Visible to the public Biblio

Found 100 results

Filters: Keyword is channel coding  [Clear All Filters]
2023-04-14
Lee, Bowhyung, Han, Donghwa, Lee, Namyoon.  2022.  Demo: Real-Time Implementation of Block Orthogonal Sparse Superposition Codes. 2022 IEEE International Conference on Communications Workshops (ICC Workshops). :1–2.
Short-packet communication is a key enabler of various Internet of Things applications that require higher-level security. This proposal briefly reviews block orthogonal sparse superposition (BOSS) codes, which are applicable for secure short-packet transmissions. In addition, following the IEEE 802.11a Wi-Fi standards, we demonstrate the real-time performance of secure short packet transmission using a software-defined radio testbed to verify the feasibility of BOSS codes in a multi-path fading channel environment.
ISSN: 2694-2941
Boche, Holger, Cai, Minglai, Wiese, Moritz.  2022.  Mosaics of Combinatorial Designs for Semantic Security on Quantum Wiretap Channels. 2022 IEEE International Symposium on Information Theory (ISIT). :856–861.
We study semantic security for classical-quantum channels. Our security functions are functional forms of mosaics of combinatorial designs. We extend methods in [25] from classical channels to classical-quantum channels to demonstrate that mosaics of designs ensure semantic security for classical-quantum channels, and are also capacity achieving coding schemes. An advantage of these modular wiretap codes is that we provide explicit code constructions that can be implemented in practice for every channel, given an arbitrary public code.
ISSN: 2157-8117
Liu, Zhiwei, Du, Qinghe.  2022.  Self-coupling Encryption via Polar Codes for Secure Wireless Transmission. 2022 International Wireless Communications and Mobile Computing (IWCMC). :384–388.
In this paper, we studies secure wireless transmission using polar codes which based on self-coupling encryption for relay-wiretap channel. The coding scheme proposed in this paper divide the confidential message into two parts, one part used to generate key through a specific extension method, and then use key to perform coupling encryption processing on another part of the confidential message to obtain the ciphertext. The ciphertext is transmitted in the split-channels which are good for relay node, legitimate receiver and eavesdropper at the same time. Legitimate receiver can restore key with the assistance of relay node, and then uses the joint successive cancellation decoding algorithm to restore confidential message. Even if eavesdropper can correctly decode the ciphertext, he still cannot restore the confidential message due to the lack of key. Simulation results show that compared with the previous work, our coding scheme can increase the average code rate to some extent on the premise of ensuring the reliability and security of transmission.
ISSN: 2376-6506
Yang, Dongli, Huang, Jingxuan, Liu, Xiaodong, Sun, Ce, Fei, Zesong.  2022.  A Polar Coding Scheme for Achieving Secrecy of Fading Wiretap Channels in UAV Communications. 2022 IEEE/CIC International Conference on Communications in China (ICCC). :468–473.
The high maneuverability of the unmanned aerial vehicle (UAV), facilitating fast and flexible deployment of communication infrastructures, brings potentially valuable opportunities to the future wireless communication industry. Nevertheless, UAV communication networks are faced with severe security challenges since air to ground (A2G) communications are more vulnerable to eavesdropping attacks than terrestrial communications. To solve the problem, we propose a coding scheme that hierarchically utilizes polar codes in order to address channel multi-state variation for UAV wiretap channels, without the instantaneous channel state information (CSI) known at the transmitter. The theoretical analysis and simulation results show that the scheme achieves the security capacity of the channel and meets the conditions of reliability and security.
ISSN: 2377-8644
Ma, Xiao, Wang, Yixin, Zhu, Tingting.  2022.  A New Framework for Proving Coding Theorems for Linear Codes. 2022 IEEE International Symposium on Information Theory (ISIT). :2768–2773.

