Volume 44 Issue 10
Oct.  2018
Turn off MathJax
Article Contents
ZHANG Chenyu, LIU Rongke. Inter-block physical layer security structure design for polar code under FTN transmission[J]. Journal of Beijing University of Aeronautics and Astronautics, 2018, 44(10): 2217-2223. doi: 10.13700/j.bh.1001-5965.2018.0007(in Chinese)
Citation: ZHANG Chenyu, LIU Rongke. Inter-block physical layer security structure design for polar code under FTN transmission[J]. Journal of Beijing University of Aeronautics and Astronautics, 2018, 44(10): 2217-2223. doi: 10.13700/j.bh.1001-5965.2018.0007(in Chinese)

Inter-block physical layer security structure design for polar code under FTN transmission

doi: 10.13700/j.bh.1001-5965.2018.0007
Funds:

National Natural Science Foundation of China 91438116

More Information
  • Corresponding author: LIU Rongke, E-mail:rongke_liu@buaa.edu.cn
  • Received Date: 08 Jan 2018
  • Accepted Date: 08 Apr 2018
  • Publish Date: 20 Oct 2018
  • Wiretap channel is a widely-used model to describe physical layer security and polar code shows potential in wiretap channel model due to its polarization characteristic. A new inter-block encryption security scheme without the need of acquiring signal-to-noise ratio (SNR) is designed for the polar code under faster-than-Nyquist (FTN) transmission condition. With the scrambling module and the channel degradation of the wiretap model, the bits noiseless for the legal receiver but noisy for the eavesdropper are diffused and a one-time-pad secret key can be generated in each block. The physical layer difference of the main channel and the wiretap channel is applied to generate secret key sequence with is decipherable for the legal receiver and undecipherable for the eavesdropper. The secret key sequence is applied for encrypting the next block, achieving inter-block security transmission within secrecy capacity. The simulation result shows that under the circumstance of FTN signaling, when the channel SNR of eavesdropper is fluctuating from that of the main channel, the inter-block secrecy scheme proposed for the polar code can achieve confidential information transmission even when the average channel degradation of the wiretap channel is 0 dB.

     

  • loading
  • [1]
    WYNER D.The wiretap channel[J]. Bell System Technical Journal, 1975, 54(8):1355-1387. doi: 10.1002/bltj.1975.54.issue-8
    [2]
    ARIKAN E.Channel polarization: A method for constructing capacity-achieving codes for symmetry binary-input memoryless channels[C]//2008 IEEE International Symposium on Information Theory.Piscataway, NJ: IEEE Press, 2008: 1173-1177.
    [3]
    MAHDAVIFAR H, VARDY A.Achieving the secrecy capacity of wiretap channels using polar codes[C]//2010 IEEE International Symposium on Information Theory.Piscataway, NJ: IEEE Press, 2010: 913-917.
    [4]
    MAHDAVIFAR H, VARDY A.Achieving the secrecy capacity of wiretap channels using polar codes[J]. IEEE Transactions on Information Theory, 2011, 57(10):6428-6443. doi: 10.1109/TIT.2011.2162275
    [5]
    SASOGLU E, VARDY A.A new polar coding scheme for strong security on wiretap channels[C]//2013 IEEE International Symposium on Information Theory.Piscataway, NJ: IEEE Press, 2013: 1117-1121.
    [6]
    WEI Y P, ULUKUS S.Polar coding for the general wiretap channel with extensions to multiuser scenarios[J]. IEEE Journal on Selected Areas in Communications, 2016, 34(2):278-291. doi: 10.1109/JSAC.2015.2504275
    [7]
    SI H, KOYLUOLU O O, VISHWANATH S.Achieving secrecy without any instantaneous CSI: Polar coding for fading wiretap channels[C]//2015 IEEE International Symposium on information Theory.Piscataway, NJ: IEEE Press, 2015: 2161-2165.
    [8]
    YOUNGSIK K, JONGHWAN K, SANGHYO K.A secure information transmission scheme with a secret key based on polar coding[J]. IEEE Communications Letters, 2014, 18(6):937-940. doi: 10.1109/LCOMM.2014.2318306
    [9]
    ZHAO Y Z, ZOU X C, LU Z J, et al.Chaotic encrypted polar coding scheme for general wiretap channel[J]. IEEE Transactions on Very Large Scale Integration Systems, 2017, 25(12):3331-3340. doi: 10.1109/TVLSI.2016.2636908
    [10]
    MOSTAFA S, RONGKE L, CHENYU Z.A novel scrambler design for enhancing secrecy transmission based on polar code[J]. IEEE Communications Letters, 2017, 21(8):1679-1682. doi: 10.1109/LCOMM.2017.2697427
    [11]
    MAZO J E.Faster-than-Nyquist signaling[J]. Bell System Technical Journal, 1975, 54(8):1451-1462. doi: 10.1002/bltj.1975.54.issue-8
    [12]
    ANDERSON J B, RUSEK F, OWALL V.Faster-than-Nyquist signaling[J]. Proceedings of IEEE, 2013, 101(8):1817-1830. doi: 10.1109/JPROC.2012.2233451
    [13]
    JOAN D.Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers[J]. Computing, 2009, 85(1):85-104.
    [14]
    JOAN D.New criteria for linear maps in AES like ciphers[J]. Cryptography and Communications, 2009, 1(1):47-69. doi: 10.1007/s12095-008-0003-x
    [15]
    ELUMALAI R.Improving diffusion power of AES Rijindael with 8×8 MDS matrix[J]. International Journal on Computer Science and Engineering, 2011, 3(1):246-253.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(9)  / Tables(1)

    Article Metrics

    Article views(561) PDF downloads(271) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return