{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:14:45Z","timestamp":1766733285997,"version":"build-2065373602"},"reference-count":28,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1761280"],"award-info":[{"award-number":["1761280"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundos Europeus Estruturais e de Investimento (FEEI) through Programa Operacional Competitividade e Internacionalizac\u0327a\u0303o - COMPETE 2020","award":["SWING2 (PTDC\/EEI-TEL\/3684\/2014) and MobiWise (P2020 SAICTPAC\/001\/2015)"],"award-info":[{"award-number":["SWING2 (PTDC\/EEI-TEL\/3684\/2014) and MobiWise (P2020 SAICTPAC\/001\/2015)"]}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["POCI-01-0145-FEDER-016753 and UID\/EEA\/50008\/2019"],"award-info":[{"award-number":["POCI-01-0145-FEDER-016753 and UID\/EEA\/50008\/2019"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>In this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy and the secrecy benefit, to be used over real-world channels and finite blocklength instantiations of coding layers, and use this new approach to show the fundamental reliability and security implications of several coding mechanisms that have traditionally been used for physical-layer security. We perform a systematic\/structured analysis of the effect of error-control coding, scrambling, interleaving, and coset coding, as coding layers of a secrecy system. Using this new approach, scrambling and interleaving are shown to be of no effect in increasing information theoretic security, even when measuring the effect at the output of the eavesdropper\u2019s decoder. Error control coding is shown to present a trade-off between secrecy and reliability that is dictated by the chosen code and the signal-to-noise ratios at the legitimate and eavesdropping receivers. Finally, the benefits of secrecy coding are highlighted, and it is shown how one can shape the secrecy benefit according to system specifications using combinations of different layers of coding to achieve both reliable and secure throughput.<\/jats:p>","DOI":"10.3390\/e21080755","type":"journal-article","created":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T11:39:37Z","timestamp":1564659577000},"page":"755","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9375-9440","authenticated-orcid":false,"given":"Willie K.","family":"Harrison","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Brigham Young University, Provo, UT 84602, USA"}]},{"given":"Elise","family":"Beard","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Brigham Young University, Provo, UT 84602, USA"}]},{"given":"Scott","family":"Dye","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Brigham Young University, Provo, UT 84602, USA"}]},{"given":"Erin","family":"Holmes","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Colorado College, Colorado Springs, CO 80903, USA"}]},{"given":"Kaela","family":"Nelson","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Brigham Young University, Provo, UT 84602, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1124-525X","authenticated-orcid":false,"given":"Marco A. C.","family":"Gomes","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, Department of Electrical and Computer Engineering, University of Coimbra, 3004-531 Coimbra, Portugal"}]},{"given":"Jo\u00e3o P.","family":"Vilela","sequence":"additional","affiliation":[{"name":"CISUC and Department of Informatics Engineering, University of Coimbra, 3004-531 Coimbra, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2019,8,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Bloch, M., and Barros, J. (2011). Physical Layer Security: From Information Theory to Security Engineering, Cambridge University Press.","DOI":"10.1017\/CBO9780511977985"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Jensen, B., Clark, B., Flanary, D., Norman, K., Rice, M., and Harrison, W.K. (2019, January 20\u201324). Physical-Layer Security: Does it Work in a Real Environment?. Proceedings of the 2019 IEEE International Conference on Communications (ICC), Shanghai, China.","DOI":"10.1109\/ICC.2019.8761418"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Flanary, D., Jensen, B., Clark, B., Norman, K., Nelson, N., Rice, M., and Harrison, W.K. (2019, January 7\u201312). Manufacturing an Erasure Wiretap Channel from Channel Sounding Measurements. Proceedings of the IEEE International Symposium on Information Theory (ISIT), Paris, France.","DOI":"10.1109\/ISIT.2019.8849638"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Pfister, J., Gomes, M., Vilela, J.P., and Harrison, W.K. (2017, January 21\u201325). Quantifying Equivocation for Finite Blocklength Wiretap Codes. Proceedings of the IEEE International Conference on Communications (ICC), Paris, France.","DOI":"10.1109\/ICC.2017.7996925"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","article-title":"The Wire-Tap Channel","volume":"54","author":"Wyner","year":"1975","journal-title":"Bell Syst. Tech. J."