In this course, we aim to show/provide a rigorous way to develop a security system on the physical layer (PhySec), by taking the physical properties of the communication environments into account. After having attained this course, the student should be able to answer questions about a system’s security with a fundamental knowledge about physical layer security.
Direct data transmission by PhySec: It covers multi-user communications with an additional secrecy constraint. For example, wiretap channels, broadcast channels with confidential messages, etc., and we will analyze the secrecy capacity/capacity region of these channels.
Key generation by PHYSEC: It covers the secret key generation with the source model and the channel model. In the former case, the legitimate users will observe a common source of randomness and try to agree on a secret key, which is unknown to a potential eavesdropper. In the latter one, one of the legitimate users transmits a random sequence through the channel to the other users and again they try to agree on a key. Practical sequential key distillation will also be covered.
Authentication: It covers how to identify the legitimate communication partners by channel testing/probing or by the use of the phyiscally unclonable functions.
Exercise (ET-NT-120) Start: 29th April 2020 Language: English
Material and videos will be uploaded to StudIP. Students are required to submit their questions regarding the lecture to Pin-Hsun Lin and their questions regarding the exercise to Carsten Janda via email. We will upload videos answering the questions to StudIP.
Matthieu Bloch und João Barros: Physical-Layer Security - From Information Theory to Security Engineering, Cambridge University Press, 2011.
Yingbin Liang, H. Vincent Poor und Shlomo Shamai (Shitz): Information Theoretic Security, Now publishers, Foundations and Trends in Communications and Information Theory, vol. 5, no. 4-5, 2008..
T. M. Cover and J. A. Thomas: Elements of Information Theory, 2nd ed., New York: Wiley-Interscience, Juli 2006.
A. El Gamal and Y.-H. Kim: Network Information Theory, Cambridge University Press, 2011.
R. W. Yeung: Information Theory and Network Coding, Part I, Springer, 2008.
We will have an introduction of the lectures and tutorials on Thursday, 23.04.2020 9.45 am. Additionally, we will discuss the procedure throughout the semester. The procedure will be as follows.
We will upload videos of the lectures and the tutorials at the corresponding time (lectures on Thursdays, tutorials on Wednesdays every second week). Following this approach, you are able to watch the videos as you like. We will ask the you to send us your questions with respect to the lectures and tutorials throughout the semester. Here again, we will prepare videos answering those questions and upload them together with the next lecture/tutorial video. At the end of the semester we are planning to have a BlueButton event in order to clarify all remaining questions in preparation of the examination.
Latest Information regarding the lecture and excercise can be found at StudIP, too.
Examination type: written examination
Duration: 120 min
Date: 12th of August 2020
Time: 9:15 AM - 11:15 AM (entrance time 8:30 AM)
Location: ZI 24.1 (Gotrian)
Permitted auxiliary material: written documents of any kind and a calculator without communication possibilities.
Consultation hour: by agreement with Carsten Janda
Information abaut exam:
Students are requested to register by contacting Carsen Janda The following information is necessary: name, first name, matriculation no., course of study, semester, e-mail address. Do not forget to check, wether or not you have to register at your department (faculty) as well.
All participants must have a student ID and additionally a different valid ID with a photo.
In order to cancel the registration please inform Carsen Janda or Petra Beyer. We need the same student information as for the registration. Do not forget to deregister at your department (faculty) as well.