Shifted LT Code Security Scheme for Partial Information Encryption

The existing physical layer security technology based on fountain codes needs to ensure that the legal channel is superior to the eavesdropping channel; when the quality of the legal channel and the eavesdropping channel are close, the information security cannot be guaranteed. Aiming at this proble...

Full description

Saved in:
Bibliographic Details
Published in:Entropy (Basel, Switzerland) Vol. 24; no. 12; p. 1776
Main Authors: Zhang, Si, Niu, Fanglin, Wang, Lizheng, Yu, Ling
Format: Journal Article
Language:English
Published: Switzerland MDPI AG 05-12-2022
MDPI
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The existing physical layer security technology based on fountain codes needs to ensure that the legal channel is superior to the eavesdropping channel; when the quality of the legal channel and the eavesdropping channel are close, the information security cannot be guaranteed. Aiming at this problem, this paper proposes a shifted Luby transform (SLT) code security scheme for partial information encryption, which is mainly divided into two stages, partial information encryption transfer and degree distribution adjustment. The main idea is that the source randomly extracts part of the information symbols, and performs XOR encryption with the random sequence containing the main channel noise sent by the legitimate receiver. Afterward, the degree distribution is adjusted using the number of transfer information symbols received by the legitimate receiver to improve the average degree of the encoded codewords. Since the eavesdropper can only obtain fewer information symbols in the initial stage, it is difficult to decode the generated coded symbols after the degree distribution adjustment, thereby ensuring the safe transmission of information. The experimental results show that, compared with other LT anti-eavesdropping schemes, even if the legitimate channel is not dominant, the proposed scheme still has better security performance and less decoding overhead.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:1099-4300
1099-4300
DOI:10.3390/e24121776