白慧卿, 金梁, 黄开枝, 易鸣. 概率译码转发中继系统中的安全极化编码方法[J]. 电子与信息学报, 2018, 40(9): 2112-2118. doi: 10.11999/JEIT171142
引用本文:
白慧卿, 金梁, 黄开枝, 易鸣. 概率译码转发中继系统中的安全极化编码方法[J]. 电子与信息学报, 2018, 40(9): 2112-2118.
doi:
10.11999/JEIT171142
Huiqing BAI, Liang JIN, Kaizhi HUANG, Ming YI. Secrecy Polar Coding in Systems with Probabilistic DF Relay[J]. Journal of Electronics & Information Technology, 2018, 40(9): 2112-2118. doi: 10.11999/JEIT171142
Citation:
Huiqing BAI, Liang JIN, Kaizhi HUANG, Ming YI. Secrecy Polar Coding in Systems with Probabilistic DF Relay[J].
Journal of Electronics & Information Technology
, 2018, 40(9): 2112-2118.
doi:
10.11999/JEIT171142
白慧卿, 金梁, 黄开枝, 易鸣. 概率译码转发中继系统中的安全极化编码方法[J]. 电子与信息学报, 2018, 40(9): 2112-2118. doi: 10.11999/JEIT171142
引用本文:
白慧卿, 金梁, 黄开枝, 易鸣. 概率译码转发中继系统中的安全极化编码方法[J]. 电子与信息学报, 2018, 40(9): 2112-2118.
doi:
10.11999/JEIT171142
Huiqing BAI, Liang JIN, Kaizhi HUANG, Ming YI. Secrecy Polar Coding in Systems with Probabilistic DF Relay[J]. Journal of Electronics & Information Technology, 2018, 40(9): 2112-2118. doi: 10.11999/JEIT171142
Citation:
Huiqing BAI, Liang JIN, Kaizhi HUANG, Ming YI. Secrecy Polar Coding in Systems with Probabilistic DF Relay[J].
Journal of Electronics & Information Technology
, 2018, 40(9): 2112-2118.
doi:
10.11999/JEIT171142
白慧卿:女,1988 年生,博士生,研究方向为无线物理层安全技术
金梁:男,1969 年生,教授,博士生导师,研究方向为移动通信、无线物理层安全技术
黄开枝:女,1973 年生,教授,博士生导师,研究方向为移动通信、无线物理层安全技术
易鸣:男,1986 年生,讲师,研究方向为无线物理层安全编码
通讯作者:
[email protected]
中图分类号:
TN918
该文针对中继节点依概率辅助译码转发的通信场景,提出一种中继辅助的安全极化编码方法,保证私密信息可靠传输的同时,达到提高安全传输速率的目的。首先,发送端分别进行两层极化编码——中继概率转发行为构成的虚拟二进制删除信道下的极化编码和实际传输信道下的极化编码,并将私密信息分别隐藏在两层码字中,分时隙广播出去。然后,中继依概率译码后提取出合法用户无法直接接收的固定信息再次进行安全极化编码并转发。最后,接收端利用收到的中继转发码字和发端码字依次分层进行译码。理论和仿真分析证明,所提方法下合法用户能够可靠接收私密信息,而窃听者无法获取任何私密信息信息量;安全传输速率随着码长和中继转发概率的增加而增大,且高于一般的安全极化编码方法。
极化编码 /
物理层安全 /
中继 /
概率译码转发
Abstract:
A relay aided secrecy polar coding method is proposed for the communication systems where the relay uses Decode-and-Forward (DF) in probability. It ensures the transmission reliability and improves the secrecy rate. First, the transmitter encodes the secrecy bits in two layers: the first layer is designed over the virtual Binary Erasure Channel (BEC) that generated by the probabilistic DF relay, and the second layer is designed over the real transmission channels. After receiving the codeword, relay decodes and extracts the frozen bits which the legitimate user can not obtain directly in probability, and re-encodes them by classical secrecy polar coding. Finally, the receiver decodes the received codewords from the relay and the transmitter in turn. The theory and simulation results verify that the legitimate user is able to decode reliable, while the eavesdropper can not obtain any information about the secrecy bits. Moreover, the secrecy rate increases as the code length and the relay forwarding probability increase, and it outperforms the classical secrecy polar coding method.
Key words:
Polar codes /
Physical layer security /
Relay /
Probabilistic Decode-and-Forward (DF)
白慧卿, 金梁, 肖帅芳, 等. 多天线系统中面向物理层安全的极化编码方法[J]. 电子与信息学报, 2017, 39(11): 2587–25931
doi:
10.11999/JEIT170068
BAI Huiqing, JIN Liang, XIAO Shuaifang,
et al
. Polar codes for physical layer security in multi-antenna systems[J].
Journal of Electronics
&
Information Technology
, 2017, 39(11): 2587–25931
doi:
10.11999/JEIT170068
中国科学院电子学研究所,
北京市2702信箱,
邮编:100190
电话:010-58887066
传真:021-64253812
Email:
[email protected]
北京仁和汇智信息技术有限公司