A new framework is presented in this paper for proving coding theorems for linear codes, where the systematic bits and the corresponding parity-check bits play different roles. Precisely, the noisy systematic bits are used to limit the list size of typical codewords, while the noisy parity-check bits are used to select from the list the maximum likelihood codeword. This new framework for linear codes allows that the systematic bits and the parity-check bits are transmitted in different ways and over different channels. In particular, this new framework unifies the source coding theorems and the channel coding theorems. With this framework, we prove that the Bernoulli generator matrix codes (BGMCs) are capacity-achieving over binary-input output symmetric (BIOS) channels and also entropy-achieving for Bernoulli sources.

ISSN: 2157-8117

Peng, Haifeng, Cao, Chunjie, Sun, Yang, Li, Haoran, Wen, Xiuhua.  2022.  Blind Identification of Channel Codes under AWGN and Fading Conditions via Deep Learning. 2022 International Conference on Networking and Network Applications (NaNA). :67–73.
Blind identification of channel codes is crucial in intelligent communication and non-cooperative signal processing, and it plays a significant role in wireless physical layer security, information interception, and information confrontation. Previous researches show a high computation complexity by manual feature extractions, in addition, problems of indisposed accuracy and poor robustness are to be resolved in a low signal-to-noise ratio (SNR). For solving these difficulties, based on deep residual shrinkage network (DRSN), this paper proposes a novel recognizer by deep learning technologies to blindly distinguish the type and the parameter of channel codes without any prior knowledge or channel state, furthermore, feature extractions by the neural network from codewords can avoid intricate calculations. We evaluated the performance of this recognizer in AWGN, single-path fading, and multi-path fading channels, the results of the experiments showed that the method we proposed worked well. It could achieve over 85 % of recognition accuracy for channel codes in AWGN channels when SNR is not lower than 4dB, and provide an improvement of more than 5% over the previous research in recognition accuracy, which proves the validation of the proposed method.
Zhao, Yizhi, Wu, Lingjuan, Xu, Shiwei.  2022.  Secure Polar Coding with Non-stationary Channel Polarization. 2022 7th International Conference on Computer and Communication Systems (ICCCS). :393–397.

In this work, we consider the application of the nonstationary channel polarization theory on the wiretap channel model with non-stationary blocks. Particularly, we present a time-bit coding scheme which is a secure polar codes that constructed on the virtual bit blocks by using the non-stationary channel polarization theory. We have proven that this time-bit coding scheme achieves reliability, strong security and the secrecy capacity. Also, compared with regular secure polar coding methods, our scheme has a lower coding complexity for non-stationary channel blocks.

Hwang, Seunggyu, Lee, Hyein, Kim, Sooyoung.  2022.  Evaluation of physical-layer security schemes for space-time block coding under imperfect channel estimation. 2022 27th Asia Pacific Conference on Communications (APCC). :580–585.

With the advent of massive machine type of communications, security protection becomes more important than ever. Efforts have been made to impose security protection capability to physical-layer signal design, so called physical-layer security (PLS). The purpose of this paper is to evaluate the performance of PLS schemes for a multi-input-multi-output (MIMO) systems with space-time block coding (STBC) under imperfect channel estimation. Three PLS schemes for STBC schemes are modeled and their bit error rate (BER) performances are evaluated under various channel estimation error environments, and their performance characteristics are analyzed.

