用户名: 密码: 验证码:
一种改进的防窃听LT码
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:An Improved LT Codes in Anti-Eavesdropping Method
  • 作者:牛芳琳 ; 王南 ; 王冬霞 ; 于玲 ; 孙福明
  • 英文作者:NIU Fanglin;WANG Nan;WANG Dongxia;YU Ling;SUN Fuming;School of Electronics and Information Engineering,Liaoning University of Technology;
  • 关键词:窃听信道 ; LT码 ; RSD度分布函数 ; BP译码 ; 删除信道
  • 英文关键词:eavesdropping channel;;LT(Luby transform)codes;;robust soliton distribution;;belief propagation decoder;;erasure channel
  • 中文刊名:WHDY
  • 英文刊名:Journal of Wuhan University(Natural Science Edition)
  • 机构:辽宁工业大学电子与信息工程学院;
  • 出版日期:2019-03-11 14:40
  • 出版单位:武汉大学学报(理学版)
  • 年:2019
  • 期:v.65;No.294
  • 基金:辽宁省自然科学基金指导计划项目(201602373);; 辽宁省教育厅高校基本科研项目(JQL201715405)
  • 语种:中文;
  • 页:WHDY201902008
  • 页数:5
  • CN:02
  • ISSN:42-1674/N
  • 分类号:88-92
摘要
为了进一步提高LT(Luby transform)码的防窃听能力,提出将部分编码矩阵列依据度的大小由高到低重新排列,推迟发送度1符号,以延迟译码开始时间,阻止信息被窃听。实验结果表明,与传统的LT码相比,改进的LT码作为信道编码在保证接收者恢复信源信息的同时,迫使窃听者的误码率大幅度增加,当窃听信道删除概率高于主信道时候,误码率增幅更为明显。
        In order to improve the anti-eavesdropping ability of LT(Luby transform)codes, this paper proposes the method that the part of the columns in the coding matrix is re-arranged from high to low according to the degree of LT codes, to delay the start time of decoding by delaying the symbols of degree 1. And the aim of preventing eavesdropping is realized. Experimental results show that compared with LT codes, the improved LT codes as channel codes force the eavesdroppers BER to increase greatly while guaranteeing the receiver to recover the source information, and the bit error rate increases more obviously when the deletion probability of the eavesdropping channel is higher than that of the main channel.
引文
[1]MAO W.Modern Cryptography:Theory and Practice[M].New Jersey:Prentice Hall Professional Technical Reference,2003.
    [2]KASAHARA M,SAKAI R.A construction of publickey cryptosystem based on singular simultaneous equations[J].IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences,2005,88-A(1):74-80.
    [3]WYNER A D.The wire-tap channel[J].Bell Labs Technical Journal,1975,54(8):1355-1387.
    [4]MCELIECE R J.A Public-key Cryptosystem Based on Algebraic Coding Theory[DB/OL].[2018-06-07].http://www.cs.colorado.edu/~jrblack/class/csci7000/f03/papers/mceliece.pdf?origin=publication_detail.
    [5]KOYLUOGLU O O,GAMAL H E.Polar coding for secure transmission and key agreement[C]//IEEE International Symposium on Personal,Indoor and Mobile Radio Communications.Washington D C:IEEE,2010:2698-2703.DOI:10.1109/PIMRC.2010.5671797.
    [6]XU H Z,FENG D,SUN C,et al.Construction of LDPCcodes based on resolvable group divisible designs[C]//International Workshop on High Mobility Wireless Communications.Washington D C:IEEE,2015:111-115.DOI:10.1109/HMWC.2015.7354346.
    [7]GOEL S,NEGI R.Guaranteeing secrecy using artificial noise[J].IEEE Transactions on Wireless Communications,2008,7(6):2180-2189.
    [8]LIN P H,LAI S H,LIN S C,et al.On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels[J].IEEE Journal on Selected Areas in Communications,2012,31(9):1728-1740.
    [9]WANG B,MU P,LI Z.Secrecy rate maximization with artificial-noise-aided beamforming for MISO wiretap channels under secrecy outage constraint[J].IEEE Communications Letters,2015,19(1):18-21.
    [10]SARMA S,KURI J.SNR based secure communication via untrusted amplify-and-forward relay nodes using artificial noise[J].Wireless Networks,2018,24(1):127-138.
    [11]ZHENG T X,WANG H M,DENG H.Improving antieavesdropping ability without eavesdropper.s CSI:A practical secure transmission design perspective[J].IEEEWireless Communications Letters,2018(99):1.DOI:10.1109/LWC.2018.2840152.
    [12]LUBY M.LT Codes[C]//Symposium on Foundations of Computer Science.Washington D C:IEEE Computer Society,2002:271-280.
    [13]NIU H,IWAI M,SEZAKI K,et al.Exploiting fountain codes for secure wireless delivery[J].IEEE Communications Letters,2014,18(5):777-780.
    [14]雷维嘉,盛洁,谢显中.增强安全性的LT码编译码方案[J].北京邮电大学学报,2016,39(4):108-113.LEI W J,SHENG J,XIE X Z.Encoding and decoding scheme of security-enhanced LT codes[J].Journal of Beijing University of Posts and Telecommunications,2016,39(4):108-113(Ch).
    [15]刘政,牛芳琳,钱大兴,等.基于喷泉码的防窃听编码设计[J].山东大学学报(理学版),2018,53(7):60-64.LIU Z,NIU F L,QIAN D X,et al.Design of anti-eavesdropping code based on fountain codes[J].Journal of Shandong University(Natural Science),2018,53(7):60-64(Ch).

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700