In this paper, for physical-layer security(PLS), a novel scheme of polar coding encryption is introduced in the wiretap channel(WTC) model. To decrease transmission overhead of the shared secret information and enhanc...In this paper, for physical-layer security(PLS), a novel scheme of polar coding encryption is introduced in the wiretap channel(WTC) model. To decrease transmission overhead of the shared secret information and enhance the security performance against an attacker, we have employed the two following encryption technologies: Firstly, randomization of output bits is not dependent on the traditional randomized bit-channels but they are directly flipped through the random bit sequence. Secondly, for employing Advanced Encryption Standard(AES), we utilize the secret seed to extend an initial secret key of AES cryptosystem, which it appears a good avalanche performance. Result analyses demonstrate that the proposed scheme is strongly resistant against conventional attacks.展开更多
Recently, physical layer security in wireless communication system attracts much attention, and the reconciliation protocol plays an important role in the final secure key distillation, since the secret keys extracted...Recently, physical layer security in wireless communication system attracts much attention, and the reconciliation protocol plays an important role in the final secure key distillation, since the secret keys extracted from the realistic characteristics of the wireless channel may not be the same between the transmitter and legitimate receiver. A high efficiency Polar coding key reconciliation scheme is proposed in the paper to correct these errors. In the scheme, the transmitter generates a random stream with the known frozen bits and positions. After that, the transmitter encodes the random bit stream to a code stream by Polar encoding and sends the corrupted version of the code stream and the secret keys to the legitimate receiver. The receiver decodes the received stream with Polar successive cancellation decoding algorithm. With Polar encoding, the receiver obtains a random bit stream, and achieves the final secure key by XOR operator. The results show that the proposed scheme has a higher efficiency and a lower computational complexity, along with a high success rate. The consistency of the keys is very good after the reconciliation.展开更多
极化码是适用于物理层wiretap信道安全模型的一种编码方式,针对在超奈奎斯特(FTN)条件下传输的极化码,设计了一种无需获知窃听信道信噪比(SNR)的帧间链式加密的安全结构。通过混淆结构将对合法接收端可靠而对非法窃听端阻塞的码元进行扩...极化码是适用于物理层wiretap信道安全模型的一种编码方式,针对在超奈奎斯特(FTN)条件下传输的极化码,设计了一种无需获知窃听信道信噪比(SNR)的帧间链式加密的安全结构。通过混淆结构将对合法接收端可靠而对非法窃听端阻塞的码元进行扩散,利用物理层主信道和窃听信道的差异,在每一帧中生成主信道可译而窃听信道不可译的密钥序列,对下一帧进行加密,实现安全容量的帧间传输。仿真结果显示,在FTN加速场景和窃听信道SNR相对于主信道波动的前提下,提出的极化码帧间安全结构可在wiretap信道的平均信道退化程度为0 d B时实现信息的安全传输。展开更多
基金supported in part by the National Natural Science Foundation of China (Grant No. 61871009)
文摘In this paper, for physical-layer security(PLS), a novel scheme of polar coding encryption is introduced in the wiretap channel(WTC) model. To decrease transmission overhead of the shared secret information and enhance the security performance against an attacker, we have employed the two following encryption technologies: Firstly, randomization of output bits is not dependent on the traditional randomized bit-channels but they are directly flipped through the random bit sequence. Secondly, for employing Advanced Encryption Standard(AES), we utilize the secret seed to extend an initial secret key of AES cryptosystem, which it appears a good avalanche performance. Result analyses demonstrate that the proposed scheme is strongly resistant against conventional attacks.
基金supported by the National Natural Science Foundation of China (61871234,61475075)
文摘Recently, physical layer security in wireless communication system attracts much attention, and the reconciliation protocol plays an important role in the final secure key distillation, since the secret keys extracted from the realistic characteristics of the wireless channel may not be the same between the transmitter and legitimate receiver. A high efficiency Polar coding key reconciliation scheme is proposed in the paper to correct these errors. In the scheme, the transmitter generates a random stream with the known frozen bits and positions. After that, the transmitter encodes the random bit stream to a code stream by Polar encoding and sends the corrupted version of the code stream and the secret keys to the legitimate receiver. The receiver decodes the received stream with Polar successive cancellation decoding algorithm. With Polar encoding, the receiver obtains a random bit stream, and achieves the final secure key by XOR operator. The results show that the proposed scheme has a higher efficiency and a lower computational complexity, along with a high success rate. The consistency of the keys is very good after the reconciliation.
文摘极化码是适用于物理层wiretap信道安全模型的一种编码方式,针对在超奈奎斯特(FTN)条件下传输的极化码,设计了一种无需获知窃听信道信噪比(SNR)的帧间链式加密的安全结构。通过混淆结构将对合法接收端可靠而对非法窃听端阻塞的码元进行扩散,利用物理层主信道和窃听信道的差异,在每一帧中生成主信道可译而窃听信道不可译的密钥序列,对下一帧进行加密,实现安全容量的帧间传输。仿真结果显示,在FTN加速场景和窃听信道SNR相对于主信道波动的前提下,提出的极化码帧间安全结构可在wiretap信道的平均信道退化程度为0 d B时实现信息的安全传输。