A Method Based on Puncturing Polar Codes for Physical Layer Security
-
摘要: 为了解决物理层安全编码中安全性和可靠性之间的矛盾和提高保密速率,该文提出一种基于打孔极化码的安全编码方法。根据信道极化理论,该方法将私密信息位映射到合法者正常接收而窃听者无法译码的特定逻辑信道输入位,保证私密信息可靠且安全传输。然后,通过分析极化码的校验关系树,利用3个参数表征输出节点对私密信息位的影响,再按照影响程度大小确定打孔位置。理论分析与仿真结果表明,该方法保证私密信息传输安全性和可靠性的同时,提高了私密信息传输的有效性。Abstract: To solve the confliction between the security and reliability of physical layer security codes and improve the secrecy rate, a security coding method based on puncturing polar codes is proposed. In order to keep the security and reliability, the confidential information is mapped to the specific input proposition which could be decoded by legal receiver but be equivocal for eavesdropper based on channel polarization theory. By analyzing the check trees of polar codes, the puncturing pattern is designed based on the influences of outputs on confidential information which are described by three parameters. The theoretical analysis and simulation results verify that the proposed method is able to guarantee simultaneously the security and reliability while improving the efficiency of the confidential information.
-
Key words:
- Wireless communication /
- Physical layer security /
- Security coding /
- Polar codes /
- Puncture
计量
- 文章访问数: 1848
- HTML全文浏览量: 106
- PDF下载量: 1058
- 被引次数: 0