Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design

In wireless communication wiretap channel, for the eavesdropper to obtain the legitimate receiver decoding rules situation, this paper proposes a LT-SLT fountain code anti-eavesdropping channel coding design. This method targets the Luby Transform (LT) code transmission for some of the original symb...

Full description

Bibliographic Details
Main Authors: Lizheng Wang, Fanglin Niu, Daxing Qian, Ling Yu
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10339318/
_version_ 1797400984085856256
author Lizheng Wang
Fanglin Niu
Daxing Qian
Ling Yu
author_facet Lizheng Wang
Fanglin Niu
Daxing Qian
Ling Yu
author_sort Lizheng Wang
collection DOAJ
description In wireless communication wiretap channel, for the eavesdropper to obtain the legitimate receiver decoding rules situation, this paper proposes a LT-SLT fountain code anti-eavesdropping channel coding design. This method targets the Luby Transform (LT) code transmission for some of the original symbols of the Shifted LT (SLT) code and utilizes the fountain code to receive the correct symbols in different noise channels with differential characteristics so that the decoding process of the eavesdropper changes and cannot be decoded in synchronization with the legitimate receivers, and then the partial symbols of the recovered source are different from those of the legitimate receivers. When these symbols continue to participate in SLT decoding, increasing the untranslated rate of the eavesdropper. Experimental results show that although the method proposed in this paper increases the number of decoded symbols by a small amount, the eavesdropper untranslated rate of this scheme gets improved by about 15% when the main channel or the wiretap channel is varied individually, compared with LT code and SLT code. When both the main channel and the wiretap channel are varied simultaneously, the untranslated rate of the eavesdropper in this scheme gets approximately 30% higher compared to LT code and SLT code, and the untranslated rate of the eavesdropper in this scheme gets approximately 14% higher compared to SLT-LT fountain code. When the main channel is worse or slightly better than the wiretap channel, the untranslated rate of eavesdroppers of this scheme is better than that of SLT-LT fountain code, which effectively ensures secure transmission of information.
first_indexed 2024-03-09T02:03:22Z
format Article
id doaj.art-04b79c1f08024613947380f0c5fb9661
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-09T02:03:22Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-04b79c1f08024613947380f0c5fb96612023-12-08T00:05:38ZengIEEEIEEE Access2169-35362023-01-011113469013470010.1109/ACCESS.2023.333801410339318Fountain Code-Based LT-SLT Anti-Eavesdropping Coding DesignLizheng Wang0https://orcid.org/0000-0003-0276-6272Fanglin Niu1https://orcid.org/0000-0001-9395-3529Daxing Qian2Ling Yu3https://orcid.org/0000-0002-6166-405XSchool of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou, ChinaSchool of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou, ChinaCollege of Information Engineering, Dalian Ocean University, Dalian, ChinaSchool of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou, ChinaIn wireless communication wiretap channel, for the eavesdropper to obtain the legitimate receiver decoding rules situation, this paper proposes a LT-SLT fountain code anti-eavesdropping channel coding design. This method targets the Luby Transform (LT) code transmission for some of the original symbols of the Shifted LT (SLT) code and utilizes the fountain code to receive the correct symbols in different noise channels with differential characteristics so that the decoding process of the eavesdropper changes and cannot be decoded in synchronization with the legitimate receivers, and then the partial symbols of the recovered source are different from those of the legitimate receivers. When these symbols continue to participate in SLT decoding, increasing the untranslated rate of the eavesdropper. Experimental results show that although the method proposed in this paper increases the number of decoded symbols by a small amount, the eavesdropper untranslated rate of this scheme gets improved by about 15% when the main channel or the wiretap channel is varied individually, compared with LT code and SLT code. When both the main channel and the wiretap channel are varied simultaneously, the untranslated rate of the eavesdropper in this scheme gets approximately 30% higher compared to LT code and SLT code, and the untranslated rate of the eavesdropper in this scheme gets approximately 14% higher compared to SLT-LT fountain code. When the main channel is worse or slightly better than the wiretap channel, the untranslated rate of eavesdroppers of this scheme is better than that of SLT-LT fountain code, which effectively ensures secure transmission of information.https://ieeexplore.ieee.org/document/10339318/Anti-eavesdroppingerase channelphysical layer securityfountain codescoding complexity
spellingShingle Lizheng Wang
Fanglin Niu
Daxing Qian
Ling Yu
Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design
IEEE Access
Anti-eavesdropping
erase channel
physical layer security
fountain codes
coding complexity
title Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design
title_full Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design
title_fullStr Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design
title_full_unstemmed Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design
title_short Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design
title_sort fountain code based lt slt anti eavesdropping coding design
topic Anti-eavesdropping
erase channel
physical layer security
fountain codes
coding complexity
url https://ieeexplore.ieee.org/document/10339318/
work_keys_str_mv AT lizhengwang fountaincodebasedltsltantieavesdroppingcodingdesign
AT fanglinniu fountaincodebasedltsltantieavesdroppingcodingdesign
AT daxingqian fountaincodebasedltsltantieavesdroppingcodingdesign
AT lingyu fountaincodebasedltsltantieavesdroppingcodingdesign