Polar Coding for Physical-layer Security without Knowledge of the Eavesdropper's Channel

被引:0
作者
Monteiro, Thyago [1 ]
Gomes, Marco [1 ]
Vilela, Joao P. [2 ,3 ]
Harrison, Willie K. [4 ]
机构
[1] Univ Coimbra, Dept Elect & Comp Engn, Coimbra, Portugal
[2] Univ Coimbra, CISUC, Coimbra, Portugal
[3] Univ Coimbra, Dept Informat Engn, Coimbra, Portugal
[4] Brigham Young Univ, Dept Elect & Comp Engn, Provo, UT 84602 USA
来源
2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING) | 2019年
基金
美国国家科学基金会;
关键词
Polar codes; wiretap channel; security gap; physical layer security; SECRECY CAPACITY; CODES;
D O I
10.1109/vtcspring.2019.8746472
中图分类号
U [交通运输];
学科分类号
08 ; 0823 ;
摘要
We propose an adaptive secrecy scheme using polar codes with random frozen bits for a general wiretap channel, in which to protect the data from a potential eavesdropper, part or all of the frozen bits are randomly generated per message. To assess the secrecy level of the proposed scheme, three types of decoding strategies are evaluated: a matching decoder which knows the positions of all inserted bits inside the blocklength and tries to estimate them using the same decoding techniques, a blind decoder which treats all the frozen bits as the same value, and a random decoder which considers those dynamic bits as random at the receiver. Results are presented in terms of the system security gap, assuming an adaptive decoding strategy. It is shown that the system achieves combined secrecy and reliability. The proposed scheme does not assume knowledge of the eavesdropper's channel when defining the indices of information and frozen bits.
引用
收藏
页数:5
相关论文
共 19 条
[1]  
3GPP, 2016, R1167209 3GPP
[2]   Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels [J].
Arikan, Erdal .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (07) :3051-3073
[3]   Artificial Noise Aided Polar Codes for Physical Layer Security [J].
Bai, Huiqing ;
Jin, Liang ;
Yi, Ming .
CHINA COMMUNICATIONS, 2017, 14 (12) :15-24
[4]   LLR-Based Successive Cancellation List Decoding of Polar Codes [J].
Balatsoukas-Stimming, Alexios ;
Parizi, Mani Bastani ;
Burg, Andreas .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (19) :5165-5179
[5]  
Bellare M, 2012, LECT NOTES COMPUT SC, V7417, P294
[6]   Antidepressant-Like Effect of Sodium Butyrate is Associated with an Increase in TET1 and in 5-Hydroxymethylation Levels in the Bdnf Gene [J].
Bin Wei, Ya ;
Melas, Philippe A. ;
Wegener, Gregers ;
Mathe, Aleksander A. ;
Lavebratt, Catharina .
INTERNATIONAL JOURNAL OF NEUROPSYCHOPHARMACOLOGY, 2015, 18 (02) :1-10
[7]  
Bioglio V., 2018, ARXIV180404389
[8]   Achieving Secrecy Capacity of the Wiretap Channel and Broadcast Channel With a Confidential Component [J].
Gulcu, Talha Cihad ;
Barg, Alexander .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (02) :1311-1324
[9]   Analysis of short blocklength codes for secrecy [J].
Harrison, Willie K. ;
Sarmento, Dinis ;
Vilela, Joao P. ;
Gomes, Marco A. C. .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
[10]  
Hof E., 2010, Proc. IEEE Information Theory Workshop (ITW), P1