ISSN: 2163-0771

Salman, Hanadi, Naderi, Sanaz, Arslan, Hüseyin.  2022.  Channel-Dependent Code Allocation for Downlink MC-CDMA System Aided Physical Layer Security. 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring). :1–5.
Spreading codes are the core of the spread spectrum transmission. In this paper, a novel channel-dependent code allocation procedure for enhancing security in multi-carrier code division multiple access (MC-CDMA) system is proposed and investigated over frequency-selective fading. The objective of the proposed technique is to assign the codes to every subcarrier of active/legitimate receivers (Rxs) based on their channel frequency response (CFR). By that, we ensure security for legitimate Rxs against eavesdropping while preserving mutual confidentiality between the legitimate Rxs themselves. To do so, two assigning modes; fixed assigning mode (FAM) and adaptive assigning mode (AAM), are exploited. The effect of the channel estimation error and the number of legitimate Rxs on the bit error rate (BER) performance is studied. The presented simulations show that AAM provides better security with a complexity trade-off compared to FAM. While the latter is more robust against the imperfection of channel estimation.
ISSN: 2577-2465
2022-09-16
Kaur, Satwinder, Kuttan, Deepak B, Mittal, Nitin.  2021.  An Energy-saving Approach for Error control Codes in Wireless Sensor Networks. 2021 2nd International Conference on Smart Electronics and Communication (ICOSEC). :313—316.
Wireless Sensor Networks (WSNs) have limited energy resource which requires authentic data transmission at a minimum cost. The major challenge is to deploy WSN with limited energy and lifetime of nodes while taking care of secure data communication. The transmission of data from the wireless channels may cause many losses such as fading, noise, bit error rate increases as well as deplete the energy resource from the nodes. To reduce the adverse effects of losses and to save power usage, error control coding (ECC) techniques are widely used and it also brings coding gain. Since WSN have limited energy resource so the selection of ECC is very difficult as both power consumption, as well as BER, has also taken into consideration. This research paper reviews different types of models, their applications, limitations of the sensor networks, and what are different types of future works going to overcome the limitations.
2022-07-01
Chen, Lei.  2021.  Layered Security Multicast Algorithm based on Security Energy Efficiency Maximization in SCMA Networks. 2021 7th International Conference on Computer and Communications (ICCC). :2033–2037.
This paper studies the hierarchical secure multicast algorithm in sparse code multiple access (SCMA) networks, its network security capacity is no longer limited by the users with the worst channel quality in multicast group. Firstly, we propose a network security energy efficiency (SEE) maximization problem. Secondly, in order to reduce the computational complexity, we propose a suboptimal algorithm (SA), which separates the codebook assignment with artificial noise from the power allocation with artificial noise. To further decrease the complexity of Lagrange method, a power allocation algorithm with increased fixed power is introduced. Finally, simulation results show that the network performance of the proposed algorithm in SCMA network is significantly better than that in orthogonal frequency division multiple access (OFDMA) network.
Harrison, Willie K., Shoushtari, Morteza.  2021.  On Caching with Finite Blocklength Coding for Secrecy over the Binary Erasure Wiretap Channel. 2021 Wireless Telecommunications Symposium (WTS). :1–6.
In this paper, we show that caching can aid in achieving secure communications by considering a wiretap scenario where the transmitter and legitimate receiver share access to a secure cache, and an eavesdropper is able to tap transmissions over a binary erasure wiretap channel during the delivery phase of a caching protocol. The scenario under consideration gives rise to a new channel model for wiretap coding that allows the transmitter to effectively choose a subset of bits to erase at the eavesdropper by caching the bits ahead of time. The eavesdropper observes the remainder of the coded bits through the wiretap channel for the general case. In the wiretap type-II scenario, the eavesdropper is able to choose a set of revealed bits only from the subset of bits not cached. We present a coding approach that allows efficient use of the cache to realize a caching gain in the network, and show how to use the cache to optimize the information theoretic security in the choice of a finite blocklength code and the choice of the cached bit set. To our knowledge, this is the first work on explicit algorithms for secrecy coding in any type of caching network.
Rangi, Anshuka, Franceschetti, Massimo.  2021.  Channel Coding Theorems in Non-stochastic Information Theory. 2021 IEEE International Symposium on Information Theory (ISIT). :1790–1795.
Recently, the δ-mutual information between uncertain variables has been introduced as a generalization of Nair's non-stochastic mutual information functional [1], [2]. Within this framework, we introduce four different notions of capacity and present corresponding coding theorems. Our definitions include an analogue of Shannon's capacity in a non-stochastic setting, and a generalization of the zero-error capacity. The associated coding theorems hold for stationary, memoryless, non-stochastic uncertain channels. These results establish the relationship between the δ-mutual information and our operational definitions, providing a step towards the development of a complete non-stochastic information theory.
