EDT when Dr. Fernando Gama presents "Graph Neural Networ… https://t.co/UI6Oi2PYYi

SPS Videos

Signal Processing in Home Assistants


Multimedia Forensics

Careers in Signal Processing             


Under the Radar