In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L...In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.展开更多
A modified cellular automaton model for traffic flow was proposed. A novel concept about the changeable security gap was introduced and a parameter related to the variable security gap was determined. The fundamental ...A modified cellular automaton model for traffic flow was proposed. A novel concept about the changeable security gap was introduced and a parameter related to the variable security gap was determined. The fundamental diagram obtained by simulation shows that the maximum flow more approaches to the observed data than that of the NaSch model, indicating that the presented model is more reasonable and realistic.展开更多
In this letter, the physical layer security of hybrid automatic repeat request with chase combining(HARQ-CC) scheme is investigated from the viewpoint of information theory. Different from the literature which used Wy...In this letter, the physical layer security of hybrid automatic repeat request with chase combining(HARQ-CC) scheme is investigated from the viewpoint of information theory. Different from the literature which used Wyner code, our analysis focuses on the general scenario without specific code. We firstly obtain the outage probability of both main channel and wiretap channel. Since retransmissions are completely determined by main channel, we then prove that its achievable diversity order equals to maximum transmission number() while this order of wiretap channel is only one. Furthermore, we evaluate the metric of secure gap which demonstrates the difference between main channel and wiretap channel with reliable and secure constraints. As increases, the secure gap decreases monotonously. When is large enough, the security can be guaranteed even if wiretap channel is better than main channel.展开更多
文摘In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.
文摘A modified cellular automaton model for traffic flow was proposed. A novel concept about the changeable security gap was introduced and a parameter related to the variable security gap was determined. The fundamental diagram obtained by simulation shows that the maximum flow more approaches to the observed data than that of the NaSch model, indicating that the presented model is more reasonable and realistic.
基金supported in part by the National Natural Science Foundation of China under Grant No. 61072059
文摘In this letter, the physical layer security of hybrid automatic repeat request with chase combining(HARQ-CC) scheme is investigated from the viewpoint of information theory. Different from the literature which used Wyner code, our analysis focuses on the general scenario without specific code. We firstly obtain the outage probability of both main channel and wiretap channel. Since retransmissions are completely determined by main channel, we then prove that its achievable diversity order equals to maximum transmission number() while this order of wiretap channel is only one. Furthermore, we evaluate the metric of secure gap which demonstrates the difference between main channel and wiretap channel with reliable and secure constraints. As increases, the secure gap decreases monotonously. When is large enough, the security can be guaranteed even if wiretap channel is better than main channel.