The focus of this thesis will be on the design of practical physical layer security solutions for a variety of secure communications and secret key generation scenarios. These solutions will be inspired from the optimal information theoretic security schemes and will be analyzed and built from a error correction coding perspective, with possible applications in wireless communications or satellite and aeronautical communications.
PhD thesis proposal:
Physical layer security: secure communications and key generation
Since its introduction in one of Shannon’s most celebrated papers , adn later Wyner  and Csiszár Körner , physical layer security has proved to be a promising means of securing communications by exploiting the inherent non-reproducible randomness and asymmetry in the communication links (noisy channels, fading channels, ...) in order to create advantage of the legitimate users over the eavesdroppers. Unlike cryptographic based methods, which are applied at the upper layers of the communication protocols stack, security at the physical layer is resilient to any computational power of the eavesdropping nodes, since it does not rely on the algebraic hardness of key reproduction, e.g, prime numbers based factorization.
Whilst long regarded as a purely theoretic form of security inspired from information-theoretic analysis, in the last decades, physical layer security has substantially matured, and constructions of secure transmission and secret key generation schemes based on channel randomness and asymmetry are now provably implementable for some simple communication scenarios, e.g., Point-to- Point Binary Erasure Channels (BEC) or Binary Symmetric Channels (BSC). These constructions consist in the so-called wiretap codes, [4,5], which are error correction codes judiciously designed to create advantage of the legitimate receivers over the eavesdroppers and thus, secure the communication.
Yet, wiretap codes constructions for more complex scenarios (multiple users, fading channel, distributed key generation,...) remain, to date, not fully explored and understood.
The focus of this thesis will be the design of practical physical layer security solutions for a variety of secure communications and secret key generation scenarios. These solutions will be inspired from the optimal information theoretic security schemes and will be analyzed and built from a error correction coding perspective, with possible applications in wireless communications or satellite and aeronautical communications.
The research assignment will consist in combining theoretical foundations of information theoretic security, with code analysis inspired from error correction coding theory, and realistic implementation constraints to design different physical layer security solutions. The scenarios of interest include, but are not limited to,
ISAE-Supaéro is a leading institute in applied research for aeronautical and aerospace engineering. The Department of Electronics, Optronics and Signal processing (DEOS) is leading research in various electrical engineering topics amongst which are ” secure and high spectral efficiency satellites and aeronautical communications”.
The main advisor of the thesis will be Meryem Benammar, associate profession in DEOS, whose research activities are most in information theory, with applications to various secure or non secure communication and data compression scenarios, as well as fundamental aspects of error correction coding (error exponents, code convergence analysis, ...).
The thesis will be partly co-advised by Tarik Benaddi, associate professor in IMT-Atlantique Toulouse site, whose research activities are strongly related to error correction code design, ranging from theoretic solutions, to simulation and implementation in realistic settings.
The thesis will be held under the direction of Jérôme Lacan, professor in ISAE-Supaéro, who has expertise in various error correction coding related topics, including erasure codes, and in security and cryptography.
Applicants should be graduated master (or/and engineer) students. A strong background in digital communications, signal processing, and applied mathematics is required since the research assignement requires tools from information theory and error correction coding. Good communication skills in English are necessary (written and oral), as well as good development skills (Matlab, C++ ). Applications from candidates familiar with digital communications, information theory or error correction coding are particularly encouraged.
 C. E. Shannon, “Communication theory of secrecy systems,” Bell Labs Tech- nical Journal, vol. 28, no. 4, pp. 656–715, 1949.
 A. D. Wyner, “The wiretap channel,” Bell Labs Technical Journal, vol. 54, no. 8, pp. 1355–1387, 1975.
 I. Csiszar and J. Korner, “Broadcast channels with confidential messages,” IEEE transactions on information theory, vol. 24, pp. 339–348, 1978.
 M. Hayashi and R. Matsumoto, “Construction of wiretap codes from ordi- nary channel codes,” in 2010 IEEE International Symposium on Information Theory, 13-18 June 2010, pp. 2538–2542.
 O. O. Koyluoglu and H. El Gamal, “Polar coding for secure transmission and key agreement,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 5, pp. 1472–1483, 2012.
 M. Alioto, A. Alvarez, “Physically Unclonable Function database,” [Online]. Available: http://www.green-ic.org/pufdb.
 C. H. Bennett and G. Brassard. “ Quantum cryptography: Public key distribution and coin tossing”. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, volume 175, page 8. New York, 1984
(c) GdR 720 ISIS - CNRS - 2011-2018.