CN110233701A - Wirelessly communicate the decoding method of physical layer communication safety - Google Patents

Wirelessly communicate the decoding method of physical layer communication safety Download PDF

Info

Publication number
CN110233701A
CN110233701A CN201910442318.8A CN201910442318A CN110233701A CN 110233701 A CN110233701 A CN 110233701A CN 201910442318 A CN201910442318 A CN 201910442318A CN 110233701 A CN110233701 A CN 110233701A
Authority
CN
China
Prior art keywords
bit
receiving end
message
code word
llr value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910442318.8A
Other languages
Chinese (zh)
Other versions
CN110233701B (en
Inventor
杜俊逸
肖磊
李涛
黄秀琼
乔文昇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 10 Research Institute
Southwest Electronic Technology Institute No 10 Institute of Cetc
Original Assignee
Southwest Electronic Technology Institute No 10 Institute of Cetc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southwest Electronic Technology Institute No 10 Institute of Cetc filed Critical Southwest Electronic Technology Institute No 10 Institute of Cetc
Priority to CN201910442318.8A priority Critical patent/CN110233701B/en
Publication of CN110233701A publication Critical patent/CN110233701A/en
Application granted granted Critical
Publication of CN110233701B publication Critical patent/CN110233701B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/03Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
    • H03M13/05Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
    • H03M13/11Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits using multiple parity bits
    • H03M13/1102Codes on graphs and decoding on graphs, e.g. low-density parity check [LDPC] codes
    • H03M13/1105Decoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0061Error detection codes

Abstract

The invention proposes a kind of decoding methods for wirelessly communicating physical layer communication safety, can significantly reduce the probability that information is stolen using the present invention.The technical scheme is that: transmitting terminal encodes message bit sequence using LDPC encoder, bit XOR operation is carried out to the partial bit of the adjacent code word of transmitting terminal and obtains new bit sequence, BPSK modulator is by newly-generated bit and to have neither part nor lot in the check bit bit modulation of operation be that BPSK symbol is sent to receiving end;The codeword message position prior information and channel that receiving end BPSK demodulator is fed back according to receiving end ldpc decoder receive symbol, demodulate the log-likelihood ratio LLR value of code word check bit;Receiving end ldpc decoder calculates message digit LLR value, decodes out the message digit of current code word, and codeword message position LLR value is fed back to receiving end BPSK demodulator, and such iteration goes on, the message digit until decoding out all code words.

Description

Wirelessly communicate the decoding method of physical layer communication safety
Technical field
The present invention relates to information theory security fields, especially communication information security technology, are mainly used for channel radio Believe physical layer, ensures low-density checksum (LDPC) decoding method of physical layer communication safety.
Background technique
As the development speed of computer information technology is increasingly accelerated, traditional wire communication is gradually wirelessly communicated and is replaced Generation.Wireless communication is as current mainstream communication mode, and there are some potential safety problemss for open communication mode, to entire The safety of communication brings biggish threat.In a wireless communication system, the broadcast characteristic and wireless channel that electromagnetic signal is propagated Open nature make any user in a certain range all have receive wireless transmission signal ability.Due to wireless communication The channel open of middle transmission medium, signal are arbitrarily propagated in space by radio wave, lose the constraint of " wired ".Electricity Electromagnetic wave propagation loses barrier, this information for causing wireless signal to carry is easier to be ravesdropping, and listener-in does not need very high skill Art or equipment can obtain the communication information.At this stage, disparate networks audiomonitor and monitoring means are to communications security and secrecy Property bring serious loss, be related to business and the secure wireless communication problem of military secrecy become more and more important.According to working as Preceding information technology feature, communication construction can be divided into this five layer frame of application layer, transport layer, network layer, MAC layer and physical layer Structure.In traditional information communication, relevant safety protection technique is usually all disposed in the above contour level level of MAC layer.It passes System method ensures the confidentiality and safety communicated frequently with the mode of communication encryption.At this stage, safety of physical layer is protected Attention dynamics will be markedly less than communication construction