CN109067501B - Polar code communication method and device based on degraded wiretap channel noise interference - Google Patents

Polar code communication method and device based on degraded wiretap channel noise interference Download PDF

Info

Publication number
CN109067501B
CN109067501B CN201810989802.8A CN201810989802A CN109067501B CN 109067501 B CN109067501 B CN 109067501B CN 201810989802 A CN201810989802 A CN 201810989802A CN 109067501 B CN109067501 B CN 109067501B
Authority
CN
China
Prior art keywords
channel
bit
channels
eavesdropping
polarization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810989802.8A
Other languages
Chinese (zh)
Other versions
CN109067501A (en
Inventor
马楠
周方圆
张平
张治�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201810989802.8A priority Critical patent/CN109067501B/en
Publication of CN109067501A publication Critical patent/CN109067501A/en
Application granted granted Critical
Publication of CN109067501B publication Critical patent/CN109067501B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0009Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the channel coding
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/03Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
    • H03M13/05Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
    • H03M13/13Linear codes

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Dc Digital Transmission (AREA)

Abstract

The embodiment of the invention provides a Polar code communication method and device based on degraded wiretapping channel noise interference, wherein the method comprises the following steps: acquiring a first channel set and a second channel set of a main channel after channel polarization; acquiring a third channel set and a fourth channel set of the wiretap channel after channel polarization; calculating a difference set of the first channel set and the third channel set; determining a second safety bit channel according to the difference set obtained by calculation; transmitting Polar code coding signals which are not injected with artificial noise through a first safety bit channel; and transmitting the Polar code coding signal injected by artificial noise through a second safety bit channel. The embodiment of the invention can expand the number of the safe bit channels, thereby improving the safe transmission rate.

