Secure Polar Coding for the Two-Way Wiretap Channel

被引:6
作者
Zheng, Mengfan [1 ]
Tao, Meixia [1 ]
Chen, Wen [1 ]
Ling, Cong [2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200240, Peoples R China
[2] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Polar codes; two-way wiretap channel; coded cooperative jamming; physical-layer security; MULTIPLE-ACCESS; SECRECY CAPACITY; CODES;
D O I
10.1109/ACCESS.2018.2813998
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider the problem of polar coding for secure communications over the two-way wiretap channel, where two legitimate users communicate with each other simultaneously, while a passive eavesdropper overhears a combination of their exchanged signals. We design a low complexity polar coded cooperative jamming scheme that achieves the whole secrecy rate region of the general two-way wiretap channel under the strong secrecy criterion. The chaining method is used to make proper alignment of polar indices. The randomness required to be shared between two legitimate users is treated as a limited resource and we show that its rate can be made negligible by increasing the blocklength and the number of chained blocks. For the special case when the eavesdropper channel is degraded with respect to the legitimate ones, a simplified scheme is proposed which can simultaneously ensure reliability and weak secrecy within a single transmission block.
引用
收藏
页码:21731 / 21744
页数:14
相关论文
共 40 条
  • [1] Polar Codes for the m-User Multiple Access Channel
    Abbe, Emmanuel
    Telatar, Emre
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (08) : 5437 - 5448
  • [2] ALDOUS D, 1983, LECT NOTES MATH, V986, P243
  • [3] Nested Polar Codes for Wiretap and Relay Channels
    Andersson, Mattias
    Rathi, Vishwambhar
    Thobaben, Ragnar
    Kliewer, Jorg
    Skoglund, Mikael
    [J]. IEEE COMMUNICATIONS LETTERS, 2010, 14 (08) : 752 - 754
  • [4] [Anonymous], 2012, ELEMENTS INFORM THEO
  • [5] Arikan E, 2012, IEEE INT SYMP INFO, P566, DOI 10.1109/ISIT.2012.6284254
  • [6] Source Polarization
    Arikan, Erdal
    [J]. 2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 899 - 903
  • [7] Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels
    Arikan, Erdal
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (07) : 3051 - 3073
  • [8] Invertible Extractors and Wiretap Protocols
    Cheraghchi, Mahdi
    Didier, Fredric
    Shokrollahi, Amin
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (02) : 1254 - 1274
  • [9] Chou RA, 2016, IEEE INT SYMP INFO, P983, DOI 10.1109/ISIT.2016.7541446
  • [10] Polar Coding for the Broadcast Channel With Confidential Messages: A Random Binning Analogy
    Chou, Remi A.
    Bloch, Matthieu R.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (05) : 2410 - 2429