high level.The safety protection technique that physical layer uses is mainly by handling channel And protection, to ensure the safety and confidentiality of communication channel.The effect of physical layer is to convert the information into suitable wireless channel The form of transmission.Transmitting terminal mainly includes the functional modules such as channel coding, digital modulation, baseband postprocessing, radio-frequency modulations, is received The signal received is restored at end accordingly, mainly includes radio demodulating, synchronization and channel estimation, digital demodulation, channel The functional modules such as decoding.It is each due to being widely present in the opening of wireless channel, broadcast and fading and wireless channel Noise and interference are planted, the perfect channel of the so-called error free transmission of channel between enciphering/deciphering is often difficult to set up.It is wirelessly communicating In also tend to be difficult to ensure for the safe lane of cipher key delivery.Therefore, when physical layer is unreliable, only with conventional cryptography machine The safety of the system of system will be declined.If physical layer is fully transparent to listener-in, listener-in easily passes through wireless channel pair It transmits information and carries out illicit reception.Once listener-in decodes out or has known the close of upper layer information enciphering/deciphering by other approach Key will seriously threaten communication security.It is unstable due to the intrinsic broadcast of radio communication channel, opening and transmission link Property so that wireless communication system compared to traditional wired communication system be more easier the investigation by illegal user, intercept and capture and It monitors, brings transmission data secret leaking problem.Traditional secrecy means utilize mainly using contemporary cryptology as theoretic basis Encryption Algorithm and cipher key pair information are encrypted.Traditional Encryption Algorithm is mostly based on existing computer can not be in asking in short-term It is cracked.But with the fast development of computer computation ability and possess the rapid Factorization for executing flood tide complexity The appearance of the quantum computer of ability, many traditional encryption methods will be no longer reliable.In addition, traditional block cipher or Public private key encryption technology often has very high computational complexity and delay, and encryption and decryption is difficult to asking interior completion in short-term, is difficult full The requirement of sufficient communication delay.
Safe coding technology is a kind of physical layer commonly security technique, is mainly to ensure that connection net in this way The legitimate user of network can obtain reliable and safety communication channel.If illegal user than legitimate user channel condition more Difference, then illegal user can not obtain in channel can identification information.Safety of physical layer coding is the basis for realizing safe transmission, It avoids information from being ravesdropping by the difference of the main channel quality for stealing channel from the angle of information theory.In main channel transmission quality When better than tapping channel transmission quality, it can theoretically ensure perfect safe transmission;On the other hand, pass through signal processing hand Section, the various resources that can effectively integrate wireless communication system are come, and steal interchannel using the main otherness for stealing link to break up master Communication quality difference, provide solid foundation for the realization of safe coding.Safe coding technical application feelings from current various countries From the point of view of condition, currently in the world there are many kinds of the channel coding of class, common channel coding has polarization code, Turbo code and low close Even-odd check LDPC code etc. is spent, these channel codings adaptability certain in the upper change appropriate of application can be relatively easy to Reach the secrecy capacity limit.Other than several common safe codings mentioned above, there are also compile when some algebra precodings, sky Code etc. can have certain safety protection function to secure communication.At this stage, ensure that the major measure of secure wireless communication has Two classes.First kind method is the high level in open system interconnection (Open System Interconnection, OSI) model Encipher-decipher method is designed, safety is promoted by encryption mechanism, prevents listener-in from stealing secret information.But this safety approach face it is logical Letter delay is longer, encryption and decryption expense is big and Encryption Algorithm is cracked the problems such as failing.Second class method is set in physical layer Reasonable communications scheme is counted, the supplement or substitute technology as upper layer encryption method.It is legal that safety of physical layer method utilizes The intrinsic difference of channel quality between channel and tapping channel, prevents private information to be ravesdropping from information level.