Description

Polar code communication method and device based on degraded wiretap channel noise interference
Technical Field
The invention relates to the technical field of network communication, in particular to a Polar code communication method and device based on degraded wiretapping channel noise interference.
Background
With the development of communication technology, wireless communication devices have higher and higher communication rates, people can quickly access the internet through the wireless communication devices, and wireless communication becomes an indispensable part of people's lives.
The eavesdropping channel model is a communication model proposed by Wyner in the seventies of the twentieth century, in which legitimate users Alice and Bob communicate through a main channel, and a third-party eavesdropper Eve eavesdrops communication contents between the legitimate users through the eavesdropping channel.
Polar code is a coding scheme which can theoretically reach shannon limit as one of the coding schemes of the fifth generation communication technology. As shown in fig. 1, a degraded eavesdropping channel model based on Polar codes may be constructed. In the model, u is an information bit sequence sent by Alice; x is a bit sequence output after the information u passes through the encoder; y is the bit sequence of the main channel output; z is the bit sequence output by the eavesdropping channel;
Figure BDA0001780527000000011
is an estimated value of an information sequence obtained after decoding by a legal receiver Bob; cmRepresents the channel capacity of the primary channel; cwIndicating the channel capacity of the eavesdropping channel.
In the Polar code-based construction method, the most critical part is the selection of the information bit set A. After the channels are polarized, the values of the bartchinson factors Z of most of the sub-channels tend to be '0' (a noiseless bit channel) or '1' (a full-noise bit channel), a set formed by coefficients i corresponding to the noiseless bit channel is called an information bit set a, and the bit channels are used for transmitting information; while the coefficients of the full-noise bit channel constitute a fixed bit set AcWhich is the complement of a, these channels do not transmit any information.
In the degenerate wiretapping channel model, since the wiretapping channel is a degenerate channel of the main channel, i.e., wiretapping channel AwRatio of noise to main channel AmIs loud, can prove
Figure BDA0001780527000000012
Thus making use of the information bit a that is excess in the main channelsI.e. Aw-AmThe information is transmitted by the part, so that the secure communication is realized, the set of the part of information bits is called the secure bit for short, the corresponding bit channel is called the secure bit channel, and the transmission rate obtained under the secure bit channel becomes the secure transmission rate.
In the existing degradation wiretapping channel communication technology based on Polar code, because the selection of the information bit set A has close relationship with the code length and the characteristics of the channel, under the condition that the wiretapping channel degradation degree is limited or the code length N is limited, the value A of the safety bit is causedw-AmSmall, resulting in a transmission rate of the secure bit channel R ═ Am-Aw]The value of/N is also very small, so the existing degenerate wiretapping channel communication technology based on Polar codes has the problem of low safe transmission rate.
Disclosure of Invention
The embodiment of the invention aims to provide a Polar code communication method and device based on degraded wiretap channel noise interference so as to improve the safe transmission rate. The specific technical scheme is as follows:
in a first aspect, an embodiment of the present invention provides a Polar code communication method based on degraded wiretapping channel noise interference, which is applied to a degraded wiretapping communication system, where the degraded wiretapping communication system includes: a primary channel and an eavesdropping channel, the eavesdropping channel being a degraded channel of the primary channel, the method comprising:
acquiring a first channel set and a second channel set of the main channel after channel polarization; the first channel set is a set of channels with good channel quality in the main channel; the second channel set is a set of channels with poor channel quality in the main channel;
acquiring a third channel set and a fourth channel set of the eavesdropping channel after channel polarization; the third channel set is a set of channels with good channel quality in the eavesdropping channels; the fourth channel set is a set of channels with poor channel quality in the eavesdropping channel;
calculating a difference set of the first channel set and the third channel set; the difference set is a set of first secure bit channels; the first secure bit channel is: a channel having good channel quality with respect to the main channel and a channel having poor channel quality with respect to the eavesdropping channel;
determining a second secure bit channel according to the difference set obtained by calculation; the second secure bit channel is: channels in the first set of channels other than the first safety bit channel;
transmitting Polar code encoding signals without artificial noise injection through the first safety bit channel;
and sending Polar code coding signals injected by artificial noise through the second safety bit channel.
Optionally, before the obtaining the first channel set and the second channel set of the main channel after channel polarization, the method further includes:
acquiring each bit channel of the main channel after channel polarization, and calculating a ButterCharia factor of each bit channel;
determining a bit channel with a ButterCharia factor tending to 0 as a bit channel with good channel quality and classifying the bit channel into a first channel set;
the bit channel for which the bartchari factor tends to 1 is determined as a channel having poor channel quality and classified as the second channel set.
Optionally, before the acquiring the third channel set and the fourth channel set of the eavesdropping channel after channel polarization, the method further includes:
acquiring each bit channel of the eavesdropping channel after channel polarization, and calculating a ButterCharia factor of each bit channel;
determining a bit channel with the ButterCharia factor tending to 0 as a bit channel with good channel quality, and classifying the bit channel into a third channel set;
a bit channel whose bartchari factor tends to 1 is determined as a channel having poor channel quality and classified as a fourth channel set.
Optionally, the step of sending the artificial noise injected Polar code encoding signal through the second secure bit channel includes:
obtaining a code word coded by Polar codes and modulating the code word into a signal to be sent;
injecting artificial noise into the signal to be transmitted;
and transmitting the signal to be transmitted after noise injection through the second safety bit channel.
Optionally, before the sending of the artificial noise injected Polar code encoding signal through the second secure bit channel, the method further includes:
and determining a bit channel used for transmitting secret information in the second secure bit channel according to the preset power of the artificial noise.
In a second aspect, an embodiment of the present invention provides a Polar code communication device based on degenerate wiretapping channel noise interference, which is applied to a degenerate wiretapping communication system, where the degenerate wiretapping communication system includes: a primary channel and an eavesdropping channel, the eavesdropping channel being a degraded channel of the primary channel, the apparatus comprising:
a first obtaining module, configured to obtain a first channel set and a second channel set of the main channel after channel polarization; the first channel set is a set of channels with good channel quality in the main channel; the second channel set is a set of channels with poor channel quality in the main channel;
the second acquisition module is used for acquiring a third channel set and a fourth channel set of the eavesdropping channel after channel polarization; the third channel set is a set of channels with good channel quality in the eavesdropping channels; the fourth channel set is a set of channels with poor channel quality in the eavesdropping channel;
