Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design
In wireless communication wiretap channel, for the eavesdropper to obtain the legitimate receiver decoding rules situation, this paper proposes a LT-SLT fountain code anti-eavesdropping channel coding design. This method targets the Luby Transform (LT) code transmission for some of the original symb...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2023-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10339318/ |
_version_ | 1797400984085856256 |
---|---|
author | Lizheng Wang Fanglin Niu Daxing Qian Ling Yu |
author_facet | Lizheng Wang Fanglin Niu Daxing Qian Ling Yu |
author_sort | Lizheng Wang |
collection | DOAJ |
description | In wireless communication wiretap channel, for the eavesdropper to obtain the legitimate receiver decoding rules situation, this paper proposes a LT-SLT fountain code anti-eavesdropping channel coding design. This method targets the Luby Transform (LT) code transmission for some of the original symbols of the Shifted LT (SLT) code and utilizes the fountain code to receive the correct symbols in different noise channels with differential characteristics so that the decoding process of the eavesdropper changes and cannot be decoded in synchronization with the legitimate receivers, and then the partial symbols of the recovered source are different from those of the legitimate receivers. When these symbols continue to participate in SLT decoding, increasing the untranslated rate of the eavesdropper. Experimental results show that although the method proposed in this paper increases the number of decoded symbols by a small amount, the eavesdropper untranslated rate of this scheme gets improved by about 15% when the main channel or the wiretap channel is varied individually, compared with LT code and SLT code. When both the main channel and the wiretap channel are varied simultaneously, the untranslated rate of the eavesdropper in this scheme gets approximately 30% higher compared to LT code and SLT code, and the untranslated rate of the eavesdropper in this scheme gets approximately 14% higher compared to SLT-LT fountain code. When the main channel is worse or slightly better than the wiretap channel, the untranslated rate of eavesdroppers of this scheme is better than that of SLT-LT fountain code, which effectively ensures secure transmission of information. |
first_indexed | 2024-03-09T02:03:22Z |
format | Article |
id | doaj.art-04b79c1f08024613947380f0c5fb9661 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-03-09T02:03:22Z |
publishDate | 2023-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-04b79c1f08024613947380f0c5fb96612023-12-08T00:05:38ZengIEEEIEEE Access2169-35362023-01-011113469013470010.1109/ACCESS.2023.333801410339318Fountain Code-Based LT-SLT Anti-Eavesdropping Coding DesignLizheng Wang0https://orcid.org/0000-0003-0276-6272Fanglin Niu1https://orcid.org/0000-0001-9395-3529Daxing Qian2Ling Yu3https://orcid.org/0000-0002-6166-405XSchool of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou, ChinaSchool of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou, ChinaCollege of Information Engineering, Dalian Ocean University, Dalian, ChinaSchool of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou, ChinaIn wireless communication wiretap channel, for the eavesdropper to obtain the legitimate receiver decoding rules situation, this paper proposes a LT-SLT fountain code anti-eavesdropping channel coding design. This method targets the Luby Transform (LT) code transmission for some of the original symbols of the Shifted LT (SLT) code and utilizes the fountain code to receive the correct symbols in different noise channels with differential characteristics so that the decoding process of the eavesdropper changes and cannot be decoded in synchronization with the legitimate receivers, and then the partial symbols of the recovered source are different from those of the legitimate receivers. When these symbols continue to participate in SLT decoding, increasing the untranslated rate of the eavesdropper. Experimental results show that although the method proposed in this paper increases the number of decoded symbols by a small amount, the eavesdropper untranslated rate of this scheme gets improved by about 15% when the main channel or the wiretap channel is varied individually, compared with LT code and SLT code. When both the main channel and the wiretap channel are varied simultaneously, the untranslated rate of the eavesdropper in this scheme gets approximately 30% higher compared to LT code and SLT code, and the untranslated rate of the eavesdropper in this scheme gets approximately 14% higher compared to SLT-LT fountain code. When the main channel is worse or slightly better than the wiretap channel, the untranslated rate of eavesdroppers of this scheme is better than that of SLT-LT fountain code, which effectively ensures secure transmission of information.https://ieeexplore.ieee.org/document/10339318/Anti-eavesdroppingerase channelphysical layer securityfountain codescoding complexity |
spellingShingle | Lizheng Wang Fanglin Niu Daxing Qian Ling Yu Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design IEEE Access Anti-eavesdropping erase channel physical layer security fountain codes coding complexity |
title | Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design |
title_full | Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design |
title_fullStr | Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design |
title_full_unstemmed | Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design |
title_short | Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design |
title_sort | fountain code based lt slt anti eavesdropping coding design |
topic | Anti-eavesdropping erase channel physical layer security fountain codes coding complexity |
url | https://ieeexplore.ieee.org/document/10339318/ |
work_keys_str_mv | AT lizhengwang fountaincodebasedltsltantieavesdroppingcodingdesign AT fanglinniu fountaincodebasedltsltantieavesdroppingcodingdesign AT daxingqian fountaincodebasedltsltantieavesdroppingcodingdesign AT lingyu fountaincodebasedltsltantieavesdroppingcodingdesign |