Cribbs, Michael, Romero, Ric, Ha, Tri.  2021.  Modulation-Based Physical Layer Security via Gray Code Hopping. 2021 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR 2021). :1–6.
A physical layer security (PLS) technique called Gray Code Hopping (GCH) is presented offering simplistic implementation and no bit error rate (BER) performance degradation over the main channel. A synchronized transmitter and receiver "hop" to an alternative binary reflected Gray code (BRGC) mapping of bits to symbols between each consecutive modulation symbol. Monte Carlo simulations show improved BER performance over a similar technique from the literature. Simulations also confirm compatibility of GCH with either hard or soft decision decoding methods. Simplicity of GCH allows for ready implementation in adaptive 5th Generation New Radio (5G NR) modulation coding schemes.
Pinto, Thyago M. S., Vilela, João P., Gomes, Marco A. C., Harrison, Willie K..  2021.  Keyed Polar Coding for Physical-Layer Security without Channel State Information. ICC 2021 - IEEE International Conference on Communications. :1–6.
Polar codes have been shown to provide an effective mechanism for achieving physical-layer security over various wiretap channels. A majority of these schemes require channel state information (CSI) at the encoder for both intended receivers and eavesdroppers. In this paper, we consider a polar coding scheme for secrecy over a Gaussian wiretap channel when no CSI is available. We show that the availability of a shared keystream between friendly parties allows polar codes to be used for both secure and reliable communications, even when the eavesdropper knows a large fraction of the keystream. The scheme relies on a predetermined strategy for partitioning the bits to be encoded into a set of frozen bits and a set of information bits. The frozen bits are filled with bits from the keystream, and we evaluate the security gap when the cyclic redundancy check-aided successive cancellation list decoder is used at both receivers in the wiretap channel model.
Chen, Liquan, Guo, Xing, Lu, Tianyu, Gao, Yuan.  2021.  Formalization of the Secrecy Capacity in Non-degraded Wiretap Channel. 2021 7th International Conference on Computer and Communications (ICCC). :535–538.
Unlike the traditional key-exchange based cryptography, physical layer security is built on information theory and aims to achieve unconditional security by exploiting the physical characteristics of wireless channels. With the growth of the number of wireless devices, physical layer security has been gradually emphasized by researchers. Various physical layer security protocols have been proposed for different communication scenarios. Since these protocols are based on information-theoretic security and the formalization work for information theory were not complete when these protocols were proposed, the security of these protocols lacked formal proofs. In this paper, we propose a formal definition for the secrecy capacity in non-degraded wiretap channel model and a formal proof for the secrecy capacity in binary symmetric channel with the help of SSReflect/Coq theorem prover.
El-Halabi, Mustafa, Mokbel, Hoda.  2021.  Physical-Layer Security for 5G Wireless Networks: Sharing Non-Causal CSI with the Eavesdropper. IEEE EUROCON 2021 - 19th International Conference on Smart Technologies. :343–347.
Physical-layer security is a new paradigm that offers data protection against eavesdropping in wireless 5G networks. In this context, the Gaussian channel is a typical model that captures the practical aspects of confidentially transmitting a message through the wireless medium. In this paper, we consider the peculiar case of transmitting a message through a wireless, state-dependent channel which is prone to eavesdropping, where the state knowledge is non-causally known and shared between the sender and the eavesdropper. We show that a novel structured coding scheme, which combines random coding arguments and the dirty-paper coding technique, achieves the fundamental limit of secure and reliable communication for the considered model.
Zhu, Guangming, Chen, Deyuan, Zhang, Can, Qi, Yongzhi.  2021.  Secure Turbo-Polar Codes Information Transmission on Wireless Channel. 2021 IEEE 15th International Conference on Anti-counterfeiting, Security, and Identification (ASID). :116–121.
Based on the structure of turbo-polar codes, a secure symmetric encryption scheme is proposed to enhance information transmission security in this paper. This scheme utilizes interleaving at information bits and puncturing at parity bits for several times in the encoder. Correspondingly, we need to do the converse interleaving and fill zeros accurately at punctured position. The way of interleaving and puncturing is controlled by the private key of symmetric encryption, making sure the security of the system. The security of Secure Turbo-Polar Codes (STPC) is analyzed at the end of this paper. Simulation results are given to shown that the performance and complexity of Turbo-Polar Codes have little change after symmetric encryption. We also investigate in depth the influence of different remaining parity bit ratios on Frame Error Rate (FER). At low Signal to Noise Rate (SNR), we find it have about 0.6dB advantage when remaining parity bit ratio is between 1/20 and 1/4.
Li, Lintao, Xing, Yiran, Yao, Xiaoxia, Luo, Yuquan.  2021.  McEliece Coding Method based on LDPC Code with Application to Physical Layer Security. 2021 7th International Conference on Computer and Communications (ICCC). :2042–2045.

