Inter-block physical layer security structure design for polar code under FTN transmission
-
摘要:
极化码是适用于物理层wiretap信道安全模型的一种编码方式,针对在超奈奎斯特(FTN)条件下传输的极化码,设计了一种无需获知窃听信道信噪比(SNR)的帧间链式加密的安全结构。通过混淆结构将对合法接收端可靠而对非法窃听端阻塞的码元进行扩散,利用物理层主信道和窃听信道的差异,在每一帧中生成主信道可译而窃听信道不可译的密钥序列,对下一帧进行加密,实现安全容量的帧间传输。仿真结果显示,在FTN加速场景和窃听信道SNR相对于主信道波动的前提下,提出的极化码帧间安全结构可在wiretap信道的平均信道退化程度为0 dB时实现信息的安全传输。
-
关键词:
- 极化码 /
- wiretap信道 /
- 超奈奎斯特(FTN) /
- 物理层 /
- 帧间安全结构
Abstract:Wiretap channel is a widely-used model to describe physical layer security and polar code shows potential in wiretap channel model due to its polarization characteristic. A new inter-block encryption security scheme without the need of acquiring signal-to-noise ratio (SNR) is designed for the polar code under faster-than-Nyquist (FTN) transmission condition. With the scrambling module and the channel degradation of the wiretap model, the bits noiseless for the legal receiver but noisy for the eavesdropper are diffused and a one-time-pad secret key can be generated in each block. The physical layer difference of the main channel and the wiretap channel is applied to generate secret key sequence with is decipherable for the legal receiver and undecipherable for the eavesdropper. The secret key sequence is applied for encrypting the next block, achieving inter-block security transmission within secrecy capacity. The simulation result shows that under the circumstance of FTN signaling, when the channel SNR of eavesdropper is fluctuating from that of the main channel, the inter-block secrecy scheme proposed for the polar code can achieve confidential information transmission even when the average channel degradation of the wiretap channel is 0 dB.
-
表 1 误帧率和秘密信息传输码率对比
Table 1. Comparison of frame error rate and transmission code rate for secret message
窃听信道信噪比/dB 主信道误帧率/10-4 窃听信道误帧率 4 1.6217 0.040 0.097 0.5303 3.5 1.6217 0.264 0.142 0.5303 3 1.6217 0.767 0.185 0.5303 2.5 1.6217 0.991 0.229 0.5303 2 1.6217 1 0.271 0.5303 -
[1] WYNER D.The wiretap channel[J]. Bell System Technical Journal, 1975, 54(8):1355-1387. doi: 10.1002/bltj.1975.54.issue-8 [2] ARIKAN E.Channel polarization: A method for constructing capacity-achieving codes for symmetry binary-input memoryless channels[C]//2008 IEEE International Symposium on Information Theory.Piscataway, NJ: IEEE Press, 2008: 1173-1177. [3] MAHDAVIFAR H, VARDY A.Achieving the secrecy capacity of wiretap channels using polar codes[C]//2010 IEEE International Symposium on Information Theory.Piscataway, NJ: IEEE Press, 2010: 913-917. [4] MAHDAVIFAR H, VARDY A.Achieving the secrecy capacity of wiretap channels using polar codes[J]. IEEE Transactions on Information Theory, 2011, 57(10):6428-6443. doi: 10.1109/TIT.2011.2162275 [5] SASOGLU E, VARDY A.A new polar coding scheme for strong security on wiretap channels[C]//2013 IEEE International Symposium on Information Theory.Piscataway, NJ: IEEE Press, 2013: 1117-1121. [6] WEI Y P, ULUKUS S.Polar coding for the general wiretap channel with extensions to multiuser scenarios[J]. IEEE Journal on Selected Areas in Communications, 2016, 34(2):278-291. doi: 10.1109/JSAC.2015.2504275 [7] SI H, KOYLUOLU O O, VISHWANATH S.Achieving secrecy without any instantaneous CSI: Polar coding for fading wiretap channels[C]//2015 IEEE International Symposium on information Theory.Piscataway, NJ: IEEE Press, 2015: 2161-2165. [8] YOUNGSIK K, JONGHWAN K, SANGHYO K.A secure information transmission scheme with a secret key based on polar coding[J]. IEEE Communications Letters, 2014, 18(6):937-940. doi: 10.1109/LCOMM.2014.2318306 [9] ZHAO Y Z, ZOU X C, LU Z J, et al.Chaotic encrypted polar coding scheme for general wiretap channel[J]. IEEE Transactions on Very Large Scale Integration Systems, 2017, 25(12):3331-3340. doi: 10.1109/TVLSI.2016.2636908 [10] MOSTAFA S, RONGKE L, CHENYU Z.A novel scrambler design for enhancing secrecy transmission based on polar code[J]. IEEE Communications Letters, 2017, 21(8):1679-1682. doi: 10.1109/LCOMM.2017.2697427 [11] MAZO J E.Faster-than-Nyquist signaling[J]. Bell System Technical Journal, 1975, 54(8):1451-1462. doi: 10.1002/bltj.1975.54.issue-8 [12] ANDERSON J B, RUSEK F, OWALL V.Faster-than-Nyquist signaling[J]. Proceedings of IEEE, 2013, 101(8):1817-1830. doi: 10.1109/JPROC.2012.2233451 [13] JOAN D.Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers[J]. Computing, 2009, 85(1):85-104. [14] JOAN D.New criteria for linear maps in AES like ciphers[J]. Cryptography and Communications, 2009, 1(1):47-69. doi: 10.1007/s12095-008-0003-x [15] ELUMALAI R.Improving diffusion power of AES Rijindael with 8×8 MDS matrix[J]. International Journal on Computer Science and Engineering, 2011, 3(1):246-253.