Physical Layer Security Design for Polar Code Construction

نویسندگان

چکیده

In contrast to the network security that relies on upper-layer encryption for confidentiality and authenticity of communications, physical layer (PLS) exploits uniqueness randomness channel encrypt information enhance system. this paper, we study PLS a polar-coded wireless communication To be more specific, leverage unique properties in polar code construction propose quality indicator (CQI)-based frozen-bit pattern generation scheme. The transmitter employs Gaussian approximation algorithm generate corresponding frozen bit according instantaneous CQI legitimate link. At receiver, by leveraging full reciprocity time-division duplex (TDD) mode, can map correctly decode received bits. By contrast, eavesdropper was unable have knowledge legal channel, hence cannot determine sequence. Our simulation results demonstrate adopting proposed key scheme, Eve hardly able complete frame, leading high block error rate (BLER), while Bob attain 10−5 BLER.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Polar Code Construction for List Decoding

A heuristic construction of polar codes for successive cancellation list (SCL) decoding with a given list size is proposed to balance the trade-off between performance measured in frame error rate (FER) and decoding complexity. Furthermore, a construction based on dynamically frozen bits with constraints among the ”low weight bits” (LWB) is presented. Simulation results show that the LWB-polar ...

متن کامل

Strange Attractor for Efficient Polar Code Design

This paper presents a definition of a construction for long polar codes. Recently, we know that partial order is a universal property of the construction with a sublinear complexity for polar codes. In order to describe the partial order, addition and left-swap operators are only defined as universal up to now. In this study, we first propose 1 + log2 log2 N universal operators to describe mult...

متن کامل

Physical Layer Security Issues

Conventional wired networks are subject to being tapped by a variety of means, whether copper or fiber connections are used. In addition, methods of network snooping exist that make such eavesdropping minimally invasive, but no less significant. Wireless networking has additional characteristics that also decrease physical network security. As new technologies emerge, the potential for loss of ...

متن کامل

Wireless Physical Layer Security

Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical...

متن کامل

Physical layer security in wireless networks : design and enhancement

Security and privacy have become increasingly significant concerns in wireless communication networks, due to the open nature of the wireless medium which makes the wireless transmission vulnerable to eavesdropping and inimical attacking. The emergence and development of decentralized and ad-hoc wireless networks pose great challenges to the implementation of higher-layer key distribution and m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cryptography

سال: 2022

ISSN: ['2410-387X']

DOI: https://doi.org/10.3390/cryptography6030035