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","article-title":"Broadcast Channels with Confidential Messages","volume":"24","year":"1978","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_7","first-page":"451","article-title":"The Gaussian Wire-tap Channel","volume":"IT-24","author":"Hellman","year":"1978","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MSP.2013.2265141","article-title":"Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security","volume":"30","author":"Harrison","year":"2013","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1725","DOI":"10.1109\/JPROC.2015.2463678","article-title":"Error-Control Coding for Physical-Layer Secrecy","volume":"103","author":"Bloch","year":"2015","journal-title":"Proc. IEEE"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2128","DOI":"10.1109\/TIFS.2019.2892010","article-title":"Generating a Binary Symmetric Channel for Wiretap Codes","volume":"14","author":"Harrison","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"6399","DOI":"10.1109\/TIT.2014.2343226","article-title":"Semantically Secure Lattice Codes for the Gaussian Wiretap Channel","volume":"60","author":"Ling","year":"2014","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1109\/TIFS.2011.2134093","article-title":"LDPC Codes for the Gaussian Wiretap Channel","volume":"6","author":"Klinc","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1109\/TIFS.2012.2187515","article-title":"Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis","volume":"7","author":"Baldi","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1109\/TIFS.2011.2145371","article-title":"Coding for Cryptographic Security Enhancement Using Stopping Sets","volume":"6","author":"Harrison","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Fritschek, R., Schaefer, R.F., and Wunder, G. (2019, January 20\u201324). Deep Learning for the Gaussian Wiretap Channel. Proceedings of the 2019 IEEE International Conference on Communications (ICC), Shanghai, China.","DOI":"10.1109\/ICC.2019.8761681"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Dryer, Z., Nickerl, A., Gomes, M.A.C., Vilela, J.P., and Harrison, W.K. (2019, January 20\u201324). Full-Duplex Jamming for Enhanced Hidden-Key Secrecy. Proceedings of the 2019 IEEE International Conference on Communications (ICC), Shanghai, China.","DOI":"10.1109\/ICC.2019.8761586"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1109\/TIT.2012.2219577","article-title":"Performance Analysis and Design of Two Edge-Type LDPC Codes for the BEC Wiretap Channel","volume":"59","author":"Rathi","year":"2013","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1109\/LSP.2015.2511821","article-title":"Interleaved Concatenated Coding for Secrecy in the Finite Blocklength Regime","volume":"23","author":"Vilela","year":"2016","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Sarmento, D., Vilela, J., Harrison, W.K., and Gomes, M. (2015, January 6\u201310). Interleaved Coding for Secrecy with a Hidden Key. Proceedings of the 2015 IEEE Globecom Workshops (GC Wkshps), San Diego, CA, USA.","DOI":"10.1109\/GLOCOMW.2015.7414188"},{"key":"ref_20","unstructured":"Rice, M. (2009). Digital Communications: A Discrete-Time Approach, Pearson\/Prentice Hall."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication Theory of Secrecy Systems","volume":"28","author":"Shannon","year":"1949","journal-title":"Bell Syst. Tech. J."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Al-Hassan, S., Ahmed, M.Z., and Tomlinson, M. (2014, January 22\u201324). New best equivocation codes for syndrome coding. Proceedings of the International Conference on Information and Communication Technology Convergence (ICTC), Busan, Korea.","DOI":"10.1109\/ICTC.2014.6983251"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1696","DOI":"10.1049\/iet-com.2013.0889","article-title":"Best binary equivocation code construction for syndrome coding","volume":"8","author":"Zhang","year":"2014","journal-title":"IET Commun."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Harrison, W.K., and Bloch, M.R. (2018, January 2\u20135). On Dual Relationships of Secrecy Codes. Proceedings of the 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA.","DOI":"10.1109\/ALLERTON.2018.8635841"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Moon, T.K. (2005). Error Correction Coding: Mathematical Methods And Algorithms, John Wiley & Sons.","DOI":"10.1002\/0471739219"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Harrison, W.K., and Bloch, M.R. (2019, January 7\u201312). Attributes of Generators for Best Finite Blocklength Coset Wiretap Codes over Erasure Channels. Proceedings of the IEEE International Symposium on Information Theory (ISIT), Paris, France.","DOI":"10.1109\/ISIT.2019.8849625"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2933","DOI":"10.1109\/TIT.2007.901143","article-title":"Applications of LDPC Codes to the Wiretap Channels","volume":"53","author":"Thangaraj","year":"2007","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2837","DOI":"10.1109\/TIT.2004.836694","article-title":"Efficient maximum-likelihood decoding of LDPC codes over the binary erasure channel","volume":"50","author":"Burshtein","year":"2004","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/21\/8\/755\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:12:28Z","timestamp":1760188348000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/21\/8\/755"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,1]]},"references-count":28,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2019,8]]}},"alternative-id":["e21080755"],"URL":"https:\/\/doi.org\/10.3390\/e21080755","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2019,8,1]]}}}