Cooperative jamming polar codes for multiple-access wiretap channels

被引:7
作者
Hajimomeni, Mona [1 ]
Aghaeinia, Hassan [1 ]
Kim, Il-Min [2 ]
Kim, Kwihoon [3 ]
机构
[1] Amirkabir Univ Technol, Dept Elect Engn, Tehran Polytech, 424 Hafez Ave, Tehran, Iran
[2] Queens Univ, Dept Elect & Comp Engn, Kingston, ON K7L 3N6, Canada
[3] ETRI, Future Technol Dept, 218 Gajeong Ro, Daejeon 34129, South Korea
关键词
PHYSICAL-LAYER; SECURITY; CAPACITY; SECRECY;
D O I
10.1049/iet-com.2015.0624
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The authors study cooperative security in the physical layer of wireless systems based on the recently developed polar codes for multiple access channel (MAC). Specifically, the authors first consider the case of a m-user MAC with external eavesdropper. Using polar alignment, the authors formulate a discrete optimisation problem where security and reliability criteria can be handled separately over the bases of a set of deterministic binary matrices. A discrete algorithm with incrementally polynomial complexity is used to maximise the uniform sum secrecy rate of users. Moreover, the proposed coding scheme is shown to achieve strong security for any subset of users. The authors next examine the case of minimum number of cooperative helpers to fulfil a feasible secrecy rate requirement at the legitimate user. Here, a low-complexity suboptimal algorithm is presented with at most one helper more than the optimal solution. Using Tal-Sharov-Vardy implementation of MAC polar codes, secure polar coding is implemented for a 2-user Gaussian wiretap MAC channel. The upper and lower bound of block error probability are compared, respectively, at the legitimate receiver and the eavesdropper. The results demonstrate clearly that with sufficiently long block length, strong secrecy with respect to the eavesdropper is achieved, while block error probability approaches 0.5.
引用
收藏
页码:407 / 415
页数:9
相关论文
共 11 条
[1]   Polar Codes for the m-User Multiple Access Channel [J].
Abbe, Emmanuel ;
Telatar, Emre .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (08) :5437-5448
[2]   Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels [J].
Arikan, Erdal .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (07) :3051-3073
[3]   Cooperative Security at the Physical Layer [A summary of recent advances] [J].
Bassily, Raef ;
Ekrem, Ersen ;
He, Xiang ;
Tekin, Ender ;
Xie, Jianwei ;
Bloch, Matthieu R. ;
Ulukus, Sennur ;
Yener, Aylin .
IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (05) :16-28
[4]  
Bellare M, 2012, LECT NOTES COMPUT SC, V7417, P294
[5]   Invertible Extractors and Wiretap Protocols [J].
Cheraghchi, Mahdi ;
Didier, Fredric ;
Shokrollahi, Amin .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (02) :1254-1274
[6]   Coding for Secrecy [An overview of error-control coding techniques for physical-layer security] [J].
Harrison, Willie K. ;
Almeida, Joao ;
Bloch, Matthieu R. ;
McLaughlin, Steven W. ;
Barros, Joao .
IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (05) :41-50
[7]   On the complexity of some enumeration problems for matroids [J].
Khachiyan, L ;
Boros, E ;
Elbassioni, K ;
Gurvich, V ;
Makino, K .
SIAM JOURNAL ON DISCRETE MATHEMATICS, 2006, 19 (04) :966-984
[8]   Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes [J].
Mahdavifar, Hessam ;
Vardy, Alexander .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (10) :6428-6443
[9]  
Sasoglu E., 2010, THESIS EPFL, P71
[10]   The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming [J].
Tekin, Ender ;
Yener, Aylin .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2735-2751