Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback

被引:28
作者
Sun, Li [1 ,2 ]
Xu, Hongbin [1 ,2 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Shaanxi, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Physical layer security; fountain coding; outage prediction; limited feedback; QoS violating probability; PHYSICAL LAYER SECURITY; ARTIFICIAL-NOISE; POWER ALLOCATION; SECRECY; TRANSMISSION; PROBABILITY; NETWORKS;
D O I
10.1109/TVT.2018.2885869
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper develops a fountain-coding-based scheme to secure communications over fading wiretap channels, in which the transmission between the legitimate nodes is overheard by a malicious eavesdropper. The transmitter first splits its message into K source packets and generates a potentially infinite number of fountain-coded packets, each of which is the XOR of distinct source packets chosen according to the channel feedback. Based on the characteristics of fountain-coded transmissions, a sufficient number of independent coded packets have to be successfully received to recover the original source message. Therefore, secrecy is guaranteed if the legitimate receiver can accumulate the required number of coded packets before the eavesdropper does. To realize this, we propose to exploit outage prediction and channel feedback to optimize the fountain encoding procedure. To be more specific, upon the reception of any packet, the receiver predicts the conditional outage probability of the next slot's transmission based on the current channel state and notifies the transmitter to adjust the structure of the fountain code accordingly. In this manner, the encoder design matches well with the time-varying channel conditions of the legitimate link such that the receiver can achieve a high accumulation rate for the fountain packets. Meanwhile, because of the mismatch between the fountain encoder and the eavesdropper's channel, it is extremely difficult for the eavesdropper to collect enough independent fountain-coded packets, and transmission secrecy is thus guaranteed. Simulation results demonstrate that the proposed scheme outperforms the existing candidate solutions in terms of the intercept probability, the decoding delay at the legitimate receiver, and the achievable throughput, as well as the quality-of-service violating probability.
引用
收藏
页码:740 / 753
页数:14
相关论文
共 44 条
[1]  
[Anonymous], 2011, Physical-Layer Security:From Information Theory to Security Engineering, DOI DOI 10.1017/CBO9780511977985
[2]  
[Anonymous], 2016, TRUSTED COMMUNICATIO
[3]   Secrecy Analysis of Transmit Antenna Selection Cooperative Schemes With No Channel State Information at the Transmitter [J].
Brante, Glauber ;
Alves, Hirley ;
Souza, Richard Demo ;
Latva-aho, Matti .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (04) :1330-1342
[4]   Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone [J].
Chae, Seong Ho ;
Choi, Wan ;
Lee, Jung Hoon ;
Quek, Tony Q. S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (10) :1617-1628
[5]   Secrecy Rate Optimization for Secure Multicast Communications [J].
Cumanan, Kanapathippillai ;
Ding, Zhiguo ;
Xu, Mai ;
Poor, H. Vincent .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2016, 10 (08) :1417-1432
[6]   On the Application of Cooperative Transmission to Secrecy Communications [J].
Ding, Zhiguo ;
Leung, Kin K. ;
Goeckel, Dennis L. ;
Towsley, Don .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (02) :359-368
[7]   Outage Probability and Optimal Cache Placement for Multiple Amplify-and-Forward Relay Networks [J].
Fan, Lisheng ;
Zhao, Nan ;
Lei, Xianfu ;
Chen, Qingchun ;
Yang, Nan ;
Karagiannidis, George K. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (12) :12373-12378
[8]   Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference [J].
Fan, Lisheng ;
Lei, Xianfu ;
Yang, Nan ;
Duong, Trung Q. ;
Karagiannidis, George K. .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2016, 10 (08) :1494-1505
[9]   On the Secure Energy Efficiency of TAS/MRC With Relaying and Jamming Strategies [J].
Farhat, Jamil ;
Brante, Glauber ;
Souza, Richard Demo .
IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (08) :1228-1232
[10]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189