The ubiquity of wireless communication systems has resulted in extensive concern regarding their security issues. Combination of signaling and secrecy coding can provide greater improvement of confidentiality than tradition methods. In this work, we mainly focus on the secrecy coding design for physical layer security in wireless communications. When the main channel and wiretap channel are noisy, we propose a McEliece secure coding method based on LDPC which can guarantee both reliability between intended users and information security with respect to eavesdropper simultaneously. Simulation results show that Bob’s BER will be significantly decreased with the SNR increased, while Eve get a BER of 0.5 no matter how the SNR changes.

2022-06-30
Okumura, Mamoru, Tomoki, Kaga, Okamoto, Eiji, Yamamoto, Tetsuya.  2021.  Chaos-Based Interleave Division Multiple Access Scheme with Physical Layer Security. 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC). :1—2.

Interleave division multiple access (IDMA) is a multiple-access scheme and it is expected to improve frequency efficiency. Meanwhile, the damage caused by cyberattacks is increasing yearly. To solve this problem, we propose a method of applying radio-wave encryption to IDMA based on chaos modulation to realize physical layer security and the channel coding effect. We show that the proposed scheme ensures physical layer security and obtains channel coding gain by numerical simulations.

2021-07-27
Kim, Hyeji, Jiang, Yihan, Kannan, Sreeram, Oh, Sewoong, Viswanath, Pramod.  2020.  Deepcode: Feedback Codes via Deep Learning. IEEE Journal on Selected Areas in Information Theory. 1:194—206.
The design of codes for communicating reliably over a statistically well defined channel is an important endeavor involving deep mathematical research and wide-ranging practical applications. In this work, we present the first family of codes obtained via deep learning, which significantly outperforms state-of-the-art codes designed over several decades of research. The communication channel under consideration is the Gaussian noise channel with feedback, whose study was initiated by Shannon; feedback is known theoretically to improve reliability of communication, but no practical codes that do so have ever been successfully constructed. We break this logjam by integrating information theoretic insights harmoniously with recurrent-neural-network based encoders and decoders to create novel codes that outperform known codes by 3 orders of magnitude in reliability and achieve a 3dB gain in terms of SNR. We also demonstrate several desirable properties of the codes: (a) generalization to larger block lengths, (b) composability with known codes, and (c) adaptation to practical constraints. This result also has broader ramifications for coding theory: even when the channel has a clear mathematical model, deep learning methodologies, when combined with channel-specific information-theoretic insights, can potentially beat state-of-the-art codes constructed over decades of mathematical research.
2021-04-08
Bloch, M., Barros, J., Rodrigues, M. R. D., McLaughlin, S. W..  2008.  Wireless Information-Theoretic Security. IEEE Transactions on Information Theory. 54:2515–2534.
This paper considers the transmission of confidential data over wireless channels. Based on an information-theoretic formulation of the problem, in which two legitimates partners communicate over a quasi-static fading channel and an eavesdropper observes their transmissions through a second independent quasi-static fading channel, the important role of fading is characterized in terms of average secure communication rates and outage probability. Based on the insights from this analysis, a practical secure communication protocol is developed, which uses a four-step procedure to ensure wireless information-theoretic security: (i) common randomness via opportunistic transmission, (ii) message reconciliation, (iii) common key generation via privacy amplification, and (iv) message protection with a secret key. A reconciliation procedure based on multilevel coding and optimized low-density parity-check (LDPC) codes is introduced, which allows to achieve communication rates close to the fundamental security limits in several relevant instances. Finally, a set of metrics for assessing average secure key generation rates is established, and it is shown that the protocol is effective in secure key renewal-even in the presence of imperfect channel state information.