a difference set calculation module for calculating a difference set between the first channel set and the third channel set; the difference set is a set of first secure bit channels; the first secure bit channel is: a channel having good channel quality with respect to the main channel and a channel having poor channel quality with respect to the eavesdropping channel;
a first determining module, configured to determine a second secure bit channel according to the difference set obtained through calculation; the second secure bit channel is: channels in the first set of channels other than the first safety bit channel;
a first sending module, configured to send a Polar code encoded signal without artificial noise injection through the first secure bit channel;
and the second sending module is used for sending Polar code coding signals injected by artificial noise through the second safety bit channel.
Optionally, the second sending module includes:
the modulation submodule is used for acquiring code words coded by Polar codes and modulating the code words into signals to be transmitted;
the noise injection submodule is used for injecting artificial noise into the signal to be sent;
and the sending submodule is used for sending the signal to be sent after noise injection through the second safety bit channel.
Optionally, the apparatus further comprises:
a fourth determining module, configured to determine, according to the preset power of the artificial noise, a bit channel for transmitting secret information in the second secure bit channel
In a third aspect, an embodiment of the present invention provides an electronic device, including a processor, a communication interface, a memory, and a communication bus, where the processor, the communication interface, and the memory complete mutual communication through the communication bus; the machine-readable storage medium stores machine-executable instructions executable by the processor, the processor being caused by the machine-executable instructions to: the method steps of the Polar code communication method based on the degraded wiretapping channel noise interference provided by the first aspect of the embodiment of the invention are realized.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, where the computer program is executed by a processor to perform the method steps of the Polar code communication method based on degraded eavesdropping channel noise interference provided in the first aspect of the embodiment of the present invention.
The embodiment of the invention provides a Polar code communication method and device based on degraded wiretapping channel noise interference, which comprises the steps of firstly, acquiring a first channel set and a second channel set of a main channel after channel polarization and a third channel set and a fourth channel set of a wiretapping channel after channel polarization; then, calculating a difference set of the first channel set and the third channel set; and then, determining the channels in the first channel set difference set except the first safe bit channel as a second safe bit channel, sending Polar code coding signals without artificial noise injection through the first safe bit channel, and sending Polar code coding signals after artificial noise injection through the second safe bit channel. Because the second bit channel can completely filter the artificial noise in the second bit channel relative to a legal user and cannot filter the artificial noise in the second bit channel for an eavesdropper, the second bit channel can also safely transmit communication data through the second secure bit channel, which is equivalent to expanding the number of the secure bit channels, thereby improving the secure transmission rate. Of course, it is not necessary for any product or method of practicing the invention to achieve all of the above-described advantages at the same time.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a diagram of a degraded eavesdropping channel model based on Polar codes;
FIG. 2 is a schematic flow chart of a Polar code communication method based on degraded wiretapping channel noise interference according to an embodiment of the present invention;
FIG. 3 is a flowchart of S106 according to an embodiment of the present invention;
FIG. 4 is a diagram illustrating a signaling process according to an embodiment of the present invention;
FIG. 5 is a schematic flow chart of another Polar code communication method based on degraded wiretapping channel noise interference according to an embodiment of the present invention;
FIG. 6 is a diagram illustrating the transmission of information by the main channel and the eavesdropping channel, respectively, according to an embodiment of the invention;
FIG. 7 is a schematic structural diagram of a Polar code communication device based on degraded wiretapping channel noise interference according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a second sending module according to an embodiment of the present invention;
FIG. 9 is a schematic structural diagram of a Polar code communication apparatus based on degraded wiretapping channel noise interference according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 2, an embodiment of the present invention provides a Polar code communication method based on degenerate wiretapping channel noise interference, which is applied to a degenerate wiretapping communication system, where the degenerate wiretapping communication system includes: a primary channel and an eavesdropping channel, the eavesdropping channel being a degraded channel of the primary channel, the process may comprise the steps of:
s101, a first channel set and a second channel set of the main channel after channel polarization are obtained.
The eavesdropping channel model was proposed by Wyner in the seventies of the last century, in which legitimate users Alice and Bob communicate through a main channel, and a third-party eavesdropper Eve eavesdrops the communication content between the legitimate users Alice and Bob through the eavesdropping channel. In the degraded eavesdropping communication channel model, the eavesdropping channel is a degraded channel of the main channel, i.e. the eavesdropping channel is noisy compared to the main channel.
The channel polarization includes two parts of channel combination and channel decomposition, and when the number of combined channels tends to infinity, a polarization phenomenon occurs, namely: a portion of the channel will tend to be a noiseless channel and another portion of the channel will tend to be a full noise channel, a phenomenon known as channel polarization. Wherein, the transmission rate of the noiseless channel will reach the channel capacity, and the transmission rate of the full-noise channel will tend to zero. The coding strategy of Polar codes just applies the characteristic of the phenomenon, transmits useful information of users by using a noiseless channel, and transmits appointed information or unvarnished information by using a full-noise channel.
In the embodiment of the invention, after the main channel is polarized by the channel, the channels with good channel quality can form a channel set, which is called a first channel set; channels of poor channel quality may constitute a set of channels, referred to as a second set of channels.
S102, acquiring a third channel set and a fourth channel set of the eavesdropping channel after channel polarization.
The noise of the eavesdropping channel is larger than that of the main channel, and the eavesdropping channel also has a channel polarization phenomenon, and after the eavesdropping channel is polarized by the channels, the channels with good channel quality can form a channel set which is called a third channel set; channels of poor channel quality may constitute a set of channels, referred to as a fourth set of channels.
S103, calculating a difference set of the first channel set and the third channel set.
After the first channel set and the third channel set are obtained, a difference set between the first channel set and the third channel set can be obtained through calculation.
