Secure transmission over the wiretap channel using polar codes and artificial noise

In this study, the authors propose a secure transmission scheme using polar codes and artificial noise (AN) for the wiretap system without assuming the channel quality advantage of main channel over wiretap channel. They first derive lower and upper bounds on the symmetric capacity of the polarised bit-channels , which depend on the signal-to-noise ratio of each use of physical channel. According to the bounds, they prove existence of the bit-channels that are beneficial to the signal reception of the main channels but hostile to the wiretap channel, and a method based on injecting the AN at the transmitter is introduced to achieve those bit-channels. Through theoretical analysis, the security of the proposed AN method is proven. Thereafter, they elaborate two AN power allocation schemes denoted by AN-PA-I and AN-PA-II for each use of physical channel. The former proves the existence of the minimum AN power to achieve the secrecy rate that is equal to the capacity of the main channel, referred to as the maximum secrecy rate, and the latter introduces how to obtain it with an optimisation method. Numerical results show that both the two schemes can achieve the maximum secrecy rate.

[1]  Toshiyuki Tanaka,et al.  Performance of polar codes with the construction using density evolution , 2009, IEEE Communications Letters.

[2]  Marco Baldi,et al.  Non-systematic codes for physical layer security , 2010, 2010 IEEE Information Theory Workshop.

[3]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[4]  Mounir Ghogho,et al.  Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.

[5]  Erdal Arikan Channel combining and splitting for cutoff rate improvement , 2006, IEEE Transactions on Information Theory.

[6]  Ruoheng Liu,et al.  Application of LDGM-LDPC codes to secrecy coding for the type-II binary symmetric wiretap channel , 2010, 2010 IEEE Information Theory Workshop on Information Theory (ITW 2010, Cairo).

[7]  Alexander Vardy,et al.  A new polar coding scheme for strong security on wiretap channels , 2013, 2013 IEEE International Symposium on Information Theory.

[8]  Aijun Liu,et al.  A Practical Construction Method for Polar Codes , 2014, IEEE Communications Letters.

[9]  Hossein Pishro-Nik,et al.  A practical approach to polar codes , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[10]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..

[11]  Emre Telatar,et al.  On the rate of channel polarization , 2008, 2009 IEEE International Symposium on Information Theory.

[12]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[13]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[14]  Frédérique E. Oggier,et al.  Lattice Codes for the Wiretap Gaussian Channel: Construction and Analysis , 2016, IEEE Trans. Inf. Theory.

[15]  Cong Ling,et al.  Semantically Secure Lattice Codes for the Gaussian Wiretap Channel , 2012, IEEE Transactions on Information Theory.

[16]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[17]  Erdal Arikan,et al.  Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.

[18]  Ling Liu,et al.  Polar lattices for strong secrecy over the mod-Λ Gaussian wiretap channel , 2014, 2014 IEEE International Symposium on Information Theory.

[19]  U. Maurer The Strong Secret Key Rate of Discrete Random Triples , 1994 .

[20]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[21]  E. Arkan,et al.  A performance comparison of polar codes and Reed-Muller codes , 2008, IEEE Communications Letters.

[22]  Shlomo Shamai,et al.  Secrecy-Achieving Polar-Coding for Binary-Input Memoryless Symmetric Wire-Tap Channels , 2010, ArXiv.

[23]  Alexander Vardy,et al.  Achieving the secrecy capacity of wiretap channels using Polar codes , 2010, ISIT.

[24]  Byung-Jae Kwak,et al.  LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.

[25]  A. Robert Calderbank,et al.  Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.

[26]  Mikael Skoglund,et al.  Nested Polar Codes for Wiretap and Relay Channels , 2010, IEEE Communications Letters.

[27]  Aijun Liu,et al.  A Modified Belief Propagation Polar Decoder , 2014, IEEE Communications Letters.

[28]  A. Robert Calderbank,et al.  On achieving capacity on the wire tap channel using LDPC codes , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[29]  Marco Baldi,et al.  Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.

[30]  Onur Ozan Koyluoglu,et al.  Polar coding for secure transmission and key agreement , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.