High-Quality Secure Wireless Transmission Scheme Using Polar Codes and Radio-Wave Encrypted Modulation

IF 0.7 4区 计算机科学 Q3 Engineering IEICE Transactions on Communications Pub Date : 2023-01-01 DOI:10.1587/transcom.2022ebp3098
Keisuke Asano, Mamoru Okumura, T. Abe, E. Okamoto, Tetsuya Yamamoto
{"title":"High-Quality Secure Wireless Transmission Scheme Using Polar Codes and Radio-Wave Encrypted Modulation","authors":"Keisuke Asano, Mamoru Okumura, T. Abe, E. Okamoto, Tetsuya Yamamoto","doi":"10.1587/transcom.2022ebp3098","DOIUrl":null,"url":null,"abstract":"SUMMARY In recent years, physical layer security (PLS), which is based on information theory and whose strength does not depend on the eavesdropper’s computing capability, has attracted much attention. We have proposed a chaos modulation method as one PLS method that o ff ers channel coding gain. One alternative is based on polar codes. They are robust error-correcting codes, have a nested structure in the encoder, and the application of this mechanism to PLS encryption (PLS-polar) has been actively studied. However, most conventional studies assume the application of conventional linear modulation such as BPSK, do not use encryption modulation, and the channel coding gain in the modulation is not achieved. In this paper, we propose a PLS-polar method that can realize high-quality transmission and encryption of a modulated signal by applying chaos modulation to a polar-coding system. Numerical results show that the proposed method improves the performance compared to the conventional PLS-polar method by 0.7dB at a block error rate of 10 − 5 . In addition, we show that the proposed method is superior to conventional chaos modulation concatenated with low-density parity-check codes, indicating that the polar code is more suitable for chaos modulation. Finally, it is demonstrated that the proposed method is secure in terms of information theoretical and computational security.","PeriodicalId":48825,"journal":{"name":"IEICE Transactions on Communications","volume":"37 1","pages":"374-383"},"PeriodicalIF":0.7000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEICE Transactions on Communications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1587/transcom.2022ebp3098","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 2

Abstract

SUMMARY In recent years, physical layer security (PLS), which is based on information theory and whose strength does not depend on the eavesdropper’s computing capability, has attracted much attention. We have proposed a chaos modulation method as one PLS method that o ff ers channel coding gain. One alternative is based on polar codes. They are robust error-correcting codes, have a nested structure in the encoder, and the application of this mechanism to PLS encryption (PLS-polar) has been actively studied. However, most conventional studies assume the application of conventional linear modulation such as BPSK, do not use encryption modulation, and the channel coding gain in the modulation is not achieved. In this paper, we propose a PLS-polar method that can realize high-quality transmission and encryption of a modulated signal by applying chaos modulation to a polar-coding system. Numerical results show that the proposed method improves the performance compared to the conventional PLS-polar method by 0.7dB at a block error rate of 10 − 5 . In addition, we show that the proposed method is superior to conventional chaos modulation concatenated with low-density parity-check codes, indicating that the polar code is more suitable for chaos modulation. Finally, it is demonstrated that the proposed method is secure in terms of information theoretical and computational security.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用极码和无线电波加密调制的高质量安全无线传输方案
近年来,以信息论为基础、不依赖于窃听者计算能力的物理层安全技术受到了广泛的关注。我们提出了一种混沌调制方法作为一种PLS方法,它可以提供信道编码增益。另一种选择是基于极性代码。它们是鲁棒纠错码,在编码器中具有嵌套结构,并且这种机制在PLS加密(PLS-polar)中的应用已经得到了积极的研究。然而,传统研究大多假设应用BPSK等传统线性调制,不采用加密调制,在调制中无法实现信道编码增益。在本文中,我们提出了一种PLS-polar方法,通过将混沌调制应用于polar编码系统,可以实现调制信号的高质量传输和加密。数值结果表明,该方法在分组误差率为10−5的情况下,比传统的PLS-polar方法提高了0.7dB。此外,我们还证明了该方法优于传统的混沌调制与低密度奇偶校验码的连接,表明极性码更适合混沌调制。最后,从信息理论安全性和计算安全性两方面验证了该方法的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEICE Transactions on Communications
IEICE Transactions on Communications ENGINEERING, ELECTRICAL & ELECTRONIC-TELECOMMUNICATIONS
CiteScore
1.50
自引率
28.60%
发文量
101
期刊介绍: The IEICE Transactions on Communications is an all-electronic journal published occasionally by the Institute of Electronics, Information and Communication Engineers (IEICE) and edited by the Communications Society in IEICE. The IEICE Transactions on Communications publishes original, peer-reviewed papers that embrace the entire field of communications, including: - Fundamental Theories for Communications - Energy in Electronics Communications - Transmission Systems and Transmission Equipment for Communications - Optical Fiber for Communications - Fiber-Optic Transmission for Communications - Network System - Network - Internet - Network Management/Operation - Antennas and Propagation - Electromagnetic Compatibility (EMC) - Wireless Communication Technologies - Terrestrial Wireless Communication/Broadcasting Technologies - Satellite Communications - Sensing - Navigation, Guidance and Control Systems - Space Utilization Systems for Communications - Multimedia Systems for Communication
期刊最新文献
Service Deployment Model with Virtual Network Function Resizing Based on Per-Flow Priority Optimizing Edge-Cloud Cooperation for Machine Learning Accuracy Considering Transmission Latency and Bandwidth Congestion Intrusion Detection Model of Internet of Things Based on LightGBM Sub-Signal Channel Modulation for Hitless Redundancy Switching Systems A Resource-Efficient Green Paradigm For Crowdsensing Based Spectrum Detection In Internet of Things Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1