In the degenerate eavesdropping channel, the polarization of the main channel and the eavesdropping channel will generate a channel with good channel quality and a channel with poor channel quality, respectively. Since the eavesdropping channel is a degraded channel of the main channel, the channel set A of channels of good channel quality among the eavesdropping channelswChannel set A of channels of good channel quality in the primary channelmI.e. the third channel set is a subset of the first channel set, the difference set a of the twoS=Am\AwI.e. a channel with good channel quality with respect to the main channel and with poor channel quality with respect to the eavesdropping channel (disturbed for an eavesdropper), is denoted aS. Can pass through ASThe corresponding channel transmits secret information. The channel set ASReferred to as a first set of secure bit channels.
And S104, determining a second safety bit channel according to the calculated difference set.
Determining a channel set A consisting of a first safety bit channelSThereafter, channels in the first set of channels other than the first safety bit channel, i.e. the second safety bit channel, may be determined. It is easily understood that the second secure bit channel is not only a channel having a good channel quality with respect to the main channel but also a channel having a good channel quality with respect to the eavesdropping channel.
And S105, sending Polar code coding signals without artificial noise injection through a first safety bit channel.
Since the first secure bit channel is a good channel for the main channel and a bad channel for the eavesdropping channel, the Polar code encoded signal can be directly transmitted through the first secure bit channel.
And S106, sending a Polar code coding signal injected by artificial noise through a second safety bit channel.
After the second safety bit channel is determined, Polar code coding signals injected by artificial noise can be sent through the channel. As shown in fig. 3, the specific sending process may be:
s1061, obtaining the code word coded by the Polar code and modulating the code word into a signal to be sent.
After the code word coded by Polar code is obtained, the existing signal modulation technology can be utilized to convert the code word into a code word
Figure BDA0001780527000000082
Modulated into a signal to be transmitted. Specifically, as shown in FIG. 4, after the code word is Polar coded, the code word
Figure BDA0001780527000000083
Will be modulated into a signal to be transmitted
Figure BDA0001780527000000084
Then transmitted via the channel W, the receiver receiving the signal yi. Polar code encoding is prior art, and the embodiments of the present invention are not described herein.
And S1062, injecting artificial noise into the signal to be sent.
The signal may be injected with artifacts prior to transmission that are filtered out by legitimate users and not by eavesdroppers. It should be noted that, in the embodiment of the present invention, it is assumed that a legitimate user can completely filter the artificial noise injected by the sending end, and an eavesdropping user cannot filter the artificial noise, so that a scheme for ensuring that the assumed condition is satisfied is different depending on a physical channel environment and a system condition, and the scheme for ensuring that the assumed condition is satisfied is the prior art, and is not described in detail in the embodiment of the present invention. The artificial noise can be injected into the signal to be transmitted by using the existing noise injection technology.
And S1063, transmitting the signal to be transmitted after noise injection through a second safety bit channel.
Through the second secure bit channel, the ith signal sent is:
Figure BDA0001780527000000081
wherein n isiAre discrete samples of artificial noise, gammaiIs niThe coefficient of (a).
At the receiving end, the ith signal received by the legal user is:
Figure BDA0001780527000000091
the i-th signal received by the eavesdropper is:
Figure BDA0001780527000000092
wherein
Figure BDA0001780527000000093
And
Figure BDA0001780527000000094
channel impulse responses of the main channel and the eavesdropping channel respectively,
Figure BDA0001780527000000095
and
Figure BDA0001780527000000096
independent identically distributed additive white Gaussian noise of a main channel and an eavesdropping channel respectively, and the assumed variances are
Figure BDA0001780527000000097
And
Figure BDA0001780527000000098
suppose that: the legal user can completely filter the artificial noise injected by the transmitting end, and an eavesdropper cannot filter the artificial noise.
Based on the above assumptions, the ith channel observation sequence of the decoder actually inputted to the legitimate user is:
Figure BDA0001780527000000099
the ith channel observation sequence actually input to the eavesdropper's decoder is:
Figure BDA00017805270000000910
the signal-to-noise ratio of the ith physical channel used by the legal user is obtained as follows:
Figure BDA00017805270000000911
the signal-to-noise ratio of the physical channel used by the eavesdropper for the ith time is obtained as follows:
Figure BDA00017805270000000912
in the formula, PiFor the ith use of the effective signal transmission power of the physical channel, Pi JThe artificial noise power of the physical channel used for the ith time for interference.
As an optional implementation manner in the embodiment of the present invention, as shown in fig. 5, the Polar code communication method based on degenerate wiretapping channel noise interference in the embodiment of the present invention may further include:
s201, according to the preset power of the artificial noise, a bit channel used for transmitting the secret information in the second secure bit channel is determined.
After the preset power of the artificial noise is determined, the relationship between the artificial noise power and the signal-to-noise ratio of the main channel and the eavesdropping channel is established, and the mathematical relationship between the artificial noise power and the Bart Charpy factor of the physical channel is also established.
As an optional implementation manner in the embodiment of the present invention, before step S101, the Polar code communication method based on degenerate wiretapping channel noise interference in the embodiment of the present invention may further include:
and obtaining each bit channel of the main channel after channel polarization, and calculating the Bartchy factor of each bit channel.
Polarization of the main channel results in a plurality of bit channels, so that the bartzcharya factor (also called the babbitt parameter) of each bit channel can be calculated. The bartchari factor can be used to measure the quality of the channel as good or bad. When the bartchinson factor of a bit channel tends towards 0, the channel will tend towards a noise-free bit channel; when the bartchinson factor of a bit channel tends towards 1, the channel will tend towards a full noise bit channel.
The bit channel whose bartchari factor tends to 0 is determined as a bit channel having good channel quality and classified as the first channel set.
It is easily understood that when the barchician factor of a bit channel tends to 0, the bit channel tends to be a noise-free bit channel, i.e., the channel is a bit channel having good channel quality. The channel may be classified into a first set of channels.
The bit channel for which the bartchari factor tends to 1 is determined as a channel having poor channel quality and classified as the second channel set.
When the barchician factor of a bit channel tends to 1, the bit channel tends to an all-noise bit channel, i.e., the channel is a bit channel having poor channel quality. The channel may be classified into a second set of channels.
As an optional implementation manner in the embodiment of the present invention, before step S102, the Polar code communication method based on degenerate wiretapping channel noise interference in the embodiment of the present invention may further include:
and acquiring each bit channel of the eavesdropping channel after channel polarization, and calculating the Bartchy factor of each bit channel.
Similarly, a plurality of bit channels may be generated by eavesdropping on the polarization of the channel, so that the barchica factor may be calculated for each bit channel.
The bit channel whose bartchari factor tends to 0 is determined as a bit channel having good channel quality and classified as the third channel set.
A bit channel whose bartchari factor tends to 1 is determined as a channel having poor channel quality and classified as a fourth channel set.
