Artificial noise aided polar codes for physical layer security

The secrecy rates of the existing practical secrecy coding methods are relative low to satisfy the security requirement of 5G communications. We propose an artificial noise (AN) aided polar coding algorithm to improve the secrecy rate. Firstly, a secrecy coding model based on AN is presented, where the confidential bits of last transmission code block are adopted as AN to inject into the current codeword. In this way, the AN can only be eliminated from the jammed codeword by the legitimate users. Since the AN is shorter than the codeword, we then develop a suboptimal jamming positions selecting algorithm with the goal of maximizing the bit error rate of the eavesdropper. Theoretical and simulation results demonstrate that the proposed algorithm outperforms the random selection method and the method without AN.

[1]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[2]  Alexander Vardy,et al.  Achieving the secrecy capacity of wiretap channels using Polar codes , 2010, ISIT.

[3]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[4]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[5]  Pingzhi Fan,et al.  5G high mobility wireless communications: Challenges and solutions , 2016, China Communications.

[6]  Mikael Skoglund,et al.  Nested Polar Codes for Wiretap and Relay Channels , 2010, IEEE Communications Letters.

[7]  Wei-Ping Zhu,et al.  Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.

[8]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[9]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.

[10]  Hsuan-Jung Su,et al.  On optimal artificial-noise assisted secure beamforming for the multiple-input multiple-output fading eavesdropper channel , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[11]  Frédérique E. Oggier,et al.  Lattice Code Design for the Rayleigh Fading Wiretap Channel , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).

[12]  Qian Zhang,et al.  Cooperative communications based on rateless network coding in distributed MIMO systems [Coordinated and Distributed MIMO] , 2010, IEEE Wireless Communications.

[13]  Tobias J. Oechtering,et al.  Polar Coding for Bidirectional Broadcast Channels with Common and Confidential Messages , 2013, IEEE Journal on Selected Areas in Communications.

[14]  Meixia Tao,et al.  Polar Coding for Secure Transmission in MISO Fading Wiretap Channels , 2014, ArXiv.

[15]  Aijun Liu,et al.  A Practical Construction Method for Polar Codes , 2014, IEEE Communications Letters.

[16]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.

[17]  Na Li,et al.  The full-duplex artificial noise scheme for security of a cellular system , 2015 .