Wireless communication safety of physical layer covers technological means abundant, can play very to the promotion of security of system Important role.Common metric parameter of the signal-to-noise ratio (SNR) as assessment channel quality can be used to assess main channel and eavesdropping Difference in channel quality between channel.If the SNR of main channel is SNRBAnd corresponding bit error rate (BER) is PB, tapping channel SNR be SNREAnd corresponding BER is PE.In order to guarantee the reliability and safety of information, the following conditions need to be met
Wherein,To meet highest BER value needed for the transmission of main channel reliable communications, (set up is 10-5, BER becomes in main channel It is bordering on 0, indicates that transmitted bit is almost properly received, authorization both sides can communicate normally, meet authorization intercommunication reliability Requirement),To meet the required minimum bit error rate BER value of tapping channel communication security transmission, (setting up is 0.49, eavesdropping BER levels off to 0.5 in channel, receives sequence and is similar to random sequence, listener-in can not steal secret information, and meet wanting for communications security It asks).Main channel bit error rate BER isWhen corresponding bit error rate SNR be SNRB,min, tapping channel bit error rate BER isWhen corresponding SNR be SNRE,max
Conventional encoder code method reaches the mesh of protection classified information by punching low-density checksum LDPC code message digit 's.In receiving end, message bit sequence is encoded using system type low-density checksum LDPC code.Then, disappearing code word It punches and remaining check bit position is modulated to biphase phase shift keying BPSK symbol and is sent in breath position.In receiving end, BPSK demodulator recalls log-likelihood ratio (LLR) value of check bit according to the symbolic solution received.Ldpc decoder is by message digit LLR value be initialized as 0, and the posteriority LLR value of message digit is calculated using belief propagation algorithm according to check bit LLR value, from And estimate message bit sequence.The corresponding bit error rate BER curve of the coding and decoding method of physical layer communication safety has sharp Characteristic, i.e., when SNR value is more than a threshold value, bit error rate BER can happen suddenly steep drop.It is special that conventional encoder code method does not have this Property, therefore the ability for reducing safety clearance is limited, the application scenarios of adaptation are limited.
Summary of the invention
The deficiency of safety clearance ability is reduced in order to solve conventional encoder code method, the present invention proposes a kind of in the main letter of guarantee Under the premise of road normal communication, it can reduce the probability that information is stolen with improving information safety, significant decrease main channel and steal Listen the decoding method of the wireless communication physical layer communication safety of safety clearance between channel (SNRgap).
Above-mentioned purpose of the invention can be obtained by following measures, a kind of volume wirelessly communicating physical layer communication safety Coding/decoding method has following technical characteristic: wireless communication transmitting terminal encodes message bit sequence using LDPC encoder, And code word is divided into message digit and check bit two parts, bit XOR operation is carried out to the partial bit of the adjacent code word of transmitting terminal, Obtain new bit sequence;Sequence is handled by serioparallel exchange, using transmitting terminal BPSK modulator by newly-generated bit And the check bit bit modulation of operation is had neither part nor lot in as BPSK symbol and is sent to receiving end;Receiving end is according to the BPSK received The priori log-likelihood ratio LLR value of symbol and preamble code word message digit, demodulates the log-likelihood ratio LLR value of code word check bit, And the log-likelihood ratio LLR value of the code word check bit is passed into receiving end ldpc decoder;Receiving end ldpc decoder is by code The log-likelihood ratio LLR value of word message digit is initialized as 0, and the posteriority pair of the codeword message position is calculated using belief propagation algorithm Number likelihood ratio LLR value, and the LLR value of the codeword message position is passed into receiving end BPSK demodulator;Receiving end BPSK demodulator Symbol is received according to the codeword message position prior information of receiving end ldpc decoder feedback and channel, to next code word check bit Log-likelihood ratio LLR value demodulated, obtain the log-likelihood ratio LLR value of check bit and pass to receiving end LDPC decoding Device, receiving end ldpc decoder and the mutual iteration interactive information of demodulator, such iteration goes on, until decoding out all codes The message digit of word completes entire demodulation coding process.
The present invention has the advantages that.
The work of BPSK demodulator is had two parts by the present invention, carries out bit XOR operation to preamble code word message digit Check bit, the preamble code word message digit prior information and channel that BPSK demodulator is fed back according to ldpc decoder receive symbol, meter Calculate the LLR value of check bit.In the case where main channel authorization intercommunication channel quality is constant, coding and decoding proposed by the present invention Method will not change the communication quality of authorization both sides.However, when listener-in demodulates code word check bit by tapping channel, due to Tapping channel quality is worse and demodulates the prior information for needing preamble code word, and demodulation effect can be worse and causes to decode effect more Difference.Therefore, method proposed by the present invention can not influence to authorize both sides' normal communication, not change main channel and tapping channel Under the premise of channel quality, the communication quality of listener-in can obviously reduce, reach the purpose of physical layer communication safety.
