基于穿刺LDPC的大规模MiMo保密Raptor代码

Djedjiga Benzid, M. Kadoch, M. Cheriet
{"title":"基于穿刺LDPC的大规模MiMo保密Raptor代码","authors":"Djedjiga Benzid, M. Kadoch, M. Cheriet","doi":"10.1109/IWCMC.2019.8766490","DOIUrl":null,"url":null,"abstract":"In the future Fifth-Generation networks, the eavesdropping is a critical threat due to their broadcast-based transmission. This problem can be addressed with the cryptographic protocols. However, this method is complex and difficult because of the dynamic topology of wireless networks, which does not allow an efficient management of security keys. As a complement solution, Physical-layer security (PLS) is integrated to enhance secrecy in wireless networks. The PLS exploits the schemes features of this layer, namely the modulation, Massive Multi-Input Multi-Output(m-MiMo) and channel coding. The fountain code is one of those systems where the secrecy is provided when the destination retrieves packets encoded before the intruder. Nevertheless, the secrecy can not be guaranteed when eavesdropper uses large number of the antennas as in the m-MiMo. The feature of m-MiMo should be considered to secure main channel with fountain codes. Therefore, we propose to use Raptor code which is a class of fountain code, aided by an Artificial noise (AN) and the punctuated data to reduce the efficient of intruder channel. This allows the main channel to retrieve the signal before eavesdropper. The numerical results show that using Raptor code in massive MiMo enhances the reliability and the security on the channel of legitimate user, while minimizes the abilities of intruders to spy on data.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Raptor Code based on punctured LDPC for Secrecy in Massive MiMo\",\"authors\":\"Djedjiga Benzid, M. Kadoch, M. Cheriet\",\"doi\":\"10.1109/IWCMC.2019.8766490\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the future Fifth-Generation networks, the eavesdropping is a critical threat due to their broadcast-based transmission. This problem can be addressed with the cryptographic protocols. However, this method is complex and difficult because of the dynamic topology of wireless networks, which does not allow an efficient management of security keys. As a complement solution, Physical-layer security (PLS) is integrated to enhance secrecy in wireless networks. The PLS exploits the schemes features of this layer, namely the modulation, Massive Multi-Input Multi-Output(m-MiMo) and channel coding. The fountain code is one of those systems where the secrecy is provided when the destination retrieves packets encoded before the intruder. Nevertheless, the secrecy can not be guaranteed when eavesdropper uses large number of the antennas as in the m-MiMo. The feature of m-MiMo should be considered to secure main channel with fountain codes. Therefore, we propose to use Raptor code which is a class of fountain code, aided by an Artificial noise (AN) and the punctuated data to reduce the efficient of intruder channel. This allows the main channel to retrieve the signal before eavesdropper. The numerical results show that using Raptor code in massive MiMo enhances the reliability and the security on the channel of legitimate user, while minimizes the abilities of intruders to spy on data.\",\"PeriodicalId\":363800,\"journal\":{\"name\":\"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IWCMC.2019.8766490\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWCMC.2019.8766490","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

在未来的第五代网络中,由于其基于广播传输,窃听是一个严重的威胁。这个问题可以通过加密协议来解决。然而,由于无线网络的动态拓扑结构,这种方法复杂而困难,不能有效地管理安全密钥。作为一种补充解决方案,集成了物理层安全(PLS)来增强无线网络的保密性。PLS利用了这一层的特点,即调制、大规模多输入多输出(m-MiMo)和信道编码。喷泉码是这样一种系统,当目的地检索在入侵者之前编码的数据包时,就提供了保密性。然而,在m-MiMo中,当窃听者使用大量天线时,其保密性无法得到保证。应该考虑m-MiMo的特性,用喷泉码保护主通道。因此,我们提出使用Raptor码作为喷泉码的一种,在人工噪声(an)和标点数据的辅助下降低入侵信道的效率。这允许主信道在窃听者之前检索信号。数值计算结果表明,在大规模MiMo中使用Raptor代码提高了合法用户信道的可靠性和安全性,同时最大限度地降低了入侵者窥探数据的能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Raptor Code based on punctured LDPC for Secrecy in Massive MiMo
In the future Fifth-Generation networks, the eavesdropping is a critical threat due to their broadcast-based transmission. This problem can be addressed with the cryptographic protocols. However, this method is complex and difficult because of the dynamic topology of wireless networks, which does not allow an efficient management of security keys. As a complement solution, Physical-layer security (PLS) is integrated to enhance secrecy in wireless networks. The PLS exploits the schemes features of this layer, namely the modulation, Massive Multi-Input Multi-Output(m-MiMo) and channel coding. The fountain code is one of those systems where the secrecy is provided when the destination retrieves packets encoded before the intruder. Nevertheless, the secrecy can not be guaranteed when eavesdropper uses large number of the antennas as in the m-MiMo. The feature of m-MiMo should be considered to secure main channel with fountain codes. Therefore, we propose to use Raptor code which is a class of fountain code, aided by an Artificial noise (AN) and the punctuated data to reduce the efficient of intruder channel. This allows the main channel to retrieve the signal before eavesdropper. The numerical results show that using Raptor code in massive MiMo enhances the reliability and the security on the channel of legitimate user, while minimizes the abilities of intruders to spy on data.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Stochastic Method to Physical Layer Security of an Amplify-and-Forward Spectrum Sensing in Cognitive Radio Networks: Secondary User to Relay Experimental Performance Evaluation of TCP Over an Integrated Satellite-Terrestrial Network Environment Drone Disrupted Denial of Service Attack (3DOS): Towards an Incident Response and Forensic Analysis of Remotely Piloted Aerial Systems (RPASs) Mobility Traffic Model Based on Combination of Multiple Transportation Forms in the Smart City Exploiting Energy Efficient Routing protocols for Void Hole Alleviation in IoT enabled Underwater WSN
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1