Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An awgn-wiretap channel anti-eavesdropping security structure based on polar codes and its implementation method

A technology of security structure and implementation method, which is applied in the field of communication, can solve the problems such as the non-negligible bit error rate of the physical layer and the failure of ciphertext decryption, etc., and achieve a high decoding error rate, simple composition, and flexible and adjustable secure transmission rate Effect

Active Publication Date: 2019-04-12
BEIHANG UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, most of the confidential communication systems of wireless communication are based on the assumption of no bit error rate transmission at the physical layer. However, in wireless networks, due to a series of influences such as channel fading and noise, the bit error rate of the physical layer cannot be ignored. The ciphertext is not necessarily consistent with the sender, and the transmission error of the ciphertext can lead to the failure of decryption, so the design of the error correction code at the physical layer is of great significance to the security system of wireless communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An awgn-wiretap channel anti-eavesdropping security structure based on polar codes and its implementation method
  • An awgn-wiretap channel anti-eavesdropping security structure based on polar codes and its implementation method
  • An awgn-wiretap channel anti-eavesdropping security structure based on polar codes and its implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0094] This example illustrates the obfuscation / de-obfuscation method for polar coded signals under AWGN-wiretap channel. In this example, the Polar code used has a code length of 2048, and the total length of transmission symbols is 10000 frames. The signal-to-noise ratio of the legal main channel is fixed at 5dB, and Bob’s anchor bit error rate is set to P gap (Bob) is 1e-5, the required polar code transmission code rate is 0.11, and Alice estimates that the signal-to-noise ratio of the eavesdropper is more than 1dB lower than that of the legitimate channel, then Alice sets the channel ratio of Eve to 4dB. According to the Gaussian density evolution calculation, it can be obtained that at Bob=5dB, Eve 估 M-set and S-set when =4dB.

[0095] Then the concrete steps of applying the inventive method are as follows:

[0096] Step 1: Complement the symbols of the M set to the S set to make its length 112, which is recorded as the S' set. Select 112 symbols from the other symbol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an AWGN-wiretap channel anti-wiretapping security structure based on polar code and an implementation method thereof, belonging to the field of communication. The anti-wiretapping security structure includes a sending end confusing structure and a legal receiving end de-confusing structure; the sending end confusing structure includes a sequential exclusive or (XOR) device, a confusion interleaver and a nonlinear searching table S-box; and the legal receiving end de-confusing structure includes a sequential XOR device, a de-confusing interleaver and a reverse S-box. The de-confusing structure is symmetric with the confusing structure. The de-confusing structure and the confusing structure can be completed in the same set of hardware, so that the composition of the anti-wiretapping security structure is simpler. The sequential XOR device and the confusion interleaver are of linear confusion structures, but the S-box is of a nonlinear confusion structure. The nonlinear confusion structure can reduce the correlation between input and output, and can resist differential fault attacks effectively, but the linear confusion structure is helpful for error bit spread of a single-bit code unit, therefore, it is difficult for an eavesdropper to obtain any information by means of violent enumeration or analysis of differential probability of signals.

Description

technical field [0001] The invention belongs to the communication field, and in particular relates to an AWGN-wiretap channel anti-eavesdropping security structure based on polar codes and an implementation method thereof. Background technique [0002] At present, most of the confidential communication systems of wireless communication are based on the assumption of no bit error rate transmission at the physical layer. However, in wireless networks, due to a series of influences such as channel fading and noise, the bit error rate of the physical layer cannot be ignored. The ciphertext is not necessarily consistent with the sender, and the transmission error of the ciphertext can lead to the failure of decryption, so the design of the error correction code at the physical layer is of great significance to the security system of wireless communication. [0003] In addition, because the information of the wireless channel is loaded on the communication carrier and spreads free...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04K3/00H04L1/00
CPCH04K3/825H04L1/0057H04L1/0068H04L1/0071
Inventor 刘荣科张晨宇穆斯塔法赵岭
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products