|
|
ldpc codes for physical layer security
|
|
|
|
|
نویسنده
|
marić sonja r. kuljanski
|
منبع
|
military technical courier - 2018 - دوره : 66 - شماره : 4 - صفحه:900 -919
|
چکیده
|
Wireless communication is ubiquitous in today's society. unfortunately, wireless transmission is by the nature of broadcasting suitable for eavesdropping. these links are usually secured by encryption protocols that rely on cryptographic algorithms whose security is based on complexity of calculation and inability to calculate in real time. the hypothesis in the field of information theory is that the eavesdropper has unlimited computer capabilities, and the use of common cryptographic protocols is uncertain. instead, it is assumed that the legitimate recipient of the message has a better communication channel than the intrusion listening. based on this physical advantage, it is possible to use random encoding schemes for the transmission of information at the physical level. these schemes function without the prior exchange of secret keys securely, so protection at this layer tends to significantly simplify key management in communication systems. at the end of the last and the beginning of this century, there was an idea that ldpc codes should be applied to protect data at the physical layer. in this paper, the wyner model of the communication channel was used, and ldpc codes were constructed for the transmission of information through this channel. a comparison of the basic algorithm and its modification was made based on the following parameters: transmission of mutual information, bit-error rate and execution time. an algorithm for different sizes of ldpc codes was also performed based on the above parameters.
|
کلیدواژه
|
ldpc codes ,physical layer security ,wyner wiretap channel
|
آدرس
|
serbian armed forces, center for applied mathematics and electronics, department for telecommunication and informatics (ј-6), serbian armed forces, general staff, serbia
|
پست الکترونیکی
|
sonjakuljanski@gmail.com
|
|
|
|
|
|
|
|
|
|
|
|
Authors
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|