Security transmission method based on polarization code under parallel channel

A technology for secure transmission and polar codes, applied in the field of physical layer security, it can solve the problems that assumptions may not be established, the eavesdropping channel and the main channel do not satisfy the degradation relationship, etc., and achieve a wide range of application scenarios.

Active Publication Date: 2017-10-03
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the existing security transmission schemes based on polar codes can obtain security capacity, they all need to know the Channel Status Indicator (CSI, Channel Status Indicator) between Alice and Eve (some schemes need to know the instantaneous CSI, and some schemes need to know th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security transmission method based on polarization code under parallel channel
  • Security transmission method based on polarization code under parallel channel
  • Security transmission method based on polarization code under parallel channel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The implementation of the method of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0026] Let the code length be 1024, the information sequence length be 512, and the code rate be The channel is a parallel Additive White Gaussian Noise (AWGN, Additive White Gaussian Noise) channel, and the parallel channel contains 32 sub-channels. The decoding method uses a list-based serial cancellation (SCL, Successive Cancellation List) decoding algorithm, and the search path L =32. A polar code-based secure transmission method under parallel channels, comprising the following steps:

[0027] Step 1, channel quality selection. The 32 parallel sub-channels are used M=1024 / 32=32 times to construct 1024 polarized sub-channels, and the channel quality of the 1024 polarized sub-channels is calculated and sorted.

[0028] Step 2: Construct the sequence u to be encoded. Select 512 positions with the best channel quality from th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security transmission method based on a polarization code under a parallel channel, and belongs to the technical field of security of physical layers. According to the method, a mapping function is optimized according to channel state information of a main channel to achieve security transmission; the essence of the method is that the characteristic that the polarization code has different polaron channel information bit positions due to different parallel sub-channel arrangement modes under the parallel channel is used for adding the optimized mapping function according to the channel state information of the main channel after the polarization code is coded, and mapping information bits to different parallel sub-channels to transmit, an eavesdropping user cannot acquire the channel state of the main channel and thus cannot accurately decode encrypted information, so that security of information transmission is ensured. Compared the prior art, the method provided by the invention does not need to know channel quality of the eavesdropping channel, can be applied to the scene using the eavesdropping channel as the main channel, and is wider in application range.

Description

technical field [0001] The invention relates to a security information transmission method, in particular to a polar code-based security transmission method under parallel channels, and belongs to the technical field of physical layer security. Background technique [0002] In the 1970s, Wyner constructed the "eavesdropping channel" model based on the information theory method, as shown in the attached figure 1 shown, and analyzes the possibility of establishing an almost completely secure communication link without relying on exchanging keys. In Wyner's "eavesdropping channel" model, when the eavesdropping channel is a degenerated channel of the main channel, the channel capacity of the eavesdropper Eve is smaller than the channel capacity of the main channel, then there is a security greater than zero between the sender Alice and the information receiver Bob Capacity; at this time, there is a certain encoding method, so that the legitimate communicator Alice and Bob can c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L1/00H04L5/00
CPCH04L1/0009H04L5/0092H04L5/0094
Inventor 费泽松孙策贾岱
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products