Partial bit between multi-code word is coupled in transmitting terminal and carries out the processing of bit exclusive or, changes in receiving end by the present invention For demodulation coding.BPSK demodulator receives symbol according to channel and preamble code word prior information calculates check bit LLR value.LDPC Message digit LLR value is initialized as 0 by decoder, and calculates message digit using belief propagation algorithm according to check bit LLR value Posteriority log-likelihood ratio LLR value, to estimate message bit sequence.This design method can be with sharpening BER curve, effectively Reduce safety clearance.Shield of trying hard to keep is formed with during wireless transmission to upper layer encryption information, effectively prevents listener-in by stealing It listens channel illegally to obtain useful information, the difficulty by wireless channel eavesdropping and breaking encryption information is greatly improved, significantly increases The safety of wireless communication.
The present invention designs a kind of iterative demodulation interpretation method in receiving end, successively each code word of demodulation coding.For working as Preceding code word, BPSK demodulator estimate the logarithm of the code word check bit first with the prior information and reception signal of preamble code word Likelihood ratio LLR value.Then, the LLR value of message digit is initialized as 0 by ldpc decoder.According to the LLR value of check bit, LDPC is translated Code device calculates the posteriority LLR value of message digit using belief propagation algorithm, to obtain binary message bit sequence, completes this code The decoding of word.It is different from conventional encoder code method, for each coding codeword, the part check bit of the code word first with preamble The message digit of word carries out bit XOR operation, then by the bit modulation after calculating is symbol.Operation is had neither part nor lot in for remaining Check bit is directly modulated to symbol.Therefore, coding and decoding method proposed by the present invention makes the presence of connection, a code between code word The decoding failure of word will affect the decoding of subsequent codewords.This coding and decoding method is unfavorable for the eavesdropping with more poor channel quality Person.Compared to conventional encoder code method, safety clearance needed for method proposed by the present invention is lower, can be adapted for more wireless Communication scenes.
Refering to Fig. 4.Coding and decoding method and conventional encoder code method provided by the invention carries out BER performance and compares.In emulation LDPC code code rate is 0.25, code length 3940, and belief propagation algorithm maximum number of iterations is 200.Compared with traditional decoding algorithm, The BER curve of coding and decoding method of the present invention is more precipitous.Main letter can be significantly reduced using coding and decoding method provided by the invention Safety clearance (SNRgap) between road and tapping channel, and reduce information under the premise of guaranteeing main channel normal communication and be stolen The probability taken, improving information safety.
Refering to Fig. 5.Coding and decoding method and conventional encoder code method provided by the invention carries out safety clearance performance and compares.It is imitative Very middle LDPC code code rate is 0.25, code length 3940, and belief propagation algorithm maximum number of iterations is 200.The BER threshold value of listener-inIt is 0.49, main channel BER threshold valueIt is 10-5.The SNR value of fixed main channel, as main channel and tapping channel SNR are poor The SNR value of the increase of value, tapping channel gradually decreases.Under identical SNR difference, compared with traditional decoding algorithm, the present invention is compiled The BER performance that interpretation method corresponds to listener-in is worse, thus has higher communications security.As code word number ρ=20, this Safety clearance is reduced to 4.6dB from 9.3dB needed for conventional encoder code method by invention coding and decoding method.
Detailed description of the invention
The following further describes the present invention with reference to the drawings.
Fig. 1 is that solution message processing flow figure is compiled safely in present invention wireless communication physical layer transmitting terminal and receiving end.
Fig. 2 is the schematic diagram that Fig. 1 transmitting terminal carries out bit XOR operation to the partial bit of multiple code words.
Fig. 3 is the schematic diagram of bit error rate BER curve of the present invention and safety clearance.
Fig. 4 is the receiving end bit error rate BER curve figure that simulating, verifying of the present invention obtains.
Fig. 5 is listener-in's bit error rate BER curve figure that simulating, verifying of the present invention obtains.
To keep the technical problem to be solved in the present invention, technical solution and main points clearer, below in conjunction with attached drawing and tool Body embodiment is described in detail.