In the embodiment of the present invention, Polar coding aims to: on one hand, the decoding error rate of a legal user Bob is made as small as possible through coding processing, and the sequence is estimated
Figure BDA0001780527000000111
The accuracy is higher; on the other hand, it is expected that the eavesdropper Eve acquires the observation sequence from the eavesdropping channel
Figure BDA0001780527000000112
The effective information is acquired as close to 0 as possible.
Thus, existing Polar coding schemes divide the bit channels into three classes: the first type is a bit channel for transmitting useful information, and its index set is ASThe corresponding sequence to be coded is
Figure BDA0001780527000000113
The second type is a bit channel for transmitting random sequences, with index set ARThe corresponding sequence to be coded is
Figure BDA0001780527000000114
The third type is a bit channel for transmitting fixed bits, with index set AFThe corresponding sequence to be coded is
Figure BDA0001780527000000115
Wherein A isS、AR、AFThe three do not intersect and satisfy:
AS∪AR∪AF=N
as can be seen from the analysis of the existing Polar security coding scheme, the key for constructing Polar security code words lies in finding out the bit channel set A which satisfies the requirements of high efficiency and reliability for information transmission of legal users and completely failing to extract effective information for wiretapping usersS. It has been documented that the above-mentioned a exists under the condition that the eavesdropping channel is a degraded version of the main channelSAnd specific definitions are given:
AS=G(WM,β)\(WE,β)
AR=G(WE,β)
AF=B(WM,β)
wherein "\" is the difference set operator, G (W)Eβ) and B (W)Mβ) sets of bit channels of good and poor channel quality, respectively, (hereinafter simply referred to as good and poor bit channels, respectively), which are defined basically as:
Figure BDA0001780527000000121
Figure BDA0001780527000000122
Figure BDA0001780527000000123
wherein β E [0,1/2 ]]N is the multiplexing times of the physical channel,
Figure BDA0001780527000000124
is the ith bit channel of the primary channel,
Figure BDA0001780527000000125
for eavesdropping on the ith bit channel of the channel, z (w) is the barker factor of the channel.
In view of the above definition, in the condition that the eavesdropping channel is a degraded version of the main channel, there must be
Figure BDA0001780527000000126
In the embodiment of the invention, in the Polar code coding communication method based on the degraded wiretapping channel, as shown in fig. 6, a legal user sends information through a main channel, wherein an information sequence is placed in a first secure bit channel AsThe first safety bit channel is mapped with an information sequence; the information sequence (shown by shading) and the random sequence (shown by shading) can be placed in the second safety bit channel for transmission, namely, the random sequence and the information sequence are mapped in the second safety bit channel; the fixed sequence may be transmitted in the second set of channels, i.e., the second set of channels is mapped to the fixed sequence.
The Polar code communication method based on the degraded wiretapping channel noise interference provided by the embodiment of the invention comprises the following steps of firstly, acquiring a first channel set and a second channel set of a main channel after channel polarization, and acquiring a third channel set and a fourth channel set of a wiretapping channel after channel polarization; then, calculating a difference set of the first channel set and the third channel set; and then, determining the channels in the first channel set difference set except the first safe bit channel as a second safe bit channel, sending Polar code coding signals without artificial noise injection through the first safe bit channel, and sending Polar code coding signals after artificial noise injection through the second safe bit channel. Because the second bit channel can completely filter the artificial noise in the second bit channel relative to a legal user and cannot filter the artificial noise in the second bit channel for an eavesdropper, the second bit channel can also safely transmit communication data through the second secure bit channel, which is equivalent to expanding the number of the secure bit channels, thereby improving the secure transmission rate.
A specific embodiment of a Polar code communication device based on degenerate wiretapping channel noise interference according to an embodiment of the present invention corresponds to the flow shown in fig. 2, and referring to fig. 7, fig. 7 is a schematic structural diagram of a Polar code communication device based on degenerate wiretapping channel noise interference according to an embodiment of the present invention, and includes:
a first obtaining module 301, configured to obtain a first channel set and a second channel set after a main channel is subjected to channel polarization; the first channel set is a set of channels with good channel quality in the main channel; the second set of channels is a set of channels of poor channel quality in the primary channel.
A second obtaining module 302, configured to obtain a third channel set and a fourth channel set of the eavesdropping channel after channel polarization; the third channel set is a set of channels with good channel quality in the eavesdropping channels; the fourth set of channels is a set of channels with poor channel quality in the eavesdropping channel.
A difference set calculating module 303, configured to calculate a difference set between the first channel set and the third channel set; the difference set is a set of first secure bit channels; the first secure bit channel is: a channel with good channel quality with respect to the main channel and a channel with poor channel quality with respect to the eavesdropping channel.
A first determining module 304, configured to determine a second secure bit channel according to the calculated difference set; the second secure bit channel is: the first channel set includes channels other than the first safety bit channel.
A first sending module 305, configured to send a Polar code encoded signal without artificial noise injection through a first secure bit channel.
A second sending module 306, configured to send the artificial noise injected Polar code encoded signal through a second secure bit channel.
As shown in fig. 8, the second sending module 306 includes:
and the modulation submodule 3061 is configured to obtain a codeword encoded by a Polar code and modulate the codeword into a signal to be transmitted.
The noise injection submodule 3062 is configured to inject artificial noise into the signal to be transmitted.
The transmitting submodule 3063 is configured to transmit the signal to be transmitted after noise injection through the second secure bit channel.
The Polar code communication device based on the degraded wiretapping channel noise interference provided by the embodiment of the invention comprises the following steps of firstly, acquiring a first channel set and a second channel set of a main channel after channel polarization, and acquiring a third channel set and a fourth channel set of a wiretapping channel after channel polarization; then, calculating a difference set of the first channel set and the third channel set; and then, determining the channels in the first channel set difference set except the first safe bit channel as a second safe bit channel, sending Polar code coding signals without artificial noise injection through the first safe bit channel, and sending Polar code coding signals after artificial noise injection through the second safe bit channel. Because the second bit channel can completely filter the artificial noise in the second bit channel relative to a legal user and cannot filter the artificial noise in the second bit channel for an eavesdropper, the second bit channel can also safely transmit communication data through the second secure bit channel, which is equivalent to expanding the number of the secure bit channels, thereby improving the secure transmission rate.
The embodiment of the present invention further provides a Polar code communication device based on degraded wiretap channel noise interference, as shown in fig. 9, including:
a first factor calculating module 401, configured to obtain each bit channel after the main channel is subjected to channel polarization, and calculate a bartchari factor of each bit channel.
