Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1

Fountain code can significantly increase eavesdroppers’ untranslated efficiency in the wireless communication eavesdropping channel. The secondary LT coding anti-eavesdropping scheme with fountain code degree-1 is the subject of a theoretical investigation in this paper. The fact that its channel se...

Full description

Bibliographic Details
Main Authors: Lizheng Wang, Fanglin Niu, Jingjing Jin, Ling Yu
Format: Article
Language:English
Published: MDPI AG 2023-10-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/13/20/11296
_version_ 1797447049808969728
author Lizheng Wang
Fanglin Niu
Jingjing Jin
Ling Yu
author_facet Lizheng Wang
Fanglin Niu
Jingjing Jin
Ling Yu
author_sort Lizheng Wang
collection DOAJ
description Fountain code can significantly increase eavesdroppers’ untranslated efficiency in the wireless communication eavesdropping channel. The secondary LT coding anti-eavesdropping scheme with fountain code degree-1 is the subject of a theoretical investigation in this paper. The fact that its channel security capacity is greater than that of traditional LT code is first deduced from an information-theoretic standpoint, and the impact of source symbol length on decoding complexity and decoding overhead is then examined. The experimental results show that, compared with the traditional anti-eavesdropping twice fountain code, selecting long source symbols for double LT coding, when the main channel is better than the eavesdropping channel, can ensure that the eavesdropper has a higher untranslated efficiency, and can effectively reduce the fountain code decoding complexity and the number of encoded symbols sent by the source to improve the efficiency of information transmission.
first_indexed 2024-03-09T13:50:15Z
format Article
id doaj.art-950b285071734c758da80812d0c3e035
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-09T13:50:15Z
publishDate 2023-10-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-950b285071734c758da80812d0c3e0352023-11-30T20:52:06ZengMDPI AGApplied Sciences2076-34172023-10-0113201129610.3390/app132011296Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1Lizheng Wang0Fanglin Niu1Jingjing Jin2Ling Yu3School of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou 121001, ChinaSchool of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou 121001, ChinaChina Mobile Communications Group Limited, Chaoyang 122000, ChinaSchool of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou 121001, ChinaFountain code can significantly increase eavesdroppers’ untranslated efficiency in the wireless communication eavesdropping channel. The secondary LT coding anti-eavesdropping scheme with fountain code degree-1 is the subject of a theoretical investigation in this paper. The fact that its channel security capacity is greater than that of traditional LT code is first deduced from an information-theoretic standpoint, and the impact of source symbol length on decoding complexity and decoding overhead is then examined. The experimental results show that, compared with the traditional anti-eavesdropping twice fountain code, selecting long source symbols for double LT coding, when the main channel is better than the eavesdropping channel, can ensure that the eavesdropper has a higher untranslated efficiency, and can effectively reduce the fountain code decoding complexity and the number of encoded symbols sent by the source to improve the efficiency of information transmission.https://www.mdpi.com/2076-3417/13/20/11296LT codeanti-eavesdroppingphysical layer securityeavesdropping channeldelete channel
spellingShingle Lizheng Wang
Fanglin Niu
Jingjing Jin
Ling Yu
Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1
Applied Sciences
LT code
anti-eavesdropping
physical layer security
eavesdropping channel
delete channel
title Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1
title_full Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1
title_fullStr Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1
title_full_unstemmed Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1
title_short Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1
title_sort analysis and research on secondary lt coding anti eavesdropping scheme based on lt code degree 1
topic LT code
anti-eavesdropping
physical layer security
eavesdropping channel
delete channel
url https://www.mdpi.com/2076-3417/13/20/11296
work_keys_str_mv AT lizhengwang analysisandresearchonsecondaryltcodingantieavesdroppingschemebasedonltcodedegree1
AT fanglinniu analysisandresearchonsecondaryltcodingantieavesdroppingschemebasedonltcodedegree1
AT jingjingjin analysisandresearchonsecondaryltcodingantieavesdroppingschemebasedonltcodedegree1
AT lingyu analysisandresearchonsecondaryltcodingantieavesdroppingschemebasedonltcodedegree1