Specific embodiment
Refering to fig. 1.According to the present invention, wireless communication transmitting terminal compiles message bit sequence using LDPC encoder Code, and code word is divided into message digit and check bit two parts, bit exclusive or fortune is carried out to the partial bit of the adjacent code word of transmitting terminal It calculates, obtains new bit sequence;Sequence is handled by serioparallel exchange, using transmitting terminal BPSK modulator by newly-generated ratio Check bit bit modulation that is special and having neither part nor lot in operation is BPSK symbol and is sent to receiving end;Receiving end is according to receiving The priori log-likelihood ratio LLR value of BPSK symbol and preamble code word message digit, demodulates the log-likelihood ratio LLR of code word check bit Value, and the log-likelihood ratio LLR value of the code word check bit is passed into receiving end ldpc decoder;Receiving end ldpc decoder will The log-likelihood ratio LLR value of codeword message position is initialized as 0, and the posteriority of the codeword message position is calculated using belief propagation algorithm Log-likelihood ratio LLR value, and the LLR value of the codeword message position is passed into receiving end BPSK demodulator;Receiving end BPSK demodulation The codeword message position prior information and channel that device is fed back according to receiving end ldpc decoder receive symbol, verify to next code word The log-likelihood ratio LLR value of position is demodulated, and is obtained the log-likelihood ratio LLR value of check bit and is passed to receiving end LDPC decoding Device.Receiving end ldpc decoder and the mutual iteration interactive information of demodulator, such iteration goes on, until decoding out all codes The message digit of word completes entire demodulation coding process.
Transmitting terminal includes system type LDPC encoder, serioparallel exchange module in sequential series, series processing module and BPSK demodulation Device, receiving end include main awgn channel, receiving end BPSK demodulator and receiving end ldpc decoder, and listener-in includes eavesdropping AWGN Channel, BPSK demodulator and listener-in's ldpc decoder.Transmitting terminal LDPC encoder utilizes system type LDPC encoder by length It is encoded to the code word c that length is n for the message bit sequence b of k, is converted the codeword by serioparallel exchange module as check bit code cp With message digit code cm.Series processing module handles sequence, the check bit code c that processing is generatedpWith bit sequence cnOutput To BPSK demodulator.For i-th of code word ci, serioparallel exchange module be classified as length be k message digitThe check bit for being r=n-k with lengthTwo parts, Wherein r >=k.In message digit bitIn, parameter i represents message digit bit and belongs to i-th of code word, and parameter m represents the bit For message digit, it is t-th of bit that parameter t, which represents the bit, wherein 1≤t≤k.In check bit bitIn, parameter i is represented Message digit bit belongs to i-th of code word, and parameter p represents the bit as check bit, and it is t-th of bit that parameter t, which represents the bit, In 1≤t≤r.
Transmitting terminal carries out bit XOR operation, ρ > 1, for the 1st code word, transmitting terminal sequence to the partial bit of ρ original code word Column processing module is by its check bitPass to BPSK modulator;For i-th of code wordWherein 1 < i≤ρ, transmitting terminal series processing module is by its preceding k bit check positionWith The message digit of (i-1) a code wordBit XOR operation is carried out, length is obtained For the neotectonics bit sequence of kThen, length is k's by transmitting terminal series processing moduleThe residue check position for being r-k with length Pass to BPSK modulator;The ρ r bit modulation received is symbol sebolic addressing x by BPSK modulator, and with the shape of BPSK symbol Formula is simultaneously transmitted to receiving end.Symbol sebolic addressing x divides two-way to arrive separately at receiving end and listener-in.
The BPSK symbol y that receiving end is received by main channel.Then, BPSK demodulator in receiving end is according to preamble code word message digit Prior information and the BPSK symbol that receives, demodulate the LLR value L (c of current code word check bitp), and it is transmitted to receiving end Ldpc decoder.Then, the LLR value of the codeword message position is initialized as 0 by receiving end ldpc decoder, and utilizes belief propagation Algorithm obtains the log-likelihood ratio LLR value L (c of the codeword message positionm).The LLR value of message digit is converted to two by ldpc decoder First bit sequenceEstimate the message sequence of transmitting terminal transmission.In addition, ldpc decoder is by the log-likelihood of codeword message position Than LLR value L (cm) receiving end BPSK demodulator is passed to, as the prior information L for demodulating next code wordA(cm).BPSK demodulation The codeword message position L that device is fed back according to receiving end ldpc decoderA(cm) prior information and channel receive symbol y, start to next The log-likelihood ratio LLR value of a code word check bit is demodulated, such receiving end BPSK demodulator and receiving end ldpc decoder Mutual iteration interactive information, the message digit until decoding out all code words complete entire demodulation coding process.
