首页> 外文OA文献 >Performance Analysis and Design of Two Edge Type LDPC Codes for the BEC Wiretap Channel
【2h】

Performance Analysis and Design of Two Edge Type LDPC Codes for the BEC Wiretap Channel

机译:BEC两种边缘型LDpC码的性能分析与设计   窃听频道

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

We consider transmission over a wiretap channel where both the main channeland the wiretapper's channel are Binary Erasure Channels (BEC). We propose acode construction method using two edge type LDPC codes based on the cosetencoding scheme. Using a standard LDPC ensemble with a given threshold over theBEC, we give a construction for a two edge type LDPC ensemble with the samethreshold. If the given standard LDPC ensemble has degree two variable nodes,our construction gives rise to degree one variable nodes in the code used overthe main channel. This results in zero threshold over the main channel. Inorder to circumvent this problem, we numerically optimize the degreedistribution of the two edge type LDPC ensemble. We find that the resultingensembles are able to perform close to the boundary of the rate-equivocationregion of the wiretap channel. There are two performance criteria for a coding scheme used over a wiretapchannel: reliability and secrecy. The reliability measure corresponds to theprobability of decoding error for the intended receiver. This can be easilymeasured using density evolution recursion. However, it is more challenging tocharacterize secrecy, corresponding to the equivocation of the message for thewiretapper. M\'easson, Montanari, and Urbanke have shown how the equivocationcan be measured for a broad range of standard LDPC ensembles for transmissionover the BEC under the point-to-point setup. By generalizing the method ofM\'easson, Montanari, and Urbanke to two edge type LDPC ensembles, we show howthe equivocation for the wiretapper can be computed. We find that relativelysimple constructions give very good secrecy performance and are close to thesecrecy capacity. However finding explicit sequences of two edge type LDPCensembles which achieve secrecy capacity is a more difficult problem. We poseit as an interesting open problem.
机译:我们考虑通过窃听信道进行传输,其中主信道和窃听者的信道都是二进制擦除信道(BEC)。我们提出了一种基于cosetencoding方案的使用两个边缘类型LDPC码的代码构造方法。使用在BEC上具有给定阈值的标准LDPC集成,我们给出了具有相同阈值的两边缘型LDPC集成的构造。如果给定的标准LDPC集合具有二阶可变节点,则我们的构造将在主通道上使用的代码中生成一阶可变节点。这导致主通道上的零阈值。为了解决这个问题,我们在数值上优化了两个边缘型LDPC集合的度分布。我们发现,所得合奏能够在窃听通道的速率等同区域的边界附近执行。对于在窃听通道上使用的编码方案,有两个性能标准:可靠性和保密性。可靠性度量对应于预期接收器的解码错误的概率。这可以使用密度演化递归轻松地测量。但是,表征保密性相对于窃听者消息的模棱两可更具挑战性。 M \'easson,Montanari和Urbanke展示了如何在点对点设置下通过BEC传输的各种标准LDPC集成中,测量模棱两可。通过将M'easson,Montanari和Urbanke的方法推广到两个边缘型LDPC集成,我们展示了如何计算窃听者的等值线。我们发现相对简单的结构提供了很好的保密性能,并且接近于保密能力。然而,找到两个具有保密能力的边缘型LDPC集合的显式序列是一个更困难的问题。我们认为这是一个有趣的开放问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号