JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2018, Vol. 53 ›› Issue (7): 60-64.doi: 10.6040/j.issn.1671-9352.2.2017.025

Previous Articles     Next Articles

Design of anti-eavesdropping code based on fountain codes

LIU Zheng1, NIU Fang-lin1*, QIAN Da-xing2, CAI Xi-biao1, GUO Ying3   

  1. 1. School of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou 121001, Liaoning, China;
    2. School of Information Engineering, Dalian Ocean University, Dalian 116000, Liaoning, China;
    3. School of Graduate, Jinzhou Medical University, Jinzhou 121001, Liaoning, China
  • Received:2017-08-28 Online:2018-07-20 Published:2018-07-03

Abstract: An anti-eavesdropping method with the fountain codes embedded in the physical layer is introduced to aim at the security of wireless communication. The artificial noise is used to damage the rule in MP decoding of fountain codes and make it more difficult to steal information on the premise of ensuring the communication security of the main channel. The experimental result shows that, under the condition of a small amount of artificial interference noise, this method can increase the BER of the eavesdropper by 30% to 50%, the purpose of preventing eavesdropping is to be achieved.

Key words: wiretap channel, robust soliton distribution, message propagation decoder, fountain codes

CLC Number: 

  • TP309.2
[1] OKAMOTO T,YAMAMOTO H. Modern cryptography[M]. Tokyo: Sangyo-Tosho, 1997: 1-12.
[2] KASAHARA M, SAKAI R. A construction of short public-key cryptosystem over extension field[J]. Technical report of IEICE. ISEC, 2003, 102:63-68.
[3] MCELIECE R J. A public-key cryptosystem based on algebraic coding theory[J]. Deep Space Network Progress Report, 1978, 44:114-116.
[4] XU H, FENG D, SUN C, et al. Construction of LDPC codes based on resolvable group divisible designs[C] // International Workshop on High Mobility Wireless Communications. IEEE, 2015: 111-115.
[5] KLINC D, HA J, MCLAUGHLIN S W, et al. LDPC codes for the Gaussian wiretap channel[C] // Information Theory Workshop, 2009. Itw. IEEE, 2009: 95-99.
[6] YUKSEL M, ERKIP E. The relay channel with a wire-tapper[C] // Information Sciences and Systems, 2007. CISS'07. Conference on. IEEE, 2007: 13-18.
[7] TEKIN E, YENER A. The general gaussian multiple-access and two-way wiretap channels: achievable rates and cooperative jamming[J]. IEEE Transactions on Information Theory, 2007, 54(6):2735-2751.
[8] LAI L, GAMAL H E, POOR H V. The wiretap channel with feedback: encryption over the channel[J]. IEEE Transactions on Information Theory, 2008, 54(11):5059-5067.
[9] LIN P H, LAI S H, LIN S C, et al. On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels[J]. IEEE Journal on Selected Areas in Communications, 2012, 31(9):1728-1740.
[10] GOEL S, NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008, 7(6):2180-2189.
[11] BYERS J W, LUBY M, MITZENMACHER M, et al. A digital fountain approach to reliable distribution of bulk data[J]. Acm Sigcomm Computer Communication Review, 1998, 28(4):56-67.
[12] GUREVICH Y. Proceedings 43rd annual IEEE symposium on foundations of computer science[J]. Zeitschrift Für Geburtshilfe Und Neonatologie, 2002, 8(5):201-210.
[13] SUH Y, BAIK J, Rahnavard N, et al. Fountain code design for broadcasting systems with intermediate-state users[J]. IEEE Transactions on Communications, 2015, 63(9):3057-3068.
[14] BORUJENY R R, ARDAKANI M. Fountain code design for the Y-network[J]. IEEE Communications Letters, 2015, 19(5):703-706.
[15] 牛芳琳, 李宝明, 陈付亮,等. 一种改进的基于部分信息喷泉码度分布设计[J]. 电子学报, 2016, 44(2):295-300. NIU Fanglin, LI Baoming, CHEN Fuliang, et al. The improved degree distribution for rateless code under partial inform-ation[J]. Acta Electronica Sinica, 2016, 44(2):295-300.
[16] 雷维嘉, 张梦, 谢显中. 基于度分布合并和可译集优化的LT码度分布设计方案[J]. 电子学报, 2015, 43(4):800-805. LEI Weijia, ZHANG Meng, XIE Xianzhong. A design scheme for LT codes degree distribution by combining degree distributions and optimizing ripple size[J]. Acta Electronica Sinica, 2015, 43(4):800-805.
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!