Listener-in obtains BPSK symbol z by the eavesdropping channel AWGN, and then, listener-in BPSK demodulator is according to preamble codeword message The prior information of position and the BPSK symbol received, demodulate the LLR value L (c of current code word check bitp), and it is transmitted to eavesdropping The LLR value of the codeword message position is initialized as 0 by person's ldpc decoder, then, listener-in's ldpc decoder, and is passed using confidence It broadcasts algorithm and obtains the log-likelihood ratio LLR value L (c of the codeword message positionm).Listener-in's ldpc decoder is by the LLR value of message digit Be converted to binary bits sequenceEstimate the message sequence of transmitting terminal transmission.In addition, ldpc decoder is by codeword message position Log-likelihood ratio LLR value L (cm) listener-in's BPSK demodulator is passed to, as the prior information L for demodulating next code wordA (cm).The codeword message position L that BPSK demodulator is fed back according to listener-in's ldpc decoderA(cm) prior information and channel receive symbol Number y, starts to demodulate the log-likelihood ratio LLR value of next code word check bit, such listener-in BPSK demodulator and steals The mutual iteration interactive information of hearer's ldpc decoder, the message digit until decoding out all code words complete entire demodulation coding mistake Journey.
Below to the information process expansion narration in detail of receiving end.Since listener-in's information process and receiving end are handled Process is completely the same, no longer carries out repeated description here.Receiving end BPSK demodulator receives biphase phase shift keying BPSK symbol Sequences y=x+n, then, receiving end BPSK demodulator demodulate the check bit of code word, obtain its LLR value;Receiving end BPSK The treatment process of demodulator is divided into two kinds of situations, the i.e. demodulation to the demodulation of the 1st code word to other ρ -1 code words, wherein N be mean value be 0, variance σ2=N0/ 2 Gaussian sequence.
When the demodulation of the 1st code word, receiving end BPSK demodulator demodulates its check bit, to obtain its check bit LLR value, for t-th of bit, LLR value isWherein, y is the BPSK symbol received, σ2For noise side Difference.
When i-th of code word demodulation, receiving end BPSK demodulator demodulates its check bit, to obtain the LLR value of check bit. It is k for length and carries out the check bit of bit XOR operation with preamble code word message digit, its t-th of (t≤k) bit is corresponding LLR value be
Wherein, 1 < i≤ρ, 1≤t≤r, y are the BPSK symbol received, σ2For noise variance,It is that LDPC is translated The prior information of t-th of message digit bit in (i-1) a code word of code device transmitting.It is the untreated of r-k for length Check bit, its t-th of (k < t≤r) corresponding LLR value of bit beWherein, y is received BPSK symbol, σ2For noise variance.Next, receiving end ldpc decoder decodes code word, codeword message position is obtained LLR value simultaneously estimates message bit sequence, and treatment process is divided into two kinds of situations, i.e. the decoding to preceding ρ -1 code words and to ρ The decoding of code word;When i-th of codeword decoding, wherein 1≤i < ρ, receiving end ldpc decoder receives the code word check bit's LLR value sequenceBy the codeword message positionLLR value be initialized as 0, using setting Letter propagation algorithm obtains the posteriority LLR value of message digitTo estimate transmitting terminal The message bit of transmitting.For t-th of message bit, valuation is
Wherein, t≤k,For the LLR value after the bit decoding of t-th of codeword message position.Ldpc decoder is by i-th yard The LLR value of word message digitBPSK demodulator is passed to, as BPSK demodulator meter Calculate the prior information of (i+1) a code word check bit LLR value.For t-th of bit, i.e.,
When ρ codeword decoding, receiving end ldpc decoder receives the code word check bitLLR value sequence, i.e.,Receiving end ldpc decoder is by the codeword message positionLLR value be initialized as 0.Receiving end ldpc decoder obtains the posteriority LLR value of message digit using belief propagation algorithmTo estimate the message bit of transmitting terminal transmitting.For t-th of message ratio Spy, t≤k, valuation are
Wherein,For the LLR value after the ρ t-th of codeword message position bit decoding.
