咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Fountain-Coding-Based Secure C... 收藏

Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback

利用停止预言和有限反馈的 Fountain-Coding-Based 安全通讯

作     者:Sun, Li Xu, Hongbin 

作者机构:Xi An Jiao Tong Univ Sch Elect & Informat Engn Xian 710049 Shaanxi Peoples R China Xidian Univ State Key Lab Integrated Serv Networks Xian 710071 Shaanxi Peoples R China 

出 版 物:《IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY》 (IEEE运载工具技术汇刊)

年 卷 期:2019年第68卷第1期

页      面:740-753页

核心收录:

学科分类:0810[工学-信息与通信工程] 0808[工学-电气工程] 08[工学] 0823[工学-交通运输工程] 

基  金:National Natural Science Foundation of China [61671369, 61431011] Key Research and Development Program of Shaanxi Province [2018KW-019] Open Research Fund of the State Key Laboratory of Integrated Services Networks, Xidian University [ISN18-02] Fundamental Research Funds for the Central Universities of China 

主  题:Physical layer security fountain coding outage prediction limited feedback QoS violating probability 

摘      要:This paper develops a fountain-coding-based scheme to secure communications over fading wiretap channels, in which the transmission between the legitimate nodes is overheard by a malicious eavesdropper. The transmitter first splits its message into K source packets and generates a potentially infinite number of fountain-coded packets, each of which is the XOR of distinct source packets chosen according to the channel feedback. Based on the characteristics of fountain-coded transmissions, a sufficient number of independent coded packets have to be successfully received to recover the original source message. Therefore, secrecy is guaranteed if the legitimate receiver can accumulate the required number of coded packets before the eavesdropper does. To realize this, we propose to exploit outage prediction and channel feedback to optimize the fountain encoding procedure. To be more specific, upon the reception of any packet, the receiver predicts the conditional outage probability of the next slot s transmission based on the current channel state and notifies the transmitter to adjust the structure of the fountain code accordingly. In this manner, the encoder design matches well with the time-varying channel conditions of the legitimate link such that the receiver can achieve a high accumulation rate for the fountain packets. Meanwhile, because of the mismatch between the fountain encoder and the eavesdropper s channel, it is extremely difficult for the eavesdropper to collect enough independent fountain-coded packets, and transmission secrecy is thus guaranteed. Simulation results demonstrate that the proposed scheme outperforms the existing candidate solutions in terms of the intercept probability, the decoding delay at the legitimate receiver, and the achievable throughput, as well as the quality-of-service violating probability.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分