Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1
Fountain code can significantly increase eavesdroppers’ untranslated efficiency in the wireless communication eavesdropping channel. The secondary LT coding anti-eavesdropping scheme with fountain code degree-1 is the subject of a theoretical investigation in this paper. The fact that its channel se...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-10-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/13/20/11296 |
_version_ | 1797447049808969728 |
---|---|
author | Lizheng Wang Fanglin Niu Jingjing Jin Ling Yu |
author_facet | Lizheng Wang Fanglin Niu Jingjing Jin Ling Yu |
author_sort | Lizheng Wang |
collection | DOAJ |
description | Fountain code can significantly increase eavesdroppers’ untranslated efficiency in the wireless communication eavesdropping channel. The secondary LT coding anti-eavesdropping scheme with fountain code degree-1 is the subject of a theoretical investigation in this paper. The fact that its channel security capacity is greater than that of traditional LT code is first deduced from an information-theoretic standpoint, and the impact of source symbol length on decoding complexity and decoding overhead is then examined. The experimental results show that, compared with the traditional anti-eavesdropping twice fountain code, selecting long source symbols for double LT coding, when the main channel is better than the eavesdropping channel, can ensure that the eavesdropper has a higher untranslated efficiency, and can effectively reduce the fountain code decoding complexity and the number of encoded symbols sent by the source to improve the efficiency of information transmission. |
first_indexed | 2024-03-09T13:50:15Z |
format | Article |
id | doaj.art-950b285071734c758da80812d0c3e035 |
institution | Directory Open Access Journal |
issn | 2076-3417 |
language | English |
last_indexed | 2024-03-09T13:50:15Z |
publishDate | 2023-10-01 |
publisher | MDPI AG |
record_format | Article |
series | Applied Sciences |
spelling | doaj.art-950b285071734c758da80812d0c3e0352023-11-30T20:52:06ZengMDPI AGApplied Sciences2076-34172023-10-0113201129610.3390/app132011296Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1Lizheng Wang0Fanglin Niu1Jingjing Jin2Ling Yu3School of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou 121001, ChinaSchool of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou 121001, ChinaChina Mobile Communications Group Limited, Chaoyang 122000, ChinaSchool of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou 121001, ChinaFountain code can significantly increase eavesdroppers’ untranslated efficiency in the wireless communication eavesdropping channel. The secondary LT coding anti-eavesdropping scheme with fountain code degree-1 is the subject of a theoretical investigation in this paper. The fact that its channel security capacity is greater than that of traditional LT code is first deduced from an information-theoretic standpoint, and the impact of source symbol length on decoding complexity and decoding overhead is then examined. The experimental results show that, compared with the traditional anti-eavesdropping twice fountain code, selecting long source symbols for double LT coding, when the main channel is better than the eavesdropping channel, can ensure that the eavesdropper has a higher untranslated efficiency, and can effectively reduce the fountain code decoding complexity and the number of encoded symbols sent by the source to improve the efficiency of information transmission.https://www.mdpi.com/2076-3417/13/20/11296LT codeanti-eavesdroppingphysical layer securityeavesdropping channeldelete channel |
spellingShingle | Lizheng Wang Fanglin Niu Jingjing Jin Ling Yu Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1 Applied Sciences LT code anti-eavesdropping physical layer security eavesdropping channel delete channel |
title | Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1 |
title_full | Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1 |
title_fullStr | Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1 |
title_full_unstemmed | Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1 |
title_short | Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1 |
title_sort | analysis and research on secondary lt coding anti eavesdropping scheme based on lt code degree 1 |
topic | LT code anti-eavesdropping physical layer security eavesdropping channel delete channel |
url | https://www.mdpi.com/2076-3417/13/20/11296 |
work_keys_str_mv | AT lizhengwang analysisandresearchonsecondaryltcodingantieavesdroppingschemebasedonltcodedegree1 AT fanglinniu analysisandresearchonsecondaryltcodingantieavesdroppingschemebasedonltcodedegree1 AT jingjingjin analysisandresearchonsecondaryltcodingantieavesdroppingschemebasedonltcodedegree1 AT lingyu analysisandresearchonsecondaryltcodingantieavesdroppingschemebasedonltcodedegree1 |