Performance evaluation of secure communication systems on turing machines

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Communication systems need to satisfy pre-specified requirements on spectral efficiency and security. Physical layer security is a concept that unifies both and connects them with entropic quantities. This paper presents a frame-work based on Turing machines to address the question of deciding whether or not a communication system meets these requirements. It is known that the class of Turing solvable problems coincides with the class of algorithmically solvable problems so that this framework allows for effective verification of such performance requirements. In this paper, it is shown that certain scenarios such as the wire-tap channel or compound channel are Turing computable so that the corresponding communication protocols can be effectively verified. A condition is presented and proved under which a communication scenario is not Turing computable. The channel with an active jammer falls into this category when deterministic codes are used. Interestingly, random codes robustify the channel with an active jammer in the sense that it becomes Turing computable and the corresponding communication protocol effectively verifiable.

Original languageEnglish
Title of host publication10th IEEE International Workshop on Information Forensics and Security, WIFS 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538665367
DOIs
StatePublished - 2 Jul 2018
Event10th IEEE International Workshop on Information Forensics and Security, WIFS 2018 - Hong Kong, Hong Kong
Duration: 10 Dec 201813 Dec 2018

Publication series

Name10th IEEE International Workshop on Information Forensics and Security, WIFS 2018

Conference

Conference10th IEEE International Workshop on Information Forensics and Security, WIFS 2018
Country/TerritoryHong Kong
CityHong Kong
Period10/12/1813/12/18

Fingerprint

Dive into the research topics of 'Performance evaluation of secure communication systems on turing machines'. Together they form a unique fingerprint.

Cite this