Achieving information theoretic security with practical coding complexity is of definite interest. This work first focuses on the key agreement problem. For this problem, a new cross-layer secure coding protocol over ...
详细信息
Achieving information theoretic security with practical coding complexity is of definite interest. This work first focuses on the key agreement problem. For this problem, a new cross-layer secure coding protocol over block fading channels is proposed. The proposed scheme requires only the statistical knowledge about the eavesdropper channel state information (CSI), and, utilizing a privacy amplification technique, reduces the problem of key agreement to a provably secure coding problem per block. Focusing on this secure coding problem, it is shown that polar codes, introduced by Arikan, achieve nonzero perfect secrecy rates for the binary-input degraded wiretap channel while enjoying a remarkably low encoding-decoding complexity. We further show that, in the special case of symmetric main and eavesdropper channels, this coding technique achieves the secrecy capacity. This approach is also extended to the multiple-access channel with a degraded eavesdropper where a nontrivial achievable secrecy region is established. This polar coding method is then utilized in the proposed key agreement protocol, where the secure coding per block is used to create an advantage for the legitimate nodes over the eavesdropper, which is then turned into a private key via the privacy amplification module.
To improve the performance of underwater acoustic communications, this letter proposes a polar coding scheme with adaptive channel equalization, which can reduce the amount of feedback information. Furthermore, a hybr...
详细信息
To improve the performance of underwater acoustic communications, this letter proposes a polar coding scheme with adaptive channel equalization, which can reduce the amount of feedback information. Furthermore, a hybrid automatic repeat request (HARQ) mechanism is provided to mitigate the impact of estimation errors. Simulation results show that the proposed scheme outperforms the turbo equalization in bit error rate. Computational complexity analysis is also provided for comparison.
In this paper, a novel transmission protocol based on polar coding is proposed for the half-duplex degraded relay channel. In the proposed protocol, referred to as the partial message relaying, the relay only needs to...
详细信息
In this paper, a novel transmission protocol based on polar coding is proposed for the half-duplex degraded relay channel. In the proposed protocol, referred to as the partial message relaying, the relay only needs to forward a part of the decoded source message that the destination needs according to the exquisite nested structure of polar codes. Theoretically, it is proved that the scheme can achieve the capacity of the half-duplex relay channel under the decode-and-forward (DF) cooperation strategy while enjoying low encoding/decoding complexity. Practically, in order to minimize the global transmission power, the optimization of the power allocation is performed between the source and the relay by using information theoretic tools. Furthermore, a joint iterative soft parallel interference cancellation receiver structure is developed to suit to the proposed scheme. Simulation results show that the proposed scheme outperforms the conventional scheme designed by low-density parity-check (LDPC) codes.
This paper investigates the problem of secret key generation from correlated Gaussian random variables in the short blocklength regime. Short blocklengths are commonly employed in massively connected IoT sensor networ...
详细信息
This paper investigates the problem of secret key generation from correlated Gaussian random variables in the short blocklength regime. Short blocklengths are commonly employed in massively connected IoT sensor networks in 5G and beyond wireless systems. polar codes have previously been shown to be applicable to the secret key generation problem, and are known to perform well for short blocklengths in the channel coding context. Inspired by these findings, we propose an explicit protocol based on polar codes for generating secret keys in the short blocklength regime. This protocol differs from previously proposed key generation protocols based on polar coding in two main ways: (i) we consider a Gaussian source for the key generation;(ii) we focus on the short blocklength regime. Simulation results show that the proposed protocol performs well even for very short blocklengths, especially if one can relax the BER/BLER requirements for the generated keys. They also demonstrate that the polar code based protocol outperforms a similar one using LDPC codes in place of polar codes, and that this advantage grows the shorter the blocklength becomes.
In this study, the authors propose a polar coding (PC) scheme for the power line communication (PLC) system to cope with the impulsive noise and thereby promote the transmission performance. This new error-correcting ...
详细信息
In this study, the authors propose a polar coding (PC) scheme for the power line communication (PLC) system to cope with the impulsive noise and thereby promote the transmission performance. This new error-correcting coding scheme is essentially inspired on a novel conception of channel polarisation. To be specific, via recursively channel combing and splitting, a group of channels with ideal transmission conditions, that is having a capacity of 1, will be constructed to carry the useful information, while the other band sub-channels bear useless information. The decoding performance of PC under realistic impulsive noises is investigated under the condition that the impulsive noise is modelled by a well-known Middleton Class-A model. To mitigate the error propagation caused by sudden strong impulsive noises and further enhance the decoding performance, a matrix interleave operator is integrated. Simulations validate the suggested PC scheme in PLC systems. Compared with another commonly used low-density parity-check (LDPC) coding scheme, the suggested PC scheme, which has the low complexity, can significantly improve the bit error rate (BER) performance of PLC transmissions with impulsive interference. The PC scheme, as demonstrated by simulation results, can be of great importance to practical PLC systems.
