浏览全部资源
扫码关注微信
1. 中国科学院信息工程研究所,北京 100093
2. 中国科学院大学网络空间安全学院,北京 100049
[ "张小卉(1990- ),女,内蒙古赤峰人,中国科学院信息工程研究所博士生、工程师,主要研究方向为通信物理层安全" ]
[ "张顺亮(1974- ),男,陕西西安人,博士,中国科学院信息工程研究所高级工程师,主要研究方向为移动通信网络与安全技术" ]
[ "李博文(1995- ),男,四川宜宾人,中国科学院信息工程研究所硕士生,主要研究方向为移动通信网络与安全技术、移动社交网络等" ]
网络出版日期:2020-10,
纸质出版日期:2020-10-25
移动端阅览
张小卉, 张顺亮, 李博文. 适用于保密容量为负情形的基于混沌序列的polar码加密方案[J]. 通信学报, 2020,41(10):130-138.
Xiaohui ZHANG, Shunliang ZHANG, Bowen LI. Chaotic sequence based polar code encrypted scheme in negative secrecy capacity case[J]. Journal on communications, 2020, 41(10): 130-138.
张小卉, 张顺亮, 李博文. 适用于保密容量为负情形的基于混沌序列的polar码加密方案[J]. 通信学报, 2020,41(10):130-138. DOI: 10.11959/j.issn.1000-436x.2020187.
Xiaohui ZHANG, Shunliang ZHANG, Bowen LI. Chaotic sequence based polar code encrypted scheme in negative secrecy capacity case[J]. Journal on communications, 2020, 41(10): 130-138. DOI: 10.11959/j.issn.1000-436x.2020187.
考虑保密容量为负的情形,利用混沌序列对信息序列进行加密并且对冻结比特进行填充,并结合多块polar编码结构,提出了一种具有较低复杂度和较高安全传输速率的 polar 码加密方案。从可靠性、安全性、传输效率这3个方面对所提polar码加密方案进行相应的数学证明和理论分析。结果表明,所提方案在保密容量为负的情形下,在保障可靠、安全的通信的基础上,可达到较高的安全传输速率,且具有较低的实现复杂度。
A chaos based encrypted polar coding scheme
which could be applied to the negative secrecy capacity case
was proposed.Chaotic sequences were employed to encrypt the information bits and fill the frozen bits.And multi-block polar coding structure was also employed in the proposed scheme.The proposed scheme was featured as lower complexity and higher secrecy transmission rate.Corresponding mathematical analysis had been performed in terms of the error probability
security and transmission rate.The result reveals that the proposed scheme can achieve reliability
security in negative secrecy capacity case.What’s more
it has relatively low complexity and high secrecy transmission rate compared with the existing schemes.
JABER M , IMRAN M A , TAFAZOLLI R , et al . 5G backhaul challenges and emerging research directions:a survey [J ] . IEEE Access , 2016 , 4 : 1743 - 1766 .
Huawei . New air interface and radio access virtualization [R ] . Huawei White Paper ,(2015-04)[2020-05-19 ] .
ARICAN E . Channel polarization:a method for constructing capacity-achieving codes for symmetric binary-input memoryless channels [J ] . IEEE Transactions on Information Theory , 2009 , 55 ( 7 ): 3051 - 3073
HAMAMREH J M , BASAR E , ARSLAN H . OFDM-subcarrier index selection for enhancing security and reliability of 5G URLL services [J ] . IEEE Access , 2017 , 5 : 25863 - 25875 .
WYNER A D . The wire-tap channel [J ] . The Bell System Technical Journal , 1975 , 54 ( 8 ): 1355 - 1387 .
MAHDAVIFAR H , VARDY A . Achieving the secrecy capacity of wiretap channels using polar codes [J ] . IEEE Transactions on Information Theory , 2011 , 57 ( 10 ): 6428 - 6443 .
CSIZAR I , KORNER J . Broadcast channels with confidential messages [J ] . IEEE transactions on Information Theory , 1978 , 24 ( 3 ): 339 - 348 .
SASOGLU E , VARDY A . A new polar coding scheme for strong security on wiretap channels [C ] // IEEE International Symposium on Information Theory . Piscataway:IEEE Press , 2013 : 1117 - 1121 .
GULCU T C , BARG A . Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential component [J ] . IEEE Transactions on Information Theory , 2017 , 63 ( 2 ): 1311 - 1324 .
ZHAO Y Z , ZOU X C , LU Z J , et al . Chaotic encrypted polar coding scheme for general wiretap channel [J ] . IEEE Transactions on Very Large Scale Integration Systems , 2017 , 25 ( 12 ): 3331 - 3340 .
LU X J , SHI Y X , LI W , et al . A joint physical encryption and PAPR reduction scheme based on polar codes and chaotic sequences in OFDM system [J ] . IEEE Access , 2019 , 7 : 73036 - 73045 .
LU X J , LEI J , LI W , et al . Physical layer encryption algorithm based on polar codes and chaotic sequences [J ] . IEEE Access , 2019 , 7 : 4380 - 4390 .
WU X G , ZHANG L . Chaos-based Information rotated polar coding scheme for visible light wiretap channel [C ] // International Conference on Computing,Network and Communications . Piscataway:IEEE Press , 2019 : 864 - 868 .
ZHAO Y Z , ZOU X C , LIU Z . Chaos embedded polar coding for wiretap channel in negative secrecy capacity case [C ] // International Congress on Image and Signal Processing,BioMedical Engineering and Informatics . Piscataway:IEEE Press , 2016 : 1949 - 1953 .
CHUNG S Y , RICHARDSON T J , URBANKE R L . Analysis of sum-product decoding of low-density parity-check codes using a Gaussian approximation [J ] . IEEE Transactions on Information Theory , 2001 , 47 ( 2 ): 657 - 670 .
MORI R , TOSHIYUKI T . Performance of polar codes with the construction using density evolution [J ] . IEEE Communication Letters , 2009 , 13 ( 7 ): 519 - 521 .
TONG W , ZHU P . Research and implementation of polar codes [M ] . Beijing : China CITIC Publishing GroupPress , 2018 .
WANG S , WANG X . M-DCSK-based chaotic communication in MIMO multipath channels with no channel state information [J ] . IEEE Transactions on Circuits and Systems , 2010 , 57 ( 12 ): 1001 - 1005 .
YAO J , SUN Y , REN H . Experimental wireless communication using chaotic baseband waveform [J ] . IEEE Transactions on Vehicular Technology , 2019 , 68 ( 1 ): 578 - 591 .
ABDULLAH H N , ABDULLAH H A . Image encryption using hybrid chaotic map [C ] // 2017 International Conference on Current Research in Computer Science and Information Technology . Piscataway:IEEE Press , 2017 : 121 - 125 .
WANG C , JI Y F , WANG H X , et al . Security-enhanced electro-optic feedback phase chaotic system based on nonlinear coupling of two delayed interfering branches [J ] . IEEE Photonics Journal , 2018 , 10 ( 4 ): 1 - 16 .
ZHANG J , ZHU H P , ZHU Y X , et al . A hybrid DS/FH signal generator based of spatiotemporal chaotic OCML [C ] // IEEE International Conference on Computer and Communications . Piscataway:IEEE Press , 2016 : 2682 - 2686 .
ZHANG X Z , WANG Y , ZENG J , et al . A secure OFDM transmission scheme based on chaos mapping [C ] // International Performance Computing and Communications Conference . Piscataway:IEEE Press , 2015 : 1 - 6 .
KANSO A , SMAOUI N . Logistic chaotic maps for binary number generations [J ] . Chaos,Solitons and Fractals , 2009 , 40 : 2557 - 2568 .
HERSHEY J E , HASSAN A A , YARLAGADDA R . Unconventional cryptographic keying variable management [J ] . IEEE Transactions on Communications , 1995 , 43 ( 1 ): 3 - 6 .
ALI S T , SIVARAMAN V , OSTRY D . Secret key generation rate vs reconciliation using wireless channel characteristics in body area networks [C ] // IEEE/IFIP International Conference on Embedded and Ubiquitous Computing,Piscataway:IEEE Press , 2010 : 644 - 650 .
CHEN C , JENSEN M A . Secret key establishment using temporally and spatially correlated wireless channel coefficients [J ] . IEEE Transactions on Mobile Computing , 2010 , 10 ( 2 ): 205 - 215 .
ZHU X , XU F , NOVAK E , TAN C C , et al . Using wireless link dynamics to extract a secret key in vehicular scenarios [J ] . IEEE Transactions on Mobile Computing , 2017 , 16 ( 7 ): 2065 - 2078 .
WANG Q , SU H , REN K , et al . Fast and scalable secret key generation exploiting channel phase randomness in wireless networks [C ] // 2011 Proceedings IEEE INFOCOM . Piscataway:IEEE Press , 2011 : 1422 - 1430 .
KORADA S B . Polar codes for channel and source coding [D ] . Lausanne:Swiss Federal Institute of Technology in Lausanne , 2009 .
LEUNG Y C S . On a special class of wiretap channels [J ] . IEEE Transactions on Information Theory , 1977 , 23 ( 5 ): 625 - 627 .
SHIU Y C S , CHANG S Y , WU H C , et al . Physical layer security in wireless networks:a tutorial [J ] . IEEE Wireless Communications , 2011 , 18 ( 2 ): 66 - 74 .
0
浏览量
423
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构