期刊文献+

基于喷泉码的防窃听编码设计 被引量:2

Design of anti-eavesdropping code based on fountain codes
原文传递
导出
摘要 针对无线通信的安全性,提出一种与物理层喷泉码编码相结合的防窃听方法。利用增加人工噪声破坏窃听者喷泉码M P译码顺序,在保证主信道正常通信情况下,大幅度增加了窃听者的误码率,使其难以正常窃取信息,达到保证主信道通信安全的目的。实验结果表明,该方法在增加少量人工干扰噪声的情况下,使得窃听者的误码率达到30%~50%以上,达到防止窃听目的。 An anti-eavesdropping method with the fountain codes embedded in the physical layer is introduced to aim at the security of wireless communication. The artificial noise is used to damage the rule in MP decoding of fountain codes and make it more difficult to steal information on the premise of ensuring the communication security of the main channel. The experimental result shows that,under the condition of a small amount of artificial interference noise,this method can increase the BER of the eavesdropper by30% to 50%,the purpose of preventing eavesdropping is to be achieved.
作者 刘政 牛芳琳 钱大兴 蔡希彪 郭颖 LIU Zheng;NIU Fang-lin;QIAN Da-xing;CAI Xi-biao;GUO Ying(School of Electronics and Information Engineering,Liaoning University of Technology,Jinzhou 121001,Liaoning,China;School of Information Engineering,Dalian Ocean University,Dalian 116000,Liaoning,China;School of Graduate,Jinzhou Medical University,Jinzhou 121001,Liaoning,China)
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2018年第7期60-64,74,共6页 Journal of Shandong University(Natural Science)
基金 NSFC-辽宁省联合基金项目(No.201602373)
关键词 防窃听信道 喷泉码 RSD度分布函数 MP译码 wiretap channel fountain codes robust soliton distribution message propagation decoder
  • 相关文献

参考文献2

二级参考文献30

  • 1Byers J,Luby M,Mitzenmacher M.A digital fountain approach to reliable distribution of bulk data[J].ACM Special Interest Group on Data Communication Computer Communication Review,1998,28(4):56-67.
  • 2Luby M.LT codes[A].Proceedings of 43rd Annual IEEE Symposium on Foundations of Computer Science(FOCS)[C].USA:IEEE,2002.271-280.
  • 3MacKay D.Fountain codes[J].IEE Communications Proceedings,2005,152(6):1062-1068.
  • 4Etesami O,Shokrollahi A.Raptor codes on binary memoryless symmetric channels[J].IEEE Transactions on Information Theory,2006,52(5):2033-2051.
  • 5Liau A,Yousefi S,Kim I M.Binary soliton-like rateless coding for the Y-network[J].IEEE Transactions on Communications,2011,59(12):3217-3222.
  • 6Maatouk G,Shokrollahi A.Analysis of the second moment of the LT decoder[J].IEEE Transactions on Information Theory,2012,58(5):2558-2569.
  • 7Bodine E A,Cheng M K.Characterization of Luby transform codes with small message size for low-latency decoding[A].IEEE International Conference on Communications[C].Beijing:IEEE,2008.1195-1199.
  • 8Chong Z K,Goi B M,Ohsaki H.Design of short-length message fountain code for erasure channel transmission[A].Proceedings of IEEE Conference on Sustainable Utilization and Development in Engineering and Technology(STUDENT)[C].Kuala Lumpur:IEEE,2012.239-241.
  • 9Hyytia E,Tirronen T,Virtamo J.Optimal degree distribution for LT Codes with small message Length[A].Proceedings of 26th IEEE International Conference on Computer Communications[C].USA:IEEE,2007.2576-2580.
  • 10Agha A K,Kadi N,Stojmenovic I.Fountain codes with XOR of encoded packets for broadcasting and source independent backbone in multi-hop networks using network coding[A].Proceedings of IEEE 69th Vehicular Technology Conference[C].Barcelona:IEEE,2009.1-5.

共引文献20

同被引文献1

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部