Advanced Search
Volume 36 Issue 12
Jan.  2015
Turn off MathJax
Article Contents
Yi Ming, Ji Xin-Sheng, Huang Kai-Zhi, Jin Liang, Wang Jing. A Method Based on Puncturing Polar Codes for Physical Layer Security[J]. Journal of Electronics & Information Technology, 2014, 36(12): 2835-2841. doi: 10.3724/SP.J.1146.2014.00013
Citation: Yi Ming, Ji Xin-Sheng, Huang Kai-Zhi, Jin Liang, Wang Jing. A Method Based on Puncturing Polar Codes for Physical Layer Security[J]. Journal of Electronics & Information Technology, 2014, 36(12): 2835-2841. doi: 10.3724/SP.J.1146.2014.00013

A Method Based on Puncturing Polar Codes for Physical Layer Security

doi: 10.3724/SP.J.1146.2014.00013
  • Received Date: 2014-01-03
  • Rev Recd Date: 2014-03-05
  • Publish Date: 2014-12-19
  • To solve the confliction between the security and reliability of physical layer security codes and improve the secrecy rate, a security coding method based on puncturing polar codes is proposed. In order to keep the security and reliability, the confidential information is mapped to the specific input proposition which could be decoded by legal receiver but be equivocal for eavesdropper based on channel polarization theory. By analyzing the check trees of polar codes, the puncturing pattern is designed based on the influences of outputs on confidential information which are described by three parameters. The theoretical analysis and simulation results verify that the proposed method is able to guarantee simultaneously the security and reliability while improving the efficiency of the confidential information.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1850) PDF downloads(1058) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return