Refering to Fig. 2.Transmitting terminal utilizes system type LDPC code, be length by the message bit sequential coding that length is k is n's Code word.I-th of code word is divided into two parts by transmitting terminal, i.e. the length message digit that is kWith Length is the check bit of r=n-kWherein r >=k.For message digit bitGinseng Number i represents message digit bit and belongs to i-th of code word, and parameter m represents the bit as message digit, and it is t-th that parameter t, which represents the bit, Bit.For check bit bitParameter i represents message digit bit and belongs to i-th of code word, and parameter p represents the bit as school Position is tested, it is t-th of bit that parameter t, which represents the bit,.
For the 1st code wordTransmitting terminal is by its check bitIt is directly passed to modulator.For i-th yard WordWherein 1 < i≤ρ, transmitting terminal is by its part check bitWith a upper code word's Message digitBit XOR operation is carried out, new bit sequence is obtainedAnd pass to modulator.The code word is remaining not to join With the check bit of bit XOR operationIt is also passed to modulator.
Receiving end ldpc decoder receives the check bit of i-th of code wordLLR value sequence, i.e.,Receiving end ldpc decoder is by the codeword message positionLLR value be initialized as 0.Receiving end ldpc decoder obtains the posteriority LLR value of message digit using belief propagation algorithmTo estimate the message bit of transmitting terminal transmitting.For t-th of message ratio Spy, t≤k, valuation are
Wherein,For the LLR value after the bit decoding of t-th of codeword message position.
The foregoing is merely presently preferred embodiments of the present invention, is merely illustrative for the purpose of the present invention, and not restrictive , those skilled in the art understand that it can be carried out in the spirit and scope defined by the claims in the present invention it is many change, It modifies, is even equivalent, but falling in protection scope of the present invention.

Claims (10)

1. a kind of decoding method for wirelessly communicating physical layer communication safety, has following technical characteristic: wireless communication transmitting terminal Message bit sequence is encoded using LDPC encoder, and code word is divided into message digit and check bit two parts, to transmission It holds the partial bit of adjacent code word to carry out bit XOR operation, obtains new bit sequence;Sequence is carried out by serioparallel exchange Processing by newly-generated bit and has neither part nor lot in the check bit bit modulation of operation using transmitting terminal BPSK modulator as BPSK symbol And it is sent to receiving end;Receiving end is according to the BPSK symbol received and the priori log-likelihood ratio LLR of preamble code word message digit Value, demodulates the log-likelihood ratio LLR value of code word check bit, and the log-likelihood ratio LLR value of the code word check bit is passed to Receiving end ldpc decoder;The log-likelihood ratio LLR value of codeword message position is initialized as 0 by receiving end ldpc decoder, is utilized Belief propagation algorithm calculates the posteriority log-likelihood ratio LLR value of the codeword message position, completes the decoding of the codeword message position.It connects , the LLR value of the codeword message position is passed to receiving end BPSK demodulator by receiving end ldpc decoder;Receiving end BPSK demodulation The codeword message position prior information and channel that device is fed back according to receiving end ldpc decoder receive symbol, verify to next code word The log-likelihood ratio LLR value of position is demodulated, and is obtained the log-likelihood ratio LLR value of check bit and is passed to receiving end LDPC decoding Device.Receiving end ldpc decoder and the mutual iteration interactive information of demodulator, such iteration goes on, until decoding out all codes The message digit of word completes entire demodulation coding process.
2. the decoding method of wireless communication physical layer communication safety as described in claim 1, it is characterised in that: wireless communication Transmitting terminal includes system type LDPC encoder, serioparallel exchange module in sequential series, series processing module and BPSK demodulator, nothing Line communication receiver includes main awgn channel, receiving end BPSK demodulator and receiving end ldpc decoder, and listener-in includes eavesdropping Awgn channel, BPSK demodulator and listener