Security Gap Improvement of BICM Systems Through Bit-Labeling Optimization for the Gaussian Wiretap Channel
نویسندگان
چکیده
In this paper, we investigate the impact of a bit-labeling scheme on security performance bit-interleaved coded modulation (BICM) systems for Gaussian wiretap channel, where concept gap plays an important role. To exemplify this, present optimization algorithms bit-labeling, difference achievable information rates (AIRs) legitimate receiver and eavesdropper is maximized. Our results demonstrate that conventional Gray labeling may not be necessarily optimal in terms gap, proposed can significantly improve its at cost degradation bit-error rate (BER) by receiver. We also that, high order quadrature amplitude (QAM), such as 64QAM, dimension-wise sufficient to achieve similar direct two-dimensional optimization. The approach combined with state-of-the-art coding schemes further reduce gap.
منابع مشابه
Lattice Codes for the Gaussian Wiretap Channel
We consider the Gaussian wiretap channel, where two legitimate players Alice and Bob communicate over an additive white Gaussian noise (AWGN) channel, while Eve is eavesdropping, also through an AWGN channel. We propose a coding strategy based on lattice coset encoding. We analyze Eve’s probability of decoding, from which we define the secrecy gain as a design criterion for wiretap lattice code...
متن کاملSemantic Security for the Wiretap Channel
The wiretap channel is a setting where one aims to provide information-theoretic privacy of communicated data based solely on the assumption that the channel from sender to adversary is “noisier” than the channel from sender to receiver. It has developed in the Information and Coding (I&C) community over the last 30 years largely divorced from the parallel development of modern cryptography. Th...
متن کاملchannel estimation for mimo-ofdm systems
تخمین دقیق مشخصات کانال در سیستم های مخابراتی یک امر مهم محسوب می گردد. این امر به ویژه در کانال های بیسیم با خاصیت فرکانس گزینی و زمان گزینی شدید، چالش بزرگی است. مقالات متعدد پر از روش های مبتکرانه ای برای طراحی و آنالیز الگوریتم های تخمین کانال است که بیشتر آنها از روش های خاصی استفاده می کنند که یا دارای عملکرد خوب با پیچیدگی محاسباتی بالا هستند و یا با عملکرد نه چندان خوب پیچیدگی پایینی...
Private Information Retrieval Through Wiretap Channel II: Privacy Meets Security
We consider the problem of private information retrieval through wiretap channel II (PIR-WTC-II). In PIR-WTC-II, a user wants to retrieve a single message (file) privately out of M messages, which are stored in N replicated and non-communicating databases. An external eavesdropper observes a fraction μn (of its choice) of the traffic exchanged between the nth database and the user. In addition ...
متن کاملOn the Gaussian Multiple Access Wiretap Channel and the Gaussian Wiretap Channel with a Helper: Achievable Schemes and Upper Bounds
We study deterministic approximations of the Gaussian two-user multiple access wiretap channel (G-MAC-WT) and the Gaussian wiretap channel with a helper (G-WT-H). These approximations enable results beyond the recently shown 2/3 and 1/2 secure degrees of freedom (s.d.o.f.) for the G-MAC-WT and the G-WT-H, respectively. While the s.d.o.f. were obtained by real interference alignment, our approac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2022
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2022.3172481