山东大学学报(理学版) ›› 2018, Vol. 53 ›› Issue (7): 60-64.doi: 10.6040/j.issn.1671-9352.2.2017.025
刘政1,牛芳琳1*,钱大兴2,蔡希彪1,郭颖3
LIU Zheng1, NIU Fang-lin1*, QIAN Da-xing2, CAI Xi-biao1, GUO Ying3
摘要: 针对无线通信的安全性,提出一种与物理层喷泉码编码相结合的防窃听方法。利用增加人工噪声破坏窃听者喷泉码MP译码顺序,在保证主信道正常通信情况下,大幅度增加了窃听者的误码率,使其难以正常窃取信息,达到保证主信道通信安全的目的。实验结果表明,该方法在增加少量人工干扰噪声的情况下,使得窃听者的误码率达到30%~50%以上,达到防止窃听目的。
中图分类号:
[1] OKAMOTO T,YAMAMOTO H. Modern cryptography[M]. Tokyo: Sangyo-Tosho, 1997: 1-12. [2] KASAHARA M, SAKAI R. A construction of short public-key cryptosystem over extension field[J]. Technical report of IEICE. ISEC, 2003, 102:63-68. [3] MCELIECE R J. A public-key cryptosystem based on algebraic coding theory[J]. Deep Space Network Progress Report, 1978, 44:114-116. [4] XU H, FENG D, SUN C, et al. Construction of LDPC codes based on resolvable group divisible designs[C] // International Workshop on High Mobility Wireless Communications. IEEE, 2015: 111-115. [5] KLINC D, HA J, MCLAUGHLIN S W, et al. LDPC codes for the Gaussian wiretap channel[C] // Information Theory Workshop, 2009. Itw. IEEE, 2009: 95-99. [6] YUKSEL M, ERKIP E. The relay channel with a wire-tapper[C] // Information Sciences and Systems, 2007. CISS'07. Conference on. IEEE, 2007: 13-18. [7] TEKIN E, YENER A. The general gaussian multiple-access and two-way wiretap channels: achievable rates and cooperative jamming[J]. IEEE Transactions on Information Theory, 2007, 54(6):2735-2751. [8] LAI L, GAMAL H E, POOR H V. The wiretap channel with feedback: encryption over the channel[J]. IEEE Transactions on Information Theory, 2008, 54(11):5059-5067. [9] LIN P H, LAI S H, LIN S C, et al. On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels[J]. IEEE Journal on Selected Areas in Communications, 2012, 31(9):1728-1740. [10] GOEL S, NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008, 7(6):2180-2189. [11] BYERS J W, LUBY M, MITZENMACHER M, et al. A digital fountain approach to reliable distribution of bulk data[J]. Acm Sigcomm Computer Communication Review, 1998, 28(4):56-67. [12] GUREVICH Y. Proceedings 43rd annual IEEE symposium on foundations of computer science[J]. Zeitschrift Für Geburtshilfe Und Neonatologie, 2002, 8(5):201-210. [13] SUH Y, BAIK J, Rahnavard N, et al. Fountain code design for broadcasting systems with intermediate-state users[J]. IEEE Transactions on Communications, 2015, 63(9):3057-3068. [14] BORUJENY R R, ARDAKANI M. Fountain code design for the Y-network[J]. IEEE Communications Letters, 2015, 19(5):703-706. [15] 牛芳琳, 李宝明, 陈付亮,等. 一种改进的基于部分信息喷泉码度分布设计[J]. 电子学报, 2016, 44(2):295-300. NIU Fanglin, LI Baoming, CHEN Fuliang, et al. The improved degree distribution for rateless code under partial inform-ation[J]. Acta Electronica Sinica, 2016, 44(2):295-300. [16] 雷维嘉, 张梦, 谢显中. 基于度分布合并和可译集优化的LT码度分布设计方案[J]. 电子学报, 2015, 43(4):800-805. LEI Weijia, ZHANG Meng, XIE Xianzhong. A design scheme for LT codes degree distribution by combining degree distributions and optimizing ripple size[J]. Acta Electronica Sinica, 2015, 43(4):800-805. |
No related articles found! |
|