The second determining module 402 determines the bit channel with the bartchari factor tending to 0 as the bit channel with good channel quality and classifies the bit channel as the first channel set.
Wherein the second determining module 402 is further configured to determine the bit channel with the bartchari factor tending towards 1 as a channel with poor channel quality and classify the channel as the second channel set.
The second factor calculating module 403 is configured to obtain each bit channel after the eavesdropping channel is polarized by the channel, and calculate a bartchari factor of each bit channel.
A third determining module 404, configured to determine a bit channel with a bartchari factor tending towards 0 as a bit channel with good channel quality and classify the bit channel as a third channel set.
Wherein the third determining module 404 is further configured to determine the bit channel with the bartchari factor trending toward 1 as a channel with poor channel quality and classify the bit channel as the fourth channel set.
The Polar code communication device based on the degraded wiretap channel noise interference of the embodiment of the invention further comprises:
a fourth determining module 501, configured to determine, according to the preset power of the artificial noise, a bit channel used for transmitting the secret information in the second secure bit channel.
The Polar code communication device based on the noise interference of the degraded wiretapping channel, provided by the embodiment of the invention, can calculate the bit channel used for transmitting the secret information in the second safe bit channel according to the preset power of the artificial noise, can control the number of the safe bit channels according to the actual requirement, and increases the flexibility during communication.
An embodiment of the present invention further provides an electronic device, as shown in fig. 10, which includes a processor 601, a communication interface 602, a memory 603, and a communication bus 604, where the processor 601, the communication interface 602, and the memory 603 complete mutual communication through the communication bus 604,
a memory 603 for storing a computer program;
the processor 601 is configured to implement the following steps when executing the program stored in the memory 603:
acquiring a first channel set and a second channel set of a main channel after channel polarization; the first channel set is a set of channels with good channel quality in the main channel; the second channel set is a set of channels with poor channel quality in the main channel;
acquiring a third channel set and a fourth channel set of the wiretap channel after channel polarization; the third channel set is a set of channels with good channel quality in the eavesdropping channels; the fourth channel set is a set of channels with poor channel quality in the eavesdropping channels;
calculating a difference set of the first channel set and the third channel set; the difference set is a set of first secure bit channels; the first secure bit channel is: a channel having good channel quality with respect to the main channel and a channel having poor channel quality with respect to the eavesdropping channel;
determining a second safety bit channel according to the difference set obtained by calculation; the second secure bit channel is: channels in the first channel set other than the first safety bit channel;
transmitting Polar code coding signals which are not injected with artificial noise through a first safety bit channel;
and transmitting the Polar code coding signal injected by artificial noise through a second safety bit channel.
The electronic device provided by the embodiment of the invention comprises a first channel set and a second channel set of a main channel after channel polarization, and a third channel set and a fourth channel set of an eavesdropping channel after channel polarization; then, calculating a difference set of the first channel set and the third channel set; and then, determining the channels in the first channel set difference set except the first safe bit channel as a second safe bit channel, sending Polar code coding signals without artificial noise injection through the first safe bit channel, and sending Polar code coding signals after artificial noise injection through the second safe bit channel. Because the second bit channel can completely filter the artificial noise in the second bit channel relative to a legal user and cannot filter the artificial noise in the second bit channel for an eavesdropper, the second bit channel can also safely transmit communication data through the second secure bit channel, which is equivalent to expanding the number of the secure bit channels, thereby improving the secure transmission rate.
The communication bus mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the electronic equipment and other equipment.
The Memory may include a Random Access Memory (RAM) or a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component.
An embodiment of the present invention further provides a computer-readable storage medium, in which a computer program is stored, and is configured to execute the following steps:
acquiring a first channel set and a second channel set of a main channel after channel polarization; the first channel set is a set of channels with good channel quality in the main channel; the second channel set is a set of channels with poor channel quality in the main channel;
acquiring a third channel set and a fourth channel set of the wiretap channel after channel polarization; the third channel set is a set of channels with good channel quality in the eavesdropping channels; the fourth channel set is a set of channels with poor channel quality in the eavesdropping channels;
calculating a difference set of the first channel set and the third channel set; the difference set is a set of first secure bit channels; the first secure bit channel is: a channel having good channel quality with respect to the main channel and a channel having poor channel quality with respect to the eavesdropping channel;
determining a second safety bit channel according to the difference set obtained by calculation; the second secure bit channel is: channels in the first channel set other than the first safety bit channel;
transmitting Polar code coding signals which are not injected with artificial noise through a first safety bit channel;
and transmitting the Polar code coding signal injected by artificial noise through a second safety bit channel.
The computer-readable storage medium provided in the embodiment of the present invention first obtains a first channel set and a second channel set of a main channel after channel polarization, and a third channel set and a fourth channel set of an eavesdropping channel after channel polarization; then, calculating a difference set of the first channel set and the third channel set; and then, determining the channels in the first channel set difference set except the first safe bit channel as a second safe bit channel, sending Polar code coding signals without artificial noise injection through the first safe bit channel, and sending Polar code coding signals after artificial noise injection through the second safe bit channel. Because the second bit channel can completely filter the artificial noise in the second bit channel relative to a legal user and cannot filter the artificial noise in the second bit channel for an eavesdropper, the second bit channel can also safely transmit communication data through the second secure bit channel, which is equivalent to expanding the number of the secure bit channels, thereby improving the secure transmission rate.
For the apparatus/electronic device/storage medium embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to part of the description of the method embodiment.
It should be noted that the apparatus, the electronic device and the storage medium according to the embodiments of the present invention are an apparatus, an electronic device and a storage medium, respectively, to which the Polar code communication method based on the degenerate wiretapping channel noise interference is applied, and all embodiments of the Polar code communication method based on the degenerate wiretapping channel noise interference are applicable to the apparatus, the electronic device and the storage medium, and all embodiments can achieve the same or similar beneficial effects.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (10)

