期刊文献+

Artificial Noise Aided Polar Codes for Physical LayerSecurity 被引量:1

Artificial Noise Aided Polar Codes for Physical Layer Security
在线阅读 下载PDF
导出
摘要 The secrecy rates of the existing practical secrecy coding methods are relative low to satisfy the security requirement of 5 G communications.We propose an artificial noise(AN) aided polar coding algorithm to improve the secrecy rate.Firstly,a secrecy coding model based on AN is presented,where the confidential bits of last transmission code block are adopted as AN to inject into the current codeword.In this way,the AN can only be eliminated from the jammed codeword by the legitimate users.Since the AN is shorter than the codeword,we then develop a suboptimal jamming positions selecting algorithm with the goal of maximizing the bit error rate of the eavesdropper.Theoretical and simulation results demonstrate that the proposed algorithm outperforms the random selection method and the method without AN. The secrecy rates of the existing practical secrecy coding methods are relative low to satisfy the security requirement of 5 G communications.We propose an artificial noise(AN) aided polar coding algorithm to improve the secrecy rate.Firstly,a secrecy coding model based on AN is presented,where the confidential bits of last transmission code block are adopted as AN to inject into the current codeword.In this way,the AN can only be eliminated from the jammed codeword by the legitimate users.Since the AN is shorter than the codeword,we then develop a suboptimal jamming positions selecting algorithm with the goal of maximizing the bit error rate of the eavesdropper.Theoretical and simulation results demonstrate that the proposed algorithm outperforms the random selection method and the method without AN.
出处 《China Communications》 SCIE CSCD 2017年第12期15-24,共10页 中国通信(英文版)
基金 supported in part by China’s High-Tech Research and Development Program(863 Program) under Grant No.2015AA01A708 National Science Foundation for Young Scientists of China under Grant No.61501516
关键词 PHYSICAL LAYER SECURITY polarcodes artificial noise jamming POSITIONS se-lection physical layer security polar codes artificial noise jamming positions selection
  • 相关文献

参考文献2

二级参考文献38

  • 1Wen H, Ho P H,and Jiang X H. On achieving unconditionalsecure communications over binary symmetricchannels(BSC) [J]. IEEE Wireless Communications Letters,2012,1(2): 49-52.
  • 2Ozarow L H and Wyner A D. Wire-tap channel II [J]. BellSystem Technical Journal, 1984, 63(10): 2135-2137.
  • 3Liao W, Chang T, Ma W, et al. QoS-based transmitbeamforming in the presence of eavesdroppers: an optimizedartificial noise aided approach[J]. IEEE Transactions onSignal Processing, 2011,59(3): 1202-1216.
  • 4Tangaraj A, Dihidar S, and Calderbank A R. Applications ofLDPC codes to the wire-tap channel [J]. IEEE Transactionson Information Theory、2007, 53(8): 2933-2945.
  • 5Cassuto Y and Bandic Z. Low-complexity wiretap codes withsecurity and error-correction guarantees[CJ. Proceedings ofIEEE Information Theory Workshop, Dublin, Ireland, 2010:1-5.
  • 6Belfiore J C and Oggier F. Lattice codes design for theRayleigh fading wire-tap channel [C]. Proceedings of IEEEInternational Conference on Communications Workshops,Kyoto, Japan, 2011: 1一5.
  • 7Lin F C and Oggier F. A classification of unimodular latticewiretap codes in small dimensions [J]. IEEE Transactions onInformation Theory, 2013,59(6): 3295-3303.
  • 8Maturo N, Baldi M, Bianchi M, et al.. Security gapperformance of some LDPC code constructions[C].Proceedings of 36th International Conference onTelecommunications and Signal Processing, Rome, Italy, 2013:77-81.
  • 9Baldi M, Bianchi M, and Chiaraluce F. Coding withscrambling, concatenation, and HARQ for the AWGNwire-tap channel: a security gap analysisfJ]. IEEETransactions on Information Forensics Security, 2012, 7(3):883-894.
  • 10Kwark B J, Song N K, Park B, et al. Physical layer securitywith Yarg Code[C]. Proceedings of IEEE International 1Conference on Emerging Network Intelligence, Sliema, Malta,2009: 43-48.

共引文献5

同被引文献5

引证文献1

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部