Sun C, Fei Z, Jia D, et al. Secure Transmission Scheme for Parallel Relay Channels Based on Polar Coding. Tsinghua Science and Technology, 2018, 23(3): 357-365. https://doi.org/10.26599/TST.2018.9010081
This paper considers the use of polar codes to enable secure transmission over parallel relay channels. By exploiting the properties of polar codes over parallel channels, a polar encoding algorithm is designed based on Channel State Information (CSI) between the legitimate transmitter (Alice) and the legitimate receiver (Bob). Different from existing secure transmission schemes, the proposed scheme does not require CSI between Alice and the eavesdropper (Eve). The proposed scheme is proven to be reliable and shown to be capable of transmitting information securely under Amplify-and-Forward (AF) relay protocol, thereby providing security against passive and active attackers.
Secure Transmission Scheme for Parallel Relay Channels Based on Polar Coding
Show Author's information
Hide Author's Information
Ce Sun, Zesong Fei(
), Dai Jia, Congzhe Cao, Xinyi Wang
School of Information and Electronics, Beijing Institute of Technology, Beijing100081, China.
Department of Electrical and Computer Engineering, University of Alberta, Edmonton, ABT6G 1H9, Canada.
Abstract
This paper considers the use of polar codes to enable secure transmission over parallel relay channels. By exploiting the properties of polar codes over parallel channels, a polar encoding algorithm is designed based on Channel State Information (CSI) between the legitimate transmitter (Alice) and the legitimate receiver (Bob). Different from existing secure transmission schemes, the proposed scheme does not require CSI between Alice and the eavesdropper (Eve). The proposed scheme is proven to be reliable and shown to be capable of transmitting information securely under Amplify-and-Forward (AF) relay protocol, thereby providing security against passive and active attackers.
Chen Z., Yin L., and Lu J., Hamming distortion based secrecy systems to foil the eavesdropper with finite shared key, IEEE Commun. Lett., vol. 19, no. 5, pp. 711–714, 2015.
Nabar R. U., Bolcskei H., and Kneubuhler F. W., Fading relay channels: Performance limits and space-time signal design, IEEE J. Sel. Areas Commun., vol. 22, no. 6, pp. 1099–1109, 2004.
Aggarwal V., Sankar L., Calderbank A. R., and Poor H. V., Secrecy capacity of a class of orthogonal relay eavesdropper channels, inInformation Theory and Applications Workshop, San Diego, CA, USA, 2009, pp. 295–300.
[5]
Zhang Y., Yang Z., Liu A., and Zou Y., Secure transmission over the wiretap channel using polar codes and artificial noise, IET.Comm., vol. 11, no. 3, pp. 377–384, 2017.
Awan Z. H., Zaidi A., and Vandendorpe L., Secure communication over parallel relay channel, IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 359–371, 2012.
Chen Z., Yin L., Pei Y., and Lu J., CodeHop: Physical layer error correction and encryption with LDPC-based code hopping, Science China Information Sciences, vol. 59, no. 10, pp. 1–15, 2016
Cao C., Fei Z., Yuan J., and Kuang J., Low complexity list successive cancellation decoding of polar codes, IET Comm., vol. 8, no. 17, pp. 3145–3149, 2014.
Alamdar-Yazdi A. and Kschischang F. R., A simplified successive-cancellation decoder for polar codes, IEEE Commun. Lett, vol. 15, no. 12, pp. 1378–1380, 2011.
Sarkis G., Giard P., Vardy A., Thibeault C., and Gross W. J., Fast list decoders for polar codes, IEEE Journal on Selected Areas in Communications, vol. 34, no. 2, pp. 318–328, 2016.
Koyluoglu O. O. and El Gamal H., Polar coding for secure transmission and key agreement, IEEE Trans. Inf. Forensics Security, vol. 7, no. 5, pp. 1472–1483, 2012.
Sasoglu E. and Vardy A., A new polar coding scheme for strong security on wiretap channels, in IEEE International Symposium on Information Theory (ISIT), Istanbul, Turkey, 2013, pp. 1117–1121.
[14]
Si H., Koyluoglu O. O., and Vishwanath S., Hierarchical polar coding for achieving secrecy over state-dependent wiretap channels without any instantaneous CSI, IEEE Transactions on Communications, vol. 64, no. 9, pp. 3609–3623, 2016.
Hooshmand R., Aref M. R., and Eghlidos T., Physical layer encryption scheme using finite-length polar codes, IET Commun., vol. 9, no. 15, pp. 1857–1866, 2015.
Kim Y. S., Kim J. H., and Kim S. H., A secure information transmission scheme with a secret key based on polar coding, IEEE Commun. Lett., vol. 18, no. 6, pp. 937–940, 2014.
Hooshmand R., Shooshtari M. K., and Aref M. R., Secret key cryptosystem based on polar codes over binary erasure channel, in International ISC Conference on Information Security and Cryptology (ISCISC), 2013, pp. 1–6.
Si H., Koyluoglu O. O., and Vishwanath S., Achieving secrecy without any instantaneous CSI: Polar coding for fading wiretap channels, in IEEE International Symposium on Information Theory (ISIT), Hong Kong, China, 2015, pp. 2161–2165.
[20]
Wei Y. P. and Ulukus S., Polar coding for the general wiretap channel, in IEEE Information Theory Workshop (ITW), 2015, pp. 1–5.
[21]
Hajimomeni M., Aghaeinia H., Kim I. M., and Kim K., Cooperative jamming polar codes for multiple-access wiretap channels, IET Commun., vol. 10, no. 4, pp. 407–415, 2016.
Niu K., Chen K., Lin J., and Zhang Q. T., Polar codes: Primary concepts and practical decoding algorithms, IEEE Communications Magazine, vol. 52, no. 7, pp. 192–203, 2014.
Mori R. and Tanaka T., Performance of polar codes with the construction using density evolution, IEEE Commun. Lett., vol. 13, no. 7, pp. 519–521, 2009.
This work was supported in part by the National Natural Science Foundation of China (No. 61371075) and Beijing Municipal Science and Technology Project (No. D171100006317001).