High efficiency Polar coding key reconciliation scheme in wireless channel

来源 :中国邮电高校学报(英文版) | 被引量 : 0次 | 上传用户:dlcad
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Recently,physical layer security in wireless communication system attracts much attention,and the reconciliation protocol plays an important role in the final secure key distillation,since the secret keys extracted from the realistic characteristics of the wireless channel may not be the same between the transmitter and legitimate receiver.A high efficiency Polar coding key reconciliation scheme is proposed in the paper to correct these errors.In the scheme,the transmitter generates a random stream with the known frozen bits and positions.After that,the transmitter encodes the random bit stream to a code stream by Polar encoding and sends the corrupted version of the code stream and the secret keys to the legitimate receiver.The receiver decodes the received stream with Polar successive cancellation decoding algorithm.With Polar encoding,the receiver obtains a random bit stream,and achieves the final secure key by XOR operator.The results show that the proposed scheme has a higher efficiency and a lower computational complexity,along with a high success rate.The consistency of the keys is very good after the reconciliation.
其他文献
A joint hybrid beamforming and power splitting (JHBPS) design problem for simultaneous wireless information and power transfer (SWIPT) in millimeter-wave (mmWave) system is studied.The considered scenario is a multi-antenna base station (BS) transfers inf
Cloud computing makes it possible for users to share computing power.The framework of multiple data centers gains a greater popularity in modern cloud computing.Due to the uncertainty of the requests from users,the loads of center processing unit (CPU) of
For complex networks,their effectiveness and invulnerability are extremely important.With the development of complex networks,how to evaluate the effectiveness and invulnerability of these networks becomes an important research topic.The relationship amon
Human activity recognition (HAR) for dense prediction is proven to be of good performance,but it relies on labeling every point in time series with the high cost.In addition,the performance of HAR model will show significant degradation when tested on the
With the development and application of information technology,the problem of personal privacy leakage is becoming more and more serious.Most attribute-based broadcast encryption (ABBE) schemes focus on data security,while ignoring the protection of the p
Aiming at the coexistence of cellular network and wireless fidelity (WiFi) network,a coalitional game-based WiFi offloading algorithm in heterogeneous networks is proposed.Firstly,this paper defines the user fairness utility function that comprehensively
To reduce fetching cost from a remote source,it is natural to cache information near the users who may access the information later.However,with development of 5G ultra-dense cellular networks andmobile edge computing (MEC),a reasonable selection among ed
With the advantages of low cost and high mobility,unmanned aerial vehicles (UAVs) have played an important role in wireless communication.We investigate a UAV-enabled mobile relaying system,where a UAV is used as a mobile relay to assist in the communicat
Arbitrated quantum signature (AQS) is an important branch in quantum cryptography to authenticate quantum information,and cryptanalysis on AQS protocols helps to evaluate and improve security of AQS.Recently,it is discovered that an AQS protocol based on
Low earth orbit (LEO) satellite network provides global coverage and supports a wide range of services.However,due to the rapid changes and energy-limitation of satellites,how to meet the demand of the quality of service (QoS) from ground traffic and prol