The transmission on fronthaul links in the cloud radio access network has become a bottleneck with the increasing data rate. In this paper, we propose a novel two-stage compression scheme for fronthaul links. In the f...
详细信息
The transmission on fronthaul links in the cloud radio access network has become a bottleneck with the increasing data rate. In this paper, we propose a novel two-stage compression scheme for fronthaul links. In the first stage, the commonly used techniques like cyclic prefix stripping and sampling rate adaptation are implemented. In the second stage, a structure called linear prediction coding with decision threshold (LPC-DT) is proposed to remove the redundancies of signal. Considering that the linear prediction outputs have large dynamic range, a two-piecewise quantization with optimized decision threshold is applied to enhance the quantization performance. In order to further lower the transmission rate, a multi-level successive structure of lossless polar source coding is proposed to compress the quantization output with low encoding and decoding complexity. Simulation results demonstrate that the proposed scheme with LPC-DT and LPSC offers not only significantly better compression ratios but also more flexibility in bandwidth settings compared with traditional ones.
Next-generation fiber-optic communications call for ultra-reliable forward error correction codes that are capable of low-power and low-latency decoding. In this paper, we propose a new class of polar codes, whose pol...
详细信息
Next-generation fiber-optic communications call for ultra-reliable forward error correction codes that are capable of low-power and low-latency decoding. In this paper, we propose a new class of polar codes, whose polarization units are irregularly pruned to reduce computational complexity and decoding latency without sacrificing error correction performance. We then experimentally demonstrate that the proposed irregular polar codes can outperform state-of-the-art low-density parity-check (LDPC) codes, while decoding complexity and latency can be reduced by at least 30% and 70%, respectively, versus regular polar codes, while also obtaining a marginal performance improvement.
Wyner's work on wiretap channels and the recent works on information theoretic security are based on random codes. Achieving information theoretical security with practical coding schemes is of definite interest. ...
详细信息
ISBN:
(纸本)9781424480166
Wyner's work on wiretap channels and the recent works on information theoretic security are based on random codes. Achieving information theoretical security with practical coding schemes is of definite interest. In this note, the attempt is to overcome this elusive task by employing the polar coding technique of Arikan. It is shown that polar codes achieve nontrivial perfect secrecy rates for binary-input degraded wiretap channels while enjoying their low encoding-decoding complexity. In the special case of symmetric main and eavesdropper channels, this coding technique achieves the secrecy capacity. Next, fading erasure wiretap channels are considered and a secret key agreement scheme is proposed, which requires only the statistical knowledge of the eavesdropper channel state information (CSI). The enabling factor is the creation of advantage over Eve, by blindly using the proposed scheme over each fading block, which is then exploited with privacy amplification techniques to generate secret keys.
A capacity-achieving polar coding scheme is introduced for reliable communications over a set of parallel communication channels. They are assumed to be arbitrarily-permuted memoryless binary-input and output-symmetri...
详细信息
ISBN:
(纸本)9781424482641
A capacity-achieving polar coding scheme is introduced for reliable communications over a set of parallel communication channels. They are assumed to be arbitrarily-permuted memoryless binary-input and output-symmetric (MBIOS) channels, and they form a set of (stochastically) degraded channels. The general case where the parallel channels are not necessarily degraded is addressed in the full paper version [3], though the suggested scheme is not capacity-achieving in the general case.
This letter discusses a secrecy transmission scheme based on 2-D polar coding over block fading wiretap channels. Unlike the previous approaches using 1-D polar coding, we propose to encode the secret bits in two dime...
详细信息
This letter discusses a secrecy transmission scheme based on 2-D polar coding over block fading wiretap channels. Unlike the previous approaches using 1-D polar coding, we propose to encode the secret bits in two dimensions to adapt to variation of the instantaneous secrecy capacity. In the proposed scheme, intra-block coding in one dimension is used to guarantee reliability, and cross-block coding in the other dimension is used to combat eavesdropping. Theoretical analysis demonstrates that our scheme is able to achieve the maximum perfect secrecy rate asymptotically. Simulation results show that the equivocation rate of eavesdropper is close to the secrecy capacity of the system with finite codelength.
暂无评论