Wu, X., Yang, Z., Ling, C., Xia, X..  2016.  Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security. IEEE Transactions on Information Forensics and Security. 11:1278–1290.
In the past, two main approaches for the purpose of authentication, including information-theoretic authentication codes and complexity-theoretic message authentication codes (MACs), were almost independently developed. In this paper, we consider to construct new MACs, which are both computationally secure and information-theoretically secure. Essentially, we propose a new cryptographic primitive, namely, artificial-noise-aided MACs (ANA-MACs), where artificial noise is used to interfere with the complexity-theoretic MACs and quantization is further employed to facilitate packet-based transmission. With a channel coding formulation of key recovery in the MACs, the generation of standard authentication tags can be seen as an encoding process for the ensemble of codes, where the shared key between Alice and Bob is considered as the input and the message is used to specify a code from the ensemble of codes. Then, we show that artificial noise in ANA-MACs can be well employed to resist the key recovery attack even if the opponent has an unlimited computing power. Finally, a pragmatic approach for the analysis of ANA-MACs is provided, and we show how to balance the three performance metrics, including the completeness error, the false acceptance probability, and the conditional equivocation about the key. The analysis can be well applied to a class of ANA-MACs, where MACs with Rijndael cipher are employed.
2021-03-15
Shekhawat, G. K., Yadav, R. P..  2020.  Sparse Code Multiple Access based Cooperative Spectrum Sensing in 5G Cognitive Radio Networks. 2020 5th International Conference on Computing, Communication and Security (ICCCS). :1–6.
Fifth-generation (5G) network demands of higher data rate, massive user connectivity and large spectrum can be achieve using Sparse Code Multiple Access (SCMA) scheme. The integration of cognitive feature spectrum sensing with SCMA can enhance the spectrum efficiency in a heavily dense 5G wireless network. In this paper, we have investigated the primary user detection performance using SCMA in Centralized Cooperative Spectrum Sensing (CCSS). The developed model can support massive user connectivity, lower latency and higher spectrum utilization for future 5G networks. The simulation study is performed for AWGN and Rayleigh fading channel. Log-MPA iterative receiver based Log-Likelihood Ratio (LLR) soft test statistic is passed to Fusion Center (FC). The Wald-hypothesis test is used at FC to finalize the PU decision.
Babu, S. A., Ameer, P. M..  2020.  Physical Adversarial Attacks Against Deep Learning Based Channel Decoding Systems. 2020 IEEE Region 10 Symposium (TENSYMP). :1511–1514.

Deep Learning (DL), in spite of its huge success in many new fields, is extremely vulnerable to adversarial attacks. We demonstrate how an attacker applies physical white-box and black-box adversarial attacks to Channel decoding systems based on DL. We show that these attacks can affect the systems and decrease performance. We uncover that these attacks are more effective than conventional jamming attacks. Additionally, we show that classical decoding schemes are more robust than the deep learning channel decoding systems in the presence of both adversarial and jamming attacks.