Loading...

Improvement of Physical Layer Security Based on Polar Codes in Wireless Communications

Ghamami, Iman | 2022

137 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 54970 (05)
  4. University: Sharif University of Technology
  5. Department: Electrical Engineering
  6. Advisor(s): Aref, Mohammad Reza
  7. Abstract:
  8. In modern wireless communication networks,that we have heterogeneous, asynchronous and ultra low latency networks and Due to the high processing power required by conventional cryptographic systems based on computational security, information theoritc security can play important role in the future development of these systems. Security in this case does not depend on the eavesdropper's computing power, but on the statistical independence between the main message and the received message of the eavesdropper. In recent years, polar codes have created new arenas, as they were the provable channel codes that could achieve capacity and reliability simultaneously. In addition, the clear structure, low complexity encoder and decoder, low latency encoder and decoder make this code suitable for new generations of wireless telecommunication systems. The aim of this dissertation is to present a multiple authentication scheme with confidentiality that can establish both confidentiality and authentication simultaneously using polar codes in the wiretap channel with the same key. In this dissertation, we first examine the polar codes, the method of construction, encoding, decoding, and the design of secure code based on them. Then, by stating the problem and the attacking model, we simulate the probability of error in the authorized receiver and listener, as well as the secrecy rate of the channel. Then, based on the simulation results, we show that the cost of a secure channel rate is negligible compared to system reliability, thus improving security at the physical layer
  9. Keywords:
  10. Physical Layer Security ; Information Theoretic Security ; Polar Code ; Reliability ; Confidentiality ; Multiple Authentication ; Wireless Communication

 Digital Object List

 Bookmark

No TOC