Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Physical layer secure communication transmission method of wiretap channel based on polar code

A technology of secure communication and transmission method, which is applied in the field of secure communication under stealth channels, can solve the problems that the reliability and security of short codes are difficult to guarantee at the same time, and achieve the effect of strengthening security

Active Publication Date: 2020-05-26
BEIHANG UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] However, in actual transmission, the sending end and the receiving end may not be able to accurately estimate the channel conditions of the eavesdropping end, and because the channel conditions change with time, even if the overall eavesdropping channel is a degraded channel relative to the main channel, at some point The eavesdropping channel conditions may still be better than the main channel. In addition, in 5G communication, polar codes often use short codes, and the reliability and security of short codes are more difficult to guarantee at the same time. This poses a challenge to the design of secure transmission schemes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical layer secure communication transmission method of wiretap channel based on polar code
  • Physical layer secure communication transmission method of wiretap channel based on polar code
  • Physical layer secure communication transmission method of wiretap channel based on polar code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0184]This example illustrates the method of inter-frame chain encryption for polar long codes under the AWGN-wiretap channel. In this example, the Polar code used has a code length of 2048, and the total length of transmission symbols is 10000 frames. The signal-to-noise ratio of the legal main channel is fixed at 5dB, and Bob's anchor bit error rate Pgap(Bob) is set to 1e-5. According to the Gaussian density evolution calculation, the information set length of the main channel is 1414, and the code rate is 0.69. Then Alice estimates that Eve's channel ratio is 3dB, and this value can be estimated as other values, but it needs to be less than 5dB, but satisfying that Eve's eavesdropping SNR is lower than the main channel SNR during most frame transmissions.

[0185] Then the concrete steps of applying the inventive method are as follows:

[0186] Step 1: According to Gaussian density evolution, Alice calculates and estimates the information bit G of the eavesdropping channel...

Embodiment 2

[0209] This example illustrates the method of two-dimensional encryption of polar codes under the AWGN-wiretap channel. In this example, the Polar code used has a code length of 128, and every 30 frames is a vertical packet, and N_bundle=30 in this embodiment. Then the concrete steps of applying the inventive method are as follows:

[0210] Step 1, the signal-to-noise ratio of the legal main channel is fixed at 8dB, and Bob’s anchor bit error rate is set to P gap (Bob) is 1e-5. According to the Gaussian density evolution calculation, it can be known that the information set length G(Bob) of the main channel is 98, of which the length of the S set is 48, and the length of the P set is 50. Then Alice estimates that Eve's channel ratio is 3dB (it can be estimated to be other values, but it needs to be less than 5dB), and Eve's eavesdropping SNR is lower than the main channel SNR during most frame transmissions.

[0211] Step 2: Perform an intra-frame obfuscation operation on th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a physical layer secure communication transmission method of a secret stealing channel based on polar codes, and belongs to the field of communication. According to the invention, the sending end and the legal receiving end are provided with the confusion and deconfusion structures; a chain type encryption structure is designed for the long polar code, storing the information bit key and the freezing set information of the next frame into a preset position in an S set of the current frame by a sending end, and performing encryption and freezing set replacement between frames except for confusion and coding of each frame. A two-dimensional confusion method is designed for a short polar code, a plurality of continuous frames are divided into a group, intra-frame confusion is firstly carried out on each frame in the group, then inter-frame key position confusion is carried out, then second-time intra-frame confusion is carried out, and then polar coding is carriedout. Data transmission can be carried out on a group of short polar codes in combination with chained encryption of long polar codes. According to the method, the channel security is improved, and therequirement on the degradation degree of the eavesdropper channel when the eavesdropper cannot decode completely is reduced.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a secure communication method in a wiretap channel based on a polar code. Background technique [0002] At present, most of the confidential communication systems of wireless communication are based on the assumption of no bit error rate transmission at the physical layer. However, in wireless networks, due to a series of influences such as channel fading and noise, the bit error rate of the physical layer cannot be ignored. The ciphertext is not necessarily consistent with the sender, and the transmission error of the ciphertext can lead to the failure of decryption, so the design of the error correction code at the physical layer is of great significance to the security system of wireless communication. [0003] In addition, because the information of the wireless channel is loaded on the communication carrier and spreads freely in the wireless space, this ope...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04B17/336H04L1/00H04L9/06H04L9/08H04L9/32H04W12/02
Inventor 刘荣科张晨宇穆斯塔法赵岭
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products