{"title":"基于深度学习的窃听消隐信道编码","authors":"Daniel Seifert, Onur Günlü, Rafael F. Schaefer","doi":"arxiv-2409.08786","DOIUrl":null,"url":null,"abstract":"The wiretap channel is a well-studied problem in the physical layer security\n(PLS) literature. Although it is proven that the decoding error probability and\ninformation leakage can be made arbitrarily small in the asymptotic regime,\nfurther research on finite-blocklength codes is required on the path towards\npractical, secure communications systems. This work provides the first\nexperimental characterization of a deep learning-based, finite-blocklength code\nconstruction for multi-tap fading wiretap channels without channel state\ninformation (CSI). In addition to the evaluation of the average probability of\nerror and information leakage, we illustrate the influence of (i) the number of\nfading taps, (ii) differing variances of the fading coefficients and (iii) the\nseed selection for the hash function-based security layer.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"21 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Deep Learning-based Codes for Wiretap Fading Channels\",\"authors\":\"Daniel Seifert, Onur Günlü, Rafael F. Schaefer\",\"doi\":\"arxiv-2409.08786\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The wiretap channel is a well-studied problem in the physical layer security\\n(PLS) literature. Although it is proven that the decoding error probability and\\ninformation leakage can be made arbitrarily small in the asymptotic regime,\\nfurther research on finite-blocklength codes is required on the path towards\\npractical, secure communications systems. This work provides the first\\nexperimental characterization of a deep learning-based, finite-blocklength code\\nconstruction for multi-tap fading wiretap channels without channel state\\ninformation (CSI). In addition to the evaluation of the average probability of\\nerror and information leakage, we illustrate the influence of (i) the number of\\nfading taps, (ii) differing variances of the fading coefficients and (iii) the\\nseed selection for the hash function-based security layer.\",\"PeriodicalId\":501082,\"journal\":{\"name\":\"arXiv - MATH - Information Theory\",\"volume\":\"21 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-09-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - MATH - Information Theory\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2409.08786\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - MATH - Information Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.08786","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Deep Learning-based Codes for Wiretap Fading Channels
The wiretap channel is a well-studied problem in the physical layer security
(PLS) literature. Although it is proven that the decoding error probability and
information leakage can be made arbitrarily small in the asymptotic regime,
further research on finite-blocklength codes is required on the path towards
practical, secure communications systems. This work provides the first
experimental characterization of a deep learning-based, finite-blocklength code
construction for multi-tap fading wiretap channels without channel state
information (CSI). In addition to the evaluation of the average probability of
error and information leakage, we illustrate the influence of (i) the number of
fading taps, (ii) differing variances of the fading coefficients and (iii) the
seed selection for the hash function-based security layer.