Advanced Search
Volume 42 Issue 12
Dec.  2020
Turn off MathJax
Article Contents
Kaizhi HUANG, Zheng WAN, Yangming LOU, Shuaifang XIAO, Xiaoming XU. Physical Layer Secure Transmission Scheme with Joint Polar Codes and Non-reconciliation Secret Keys[J]. Journal of Electronics & Information Technology, 2020, 42(12): 2946-2952. doi: 10.11999/JEIT190948
Citation: Kaizhi HUANG, Zheng WAN, Yangming LOU, Shuaifang XIAO, Xiaoming XU. Physical Layer Secure Transmission Scheme with Joint Polar Codes and Non-reconciliation Secret Keys[J]. Journal of Electronics & Information Technology, 2020, 42(12): 2946-2952. doi: 10.11999/JEIT190948

Physical Layer Secure Transmission Scheme with Joint Polar Codes and Non-reconciliation Secret Keys

doi: 10.11999/JEIT190948
Funds:  The National Natural Science Foundation of China (61701538, 61871404, 61801435), The National Natural Science Foundation Innovative Groups Project of China (61521003)
  • Received Date: 2019-11-01
  • Rev Recd Date: 2020-09-08
  • Available Online: 2020-09-14
  • Publish Date: 2020-12-08
  • The existing key generation scheme requires additional key reconciliation protocol in a communication process, resulting in the limited application to the communication system, such as the Fifth-Generation mobile communication (5G). A physical layer secure transmission scheme with a joint polar code and non-reconciliation secret keys is proposed. Firstly, the non-reconciliation physical layer keys are extracted from the channel feature, and then the polar code is designed based on the equivalent channel, which is formed by the physical channel and the key encryption channel. Finally, the encoded sequence is simply modular plus encrypted and transmitted using the non-reconciliation physical layer key. Key differences and noise-induced bit errors are corrected through a targeted design of polarization codes to achieve reliable and secure transmission. The simulation shows that the polar code based on the equivalent channel can ensure the reliable transmission between two legitimate users at the optimal code rate.

  • loading
  • JI Xinsheng, HUANG Kaizhi, JIN Liang, et al. Overview of 5G security technology[J]. Science China Information Sciences, 2018, 61(8): 081301. doi: 10.1007/s11432-017-9426-4
    JIAO Long, WANG Ning, WANG Pu, et al. Physical layer key generation in 5G wireless networks[J]. IEEE Wireless Communications, 2019, 26(5): 48–54. doi: 10.1109/MWC.001.1900061
    WU Yongpeng, KHISTI A, XIAO Chengshan, et al. A survey of physical layer security techniques for 5G wireless networks and challenges ahead[J]. IEEE Journal on Selected Areas in Communications, 2018, 36(4): 679–695. doi: 10.1109/JSAC.2018.2825560
    LI Guyue, SUN Chen, ZHANG Junqing, et al. Physical layer key generation in 5G and beyond wireless communications: Challenges and opportunities[J]. Entropy, 2019, 21(5): 497. doi: 10.3390/e21050497
    LI Guyue, ZHANG Zheying, Yu Yi, et al. A hybrid information reconciliation method for physical layer key generation[J]. Entropy, 2019, 21(7): 688. doi: 10.3390/e21070688
    PENG Linning, LI Guyue, ZHANG Junqing, et al. Securing M2M transmissions using nonreconciled secret keys generated from wireless channels[C]. 2018 IEEE Globecom Workshops, Abu Dhabi, The United Arab Emirates, 2018: 1–6.
    ASSALINI A, DALL’ANESE E, and PUPOLIN S. Linear MMSE MIMO channel estimation with imperfect channel covariance information[C]. 2009 IEEE International Conference on Communications, Dresden, Germany, 2009: 1–5.
    HU Xiaoyan, JIN Liang, and ZHONG Zhou. A scrambling scheme based on random wireless channel characteristics for secure transmission[C]. The 2020 12th International Conference on Communication Software and Networks, Chongqing, China, 2020: 29–38.
    ISLAM N, GRAUR O, FILIP A, et al. LDPC code design aspects for physical-layer key reconciliation[C]. 2015 IEEE Global Communications Conference, San Diego, USA, 2015: 1–7.
    ARIKAN E. Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels[J]. IEEE Transactions on information Theory, 2009, 55(7): 3051–3073. doi: 10.1109/TIT.2009.2021379
    TRIFONOV P. Efficient design and decoding of polar codes[J]. IEEE Transactions on Communications, 2012, 60(11): 3221–3227. doi: 10.1109/TCOMM.2012.081512.110872
    张胜军, 钟州, 金梁, 等. 基于安全极化码的密钥协商方法[J]. 电子与信息学报, 2019, 41(6): 1413–1419. doi: 10.11999/JEIT180896

    ZHANG Shengjun, ZHONG Zhou, JIN Liang, et al. Secret key agreement based on secure polar code[J]. Journal of Electronics &Information Technology, 2019, 41(6): 1413–1419. doi: 10.11999/JEIT180896
    ZHANG Shengjun, JIN Liang, HUANG Yu, et al. Nonagreement secret key generation based on spatial symmetric scrambling and secure polar coding[J]. Scientia Sinica Informationis, 2019, 49(4): 486–502. doi: 10.1360/N112018-00119
    白慧卿, 金梁, 肖帅芳. 多天线系统中面向物理层安全的极化编码方法[J]. 电子与信息学报, 2017, 39(11): 2587–2593. doi: 10.11999/JEIT170068

    BAI Huiqing, JIN Liang, XIAO Shuaifang, et al. Polar code for physical layer security in multi-antenna systems[J]. Journal of Electronics &Information Technology, 2017, 39(11): 2587–2593. doi: 10.11999/JEIT170068
    Final report of 3GPP TSG RAN WG1 #88bis v1.0. 0[R]. 2017.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(7)  / Tables(2)

    Article Metrics

    Article views (1518) PDF downloads(107) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return