1. A Polar code communication method based on degraded wiretapping channel noise interference is characterized in that the method is applied to a degraded wiretapping communication system, and the degraded wiretapping communication system comprises the following steps: a primary channel and an eavesdropping channel, the eavesdropping channel being a degraded channel of the primary channel, the method comprising:
acquiring a first channel set and a second channel set of the main channel after channel polarization; the first channel set is a set of channels with good channel quality generated after the main channel is subjected to channel polarization; the second channel set is a set of channels with poor channel quality generated after the main channel is subjected to channel polarization;
acquiring a third channel set and a fourth channel set of the eavesdropping channel after channel polarization; the third channel set is a set of channels with good channel quality generated after the eavesdropping channel is polarized by the channels; the fourth channel set is a set of channels with poor channel quality generated after the eavesdropping channel is polarized by the channels;
calculating a difference set of the first channel set and the third channel set; the difference set is a set of first secure bit channels; the first secure bit channel is: a channel having good channel quality with respect to the main channel and a channel having poor channel quality with respect to the eavesdropping channel;
determining a second secure bit channel according to the difference set obtained by calculation; the second secure bit channel is: channels in the first set of channels other than the first safety bit channel;
transmitting Polar code encoding signals without artificial noise injection through the first safety bit channel;
and sending Polar code coding signals injected by artificial noise through the second safety bit channel.
2. The method of claim 1, wherein prior to obtaining the first channel set and the second channel set after the channel polarization of the primary channel, the method further comprises:
acquiring each bit channel of the main channel after channel polarization, and calculating a ButterCharia factor of each bit channel;
determining a bit channel with a ButterCharia factor tending to 0 as a bit channel with good channel quality and classifying the bit channel into a first channel set;
the bit channel for which the bartchari factor tends to 1 is determined as a channel having poor channel quality and classified as the second channel set.
3. The method according to claim 1, wherein before said acquiring the third channel set and the fourth channel set of the eavesdropping channel after channel polarization, the method further comprises:
acquiring each bit channel of the eavesdropping channel after channel polarization, and calculating a ButterCharia factor of each bit channel;
determining a bit channel with the ButterCharia factor tending to 0 as a bit channel with good channel quality, and classifying the bit channel into a third channel set;
a bit channel whose bartchari factor tends to 1 is determined as a channel having poor channel quality and classified as a fourth channel set.
4. The method of claim 1, wherein said step of sending an artificial noise injected Polar code encoded signal through said second secure bit channel comprises:
obtaining a code word coded by Polar codes and modulating the code word into a signal to be sent;
injecting artificial noise into the signal to be transmitted;
and transmitting the signal to be transmitted after noise injection through the second safety bit channel.
5. The method of claim 1, wherein before said sending an artificial noise injected Polar code encoded signal over said second secure bit channel, said method further comprises:
and determining a bit channel used for transmitting secret information in the second secure bit channel according to the preset power of the artificial noise.
6. A Polar code communication device based on degraded wiretapping channel noise interference is characterized in that the Polar code communication device is applied to a degraded wiretapping communication system, and the degraded wiretapping communication system comprises: a primary channel and an eavesdropping channel, the eavesdropping channel being a degraded channel of the primary channel, the apparatus comprising:
a first obtaining module, configured to obtain a first channel set and a second channel set of the main channel after channel polarization; the first channel set is a set of channels with good channel quality generated after the main channel is subjected to channel polarization; the second channel set is a set of channels with poor channel quality generated after the main channel is subjected to channel polarization;
the second acquisition module is used for acquiring a third channel set and a fourth channel set of the eavesdropping channel after channel polarization; the third channel set is a set of channels with good channel quality generated after the eavesdropping channel is polarized by the channels; the fourth channel set is a set of channels with poor channel quality generated after the eavesdropping channel is polarized by the channels;
a difference set calculation module for calculating a difference set between the first channel set and the third channel set; the difference set is a set of first secure bit channels; the first secure bit channel is: a channel having good channel quality with respect to the main channel and a channel having poor channel quality with respect to the eavesdropping channel;
a first determining module, configured to determine a second secure bit channel according to the difference set obtained through calculation; the second secure bit channel is: channels in the first set of channels other than the first safety bit channel;
a first sending module, configured to send a Polar code encoded signal without artificial noise injection through the first secure bit channel;
and the second sending module is used for sending Polar code coding signals injected by artificial noise through the second safety bit channel.
7. The apparatus of claim 6, wherein the second sending module comprises:
the modulation submodule is used for acquiring code words coded by Polar codes and modulating the code words into signals to be transmitted;
the noise injection submodule is used for injecting artificial noise into the signal to be sent;
and the sending submodule is used for sending the signal to be sent after noise injection through the second safety bit channel.
8. The apparatus of claim 6, further comprising:
and the fourth determining module is used for determining a bit channel used for transmitting secret information in the second secure bit channel according to the preset power of the artificial noise.
9. An electronic device, comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory complete communication with each other through the communication bus;
the memory is used for storing a computer program;
the processor, when executing the program stored in the memory, implementing the method steps of any of claims 1-5.
10. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of claims 1-5.
CN201810989802.8A 2018-08-28 2018-08-28 Polar code communication method and device based on degraded wiretap channel noise interference Active CN109067501B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810989802.8A CN109067501B (en) 2018-08-28 2018-08-28 Polar code communication method and device based on degraded wiretap channel noise interference

