您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

山东大学学报(理学版) ›› 2018, Vol. 53 ›› Issue (7): 60-64.doi: 10.6040/j.issn.1671-9352.2.2017.025

• • 上一篇    下一篇

基于喷泉码的防窃听编码设计

刘政1,牛芳琳1*,钱大兴2,蔡希彪1,郭颖3   

  1. 1.辽宁工业大学电子与信息工程学院, 辽宁 锦州 121001;2.大连海洋大学信息工程学院, 辽宁 大连 116000;3.锦州医科大学研究生学院, 辽宁 锦州 121001
  • 收稿日期:2017-08-28 出版日期:2018-07-20 发布日期:2018-07-03
  • 作者简介:刘政(1992— ), 男,硕士, 研究方向为信息论、网络安全. E-mail:jack_liuzheng@163.com*通信作者简介:牛芳琳(1971— ),女,副教授,研究方向为无线通信技术. E-mail:dx_niufl@lnut.edu.cn
  • 基金资助:
    NSFC-辽宁省联合基金项目(No201602373)

Design of anti-eavesdropping code based on fountain codes

LIU Zheng1, NIU Fang-lin1*, QIAN Da-xing2, CAI Xi-biao1, GUO Ying3   

  1. 1. School of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou 121001, Liaoning, China;
    2. School of Information Engineering, Dalian Ocean University, Dalian 116000, Liaoning, China;
    3. School of Graduate, Jinzhou Medical University, Jinzhou 121001, Liaoning, China
  • Received:2017-08-28 Online:2018-07-20 Published:2018-07-03

摘要: 针对无线通信的安全性,提出一种与物理层喷泉码编码相结合的防窃听方法。利用增加人工噪声破坏窃听者喷泉码MP译码顺序,在保证主信道正常通信情况下,大幅度增加了窃听者的误码率,使其难以正常窃取信息,达到保证主信道通信安全的目的。实验结果表明,该方法在增加少量人工干扰噪声的情况下,使得窃听者的误码率达到30%~50%以上,达到防止窃听目的。

关键词: RSD度分布函数, MP译码, 喷泉码, 防窃听信道

Abstract: An anti-eavesdropping method with the fountain codes embedded in the physical layer is introduced to aim at the security of wireless communication. The artificial noise is used to damage the rule in MP decoding of fountain codes and make it more difficult to steal information on the premise of ensuring the communication security of the main channel. The experimental result shows that, under the condition of a small amount of artificial interference noise, this method can increase the BER of the eavesdropper by 30% to 50%, the purpose of preventing eavesdropping is to be achieved.

Key words: wiretap channel, robust soliton distribution, message propagation decoder, fountain codes

中图分类号: 

  • TP309.2
[1] OKAMOTO T,YAMAMOTO H. Modern cryptography[M]. Tokyo: Sangyo-Tosho, 1997: 1-12.
[2] KASAHARA M, SAKAI R. A construction of short public-key cryptosystem over extension field[J]. Technical report of IEICE. ISEC, 2003, 102:63-68.
[3] MCELIECE R J. A public-key cryptosystem based on algebraic coding theory[J]. Deep Space Network Progress Report, 1978, 44:114-116.
[4] XU H, FENG D, SUN C, et al. Construction of LDPC codes based on resolvable group divisible designs[C] // International Workshop on High Mobility Wireless Communications. IEEE, 2015: 111-115.
[5] KLINC D, HA J, MCLAUGHLIN S W, et al. LDPC codes for the Gaussian wiretap channel[C] // Information Theory Workshop, 2009. Itw. IEEE, 2009: 95-99.
[6] YUKSEL M, ERKIP E. The relay channel with a wire-tapper[C] // Information Sciences and Systems, 2007. CISS'07. Conference on. IEEE, 2007: 13-18.
[7] TEKIN E, YENER A. The general gaussian multiple-access and two-way wiretap channels: achievable rates and cooperative jamming[J]. IEEE Transactions on Information Theory, 2007, 54(6):2735-2751.
[8] LAI L, GAMAL H E, POOR H V. The wiretap channel with feedback: encryption over the channel[J]. IEEE Transactions on Information Theory, 2008, 54(11):5059-5067.
[9] LIN P H, LAI S H, LIN S C, et al. On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels[J]. IEEE Journal on Selected Areas in Communications, 2012, 31(9):1728-1740.
[10] GOEL S, NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008, 7(6):2180-2189.
[11] BYERS J W, LUBY M, MITZENMACHER M, et al. A digital fountain approach to reliable distribution of bulk data[J]. Acm Sigcomm Computer Communication Review, 1998, 28(4):56-67.
[12] GUREVICH Y. Proceedings 43rd annual IEEE symposium on foundations of computer science[J]. Zeitschrift Für Geburtshilfe Und Neonatologie, 2002, 8(5):201-210.
[13] SUH Y, BAIK J, Rahnavard N, et al. Fountain code design for broadcasting systems with intermediate-state users[J]. IEEE Transactions on Communications, 2015, 63(9):3057-3068.
[14] BORUJENY R R, ARDAKANI M. Fountain code design for the Y-network[J]. IEEE Communications Letters, 2015, 19(5):703-706.
[15] 牛芳琳, 李宝明, 陈付亮,等. 一种改进的基于部分信息喷泉码度分布设计[J]. 电子学报, 2016, 44(2):295-300. NIU Fanglin, LI Baoming, CHEN Fuliang, et al. The improved degree distribution for rateless code under partial inform-ation[J]. Acta Electronica Sinica, 2016, 44(2):295-300.
[16] 雷维嘉, 张梦, 谢显中. 基于度分布合并和可译集优化的LT码度分布设计方案[J]. 电子学报, 2015, 43(4):800-805. LEI Weijia, ZHANG Meng, XIE Xianzhong. A design scheme for LT codes degree distribution by combining degree distributions and optimizing ripple size[J]. Acta Electronica Sinica, 2015, 43(4):800-805.
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!