Fountain-Coding Aided Secure Transmission With Delay and Content Awareness

被引:11
作者
Sun, Li [1 ,2 ]
Huang, Dantong [1 ]
Swindlehurst, A. Lee [3 ]
机构
[1] Xi An Jiao Tong Univ, Sch Informat & Commun Engn, Xian 710049, Peoples R China
[2] Zhejiang Lab, Hangzhou 311121, Peoples R China
[3] Univ Calif Irvine, Ctr Pervas Commun & Comp, Irvine, CA 92697 USA
基金
中国国家自然科学基金;
关键词
Delays; Decoding; Receivers; Channel coding; Wireless communication; Security; Physical layer security; fountain code; decoding delay; image transmission; NETWORKS;
D O I
10.1109/TVT.2020.2992619
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Fountain coding is a new paradigm for enhancing wireless communications security. In this paper, we investigate how to dynamically construct the fountain code to prevent information leakage and reduce the decoding delay at the legitimate receiver. To be specific, a method is developed to determine how many source packets should be used and which source packets should be chosen to participate in the fountain coding process, taking into account the channel quality, delay constraint, as well as the priorities of various source packets. We also apply the proposed scheme to practical image transmission, and demonstrate the advantages of our scheme via numerical simulations.
引用
收藏
页码:7992 / 7997
页数:6
相关论文
共 14 条
[1]  
Achanta R, 2009, PROC CVPR IEEE, P1597, DOI 10.1109/CVPRW.2009.5206596
[3]   On Reducing Intercept Probability for Unsubscribed Video Layers Using Network Coding [J].
Karim, Mohammad S. ;
Esmaeilzadeh, Mohammad ;
Sadeghi, Parastoo .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (06) :1385-1388
[4]   Opportunistic Relaying and Random Linear Network Coding for Secure and Reliable Communication [J].
Khan, Amjad Saeed ;
Chatzigeorgiou, Ioannis .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (01) :223-234
[5]   Rethinking the Intercept Probability of Random Linear Network Coding [J].
Khan, Amjad Saeed ;
Tassi, Andrea ;
Chatzigeorgiou, Ioannis .
IEEE COMMUNICATIONS LETTERS, 2015, 19 (10) :1762-1765
[6]   Capturing User Behavior in Subjective Quality Assessment of OTT Video Service [J].
Li, Weiwei ;
Spachos, Petros ;
Chignell, Mark ;
Leon-Garcia, Alberto ;
Jiang, Jie ;
Zucherman, Leon .
2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
[7]   Fountain codes [J].
MacKay, DJC .
IEE PROCEEDINGS-COMMUNICATIONS, 2005, 152 (06) :1062-1068
[8]   Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey [J].
Mukherjee, Amitav ;
Fakoorian, S. Ali A. ;
Huang, Jing ;
Swindlehurst, A. Lee .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (03) :1550-1573
[9]   Exploiting Fountain Codes for Secure Wireless Delivery [J].
Niu, Hao ;
Iwai, Masayuki ;
Sezaki, Kaoru ;
Sun, Li ;
Du, Qinghe .
IEEE COMMUNICATIONS LETTERS, 2014, 18 (05) :777-780
[10]   Buffer-Aided Secure Relay Networks With SWIPT [J].
Ren, Juanjuan ;
Lei, Xianfu ;
Diamantoulakis, Panagiotis D. ;
Chen, Qingchun ;
Karagiannidis, George K. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) :6485-6499