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810989802.8A CN109067501B (en) 2018-08-28 2018-08-28 Polar code communication method and device based on degraded wiretap channel noise interference

Publications (2)

Publication Number Publication Date
CN109067501A CN109067501A (en) 2018-12-21
CN109067501B true CN109067501B (en) 2020-04-17

Family

ID=64757467

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810989802.8A Active CN109067501B (en) 2018-08-28 2018-08-28 Polar code communication method and device based on degraded wiretap channel noise interference

Country Status (1)

Country Link
CN (1) CN109067501B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110266321B (en) * 2019-06-04 2020-12-18 北京大学 Novel communication method and system based on polarization code
CN111464265B (en) * 2020-04-03 2021-07-13 北京邮电大学 Information transmission method based on encrypted polarization coding in degenerate eavesdropping channel
CN114760002A (en) * 2022-04-13 2022-07-15 东南大学 Two-out-of-one careless transmission scheme under single-privacy eavesdropping channel model

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103124434A (en) * 2011-03-25 2013-05-29 北京新岸线移动多媒体技术有限公司 Device for wireless communication

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103414540A (en) * 2013-08-14 2013-11-27 南京邮电大学 Degraded eavesdropping channel rate compatible method based on Polar code
US10277252B2 (en) * 2017-01-09 2019-04-30 At&T Intellectual Property I, L.P. Encoding data with polar codes for control channels
CN107017960B (en) * 2017-03-24 2019-04-12 北京航空航天大学 A kind of AWGN-wiretap channel anti-eavesdropping safeguard construction and its implementation based on polar code
CN107148015B (en) * 2017-05-31 2020-07-07 北京理工大学 Continuous encryption physical layer secure transmission method based on polarization code structure

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103124434A (en) * 2011-03-25 2013-05-29 北京新岸线移动多媒体技术有限公司 Device for wireless communication

Also Published As

Publication number Publication date
CN109067501A (en) 2018-12-21

Similar Documents

Publication Publication Date Title
CN109067501B (en) Polar code communication method and device based on degraded wiretap channel noise interference
Tahmasbi et al. First-and second-order asymptotics in covert communication
Tan et al. Time-division is optimal for covert communication over some broadcast channels
Boche et al. Secure identification for wiretap channels; robustness, super-additivity and continuity
JP4862159B2 (en) Quantum key distribution method, communication system, and communication apparatus
Franklin et al. Optimal coding for streaming authentication and interactive communication
Wang Optimal throughput for covert communication over a classical-quantum channel
CN108306731B (en) Continuous variable quantum key distribution method and system based on basis coding
CN110808828A (en) Multi-matrix self-adaptive decoding device and method for quantum key distribution
Arumugam et al. Covert communication over broadcast channels
Kazemi et al. Capacity bounds and detection schemes for data over voice
Garay et al. Secure message transmission with small public discussion
CN112968771A (en) Channel key consistency negotiation method, device, electronic equipment and storage medium
Nasser et al. Polar codes for arbitrary classical-quantum channels and arbitrary cq-macs
Czechlewski et al. Device-independent witness of arbitrary-dimensional quantum systems employing binary-outcome measurements
Wilde et al. Towards efficient decoding of classical-quantum polar codes
EP3370341A1 (en) Polar code encoding for fading channel
Gyongyosi Scalar Reconciliation for Gaussian Modulation of Two-Way Continuousvariable Quantum Key Distribution
KR20190001165A (en) Method and apparatus for estimating binary bit key for information reconciliation of continuous variable quantum key distribution
Choudhuri et al. Capacity-distortion trade-off in channels with state
Cheng et al. Properties of scaled noncommutative Rényi and Augustin information
Hayashi Secure wireless communication under spatial and local Gaussian noise assumptions
Merhav Exponential error bounds on parameter modulation–estimation for discrete memoryless channels
Hegde et al. On the capacity of channels with unknown interference
Si et al. Polar coding for fading channels

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant