Title | Robust Chaos-Based Information Masking Polar Coding Scheme for Wiretap Channel in Practical Wireless Systems |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Wu, Xiaoge, Zhang, Lin |
Conference Name | 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall) |
Keywords | AWGN channels, bit-channels, channel coding, Channel models, channel polarization, chaotic communication, composability, Decoding, eavesdropping channel conditions, encoding, flat-fading Rayleigh channels, legitimate channels, legitimate users, Metrics, polar codes, polar coding scheme, pubcrawl, Rayleigh channels, realistic channel conditions, reliability, reliability performances, Resiliency, robust chaos-based information masking, secure polar coding scheme, security, security performances, telecommunication network reliability, telecommunication security, transmission conditions, wireless channels, Wireless communication, wireless communication systems, wiretap channel |
Abstract | In practical wireless communication systems, the channel conditions of legitimate users can not always be better than those of eavesdroppers. This realistic fact brings the challenge for the design of secure transmission over wiretap channels which requires that the eavesdropping channel conditions should be worse than legitimate channels. In this paper, we present a robust chaos-based information masking polar coding scheme for enhancing reliability and security performances under realistic channel conditions for practical systems. In our design, we mask the original information, wherein the masking matrix is determined by chaotic sequences. Then the masked information is encoded by the secure polar coding scheme. After the channel polarization achieved by the polar coding, we could identify the bit-channels providing good transmission conditions for legitimate users and the bit-channels with bad conditions for eavesdroppers. Simulations are performed over the additive white Gaussian noise (AWGN) and slow flat-fading Rayleigh channels. The results demonstrate that compared with existing schemes, the proposed scheme can achieve better reliability and security even when the eavesdroppers have better channel conditions than legitimate users, hence the practicability is greatly enhanced. |
DOI | 10.1109/VTCFall.2019.8891495 |
Citation Key | wu_robust_2019 |