{"title":"Raptor Code based on punctured LDPC for Secrecy in Massive MiMo","authors":"Djedjiga Benzid, M. Kadoch, M. Cheriet","doi":"10.1109/IWCMC.2019.8766490","DOIUrl":null,"url":null,"abstract":"In the future Fifth-Generation networks, the eavesdropping is a critical threat due to their broadcast-based transmission. This problem can be addressed with the cryptographic protocols. However, this method is complex and difficult because of the dynamic topology of wireless networks, which does not allow an efficient management of security keys. As a complement solution, Physical-layer security (PLS) is integrated to enhance secrecy in wireless networks. The PLS exploits the schemes features of this layer, namely the modulation, Massive Multi-Input Multi-Output(m-MiMo) and channel coding. The fountain code is one of those systems where the secrecy is provided when the destination retrieves packets encoded before the intruder. Nevertheless, the secrecy can not be guaranteed when eavesdropper uses large number of the antennas as in the m-MiMo. The feature of m-MiMo should be considered to secure main channel with fountain codes. Therefore, we propose to use Raptor code which is a class of fountain code, aided by an Artificial noise (AN) and the punctuated data to reduce the efficient of intruder channel. This allows the main channel to retrieve the signal before eavesdropper. The numerical results show that using Raptor code in massive MiMo enhances the reliability and the security on the channel of legitimate user, while minimizes the abilities of intruders to spy on data.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWCMC.2019.8766490","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
In the future Fifth-Generation networks, the eavesdropping is a critical threat due to their broadcast-based transmission. This problem can be addressed with the cryptographic protocols. However, this method is complex and difficult because of the dynamic topology of wireless networks, which does not allow an efficient management of security keys. As a complement solution, Physical-layer security (PLS) is integrated to enhance secrecy in wireless networks. The PLS exploits the schemes features of this layer, namely the modulation, Massive Multi-Input Multi-Output(m-MiMo) and channel coding. The fountain code is one of those systems where the secrecy is provided when the destination retrieves packets encoded before the intruder. Nevertheless, the secrecy can not be guaranteed when eavesdropper uses large number of the antennas as in the m-MiMo. The feature of m-MiMo should be considered to secure main channel with fountain codes. Therefore, we propose to use Raptor code which is a class of fountain code, aided by an Artificial noise (AN) and the punctuated data to reduce the efficient of intruder channel. This allows the main channel to retrieve the signal before eavesdropper. The numerical results show that using Raptor code in massive MiMo enhances the reliability and the security on the channel of legitimate user, while minimizes the abilities of intruders to spy on data.