期刊文献+

高斯Wiretap模型下基于部分陪集的无线物理层强安全编码 被引量:1

A Wireless Physical Layer Coding Method Achieving Strong Security Based on Partitioning Coset for the Gaussian Wiretap Model
下载PDF
导出
摘要 针对无线物理层安全编码不能保证信息在有噪信道下进行强安全传输的问题,该文提出一种基于部分陪集的强安全编码方法。首先证明了当且仅当陪集母码的对偶码的最小汉明距离大于信息泄露位数时,利用部分陪集编码能够保证信息的强安全传输;然后证明了陪集编码的一系列性质,基于这些性质可以将陪集间最小汉明距离计算降低为1次查表运算,进而设计了一种基于树形深度优先的最大可用陪集集合搜索算法;最后分析得出一些典型线性分组码的抗窃听信道信息泄露和抗合法信道传输噪声的能力,以及相应的最大可用陪集集合。当陪集母码为BCH(15,11)的对偶码时,与传统陪集编码方案相比,该方法对合法信道的信道质量要求降低了5 dB,同时能够保证信息传输的强安全性。 To solve the problem of that the wireless physical layer secrecy coding can not achieve strong security while the legal channel is noisy, a strong security coding method is proposed based on partitioning coset. First, it is proved that if and only if the minimum Hamming distance of the dual code of the coset mother code is larger than the number of leak bits, the method can keep strong security. It is also proved that many properties of partitioning coset can help to decrease the calculation complexity to one time table search to get the Hamming distance among cosets, and a search algorithm is proposed based on tree deep priority to get maximum available coset set. Finally, the abilities of anti-information leakage in eavesdropper channel, the anti-noise in legal channel, and the corresponding maximum available coset set of typical linear block codes is presented. Compared with the traditional method, the proposed method reduces the requirement of the legal channel quality with 5 dB while keeping strong security when the mother code is the dual code of BCH(15,11).
出处 《电子与信息学报》 EI CSCD 北大核心 2014年第4期780-786,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61171108) 国家863计划项目(2011AA010604)资助课题
关键词 强安全编码 无线物理层 高斯Wiretap 陪集 Strong security coding Wireless physical layer Gaussian Wiretap Coset
  • 相关文献

参考文献2

二级参考文献22

  • 1Shiu Y S, Chang S Y, et al.. Physical layer security in wireless networks: a tutorial [J]. IEEE Wireless Communications, 2011, 24(4): 1276-1284.
  • 2Debbah M, Gamal H E, Poor H V, et al.. Wireless Physical Layer Security [J]. EURASIP Journal on Wireless Communications and Networking, 2009, 2009: 1-2.
  • 3Shannon C E. Communication theory of secrecy systems [J]. Bell System Technical Journal, 1949, 28(4): 656-715.
  • 4Wyner A D. The wire-tap channel [J]. Bell System Technical Journal, 1975, 54(8): 1355-1387.
  • 5Klinc D, Ha J, McLaughlin S M, et al.. LDPC codes for the Gaussian wiretap channel [C]. Proceedings of Information Theory Workshop (ITW), Taormina, Sicily, Italy, 2009: 95-99.
  • 6Khisti A and Wornell G W. Secure transmission with multiple antennas I: the MISOME wiretap channel [J]. IEEE Transactions on Information Theory, 2010, 56(7): 3088-3104.
  • 7Khisti A and Wornell G W. Secure transmission with multiple antennas -- Part II: the MIMOME wiretap channel [J]. IEEE Transactions on Information Theory, 2010, 56(11): 5515-5532.
  • 8Goel S and Negi R. Guaranteeing secrecy using artificial noise [J]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180-2189.
  • 9Zhou X and McKay M R. Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation [J]. IEEE Transactions on Vehicular Technology, 2010, 59(8): 3831-3842.
  • 10Li X, Hwu J, redundancy and transmissions [J]. 24-32. and Ratazzi E P. Using antenna array channel diversity for secure wireless Journal of Communications, 2007, 2(3).

共引文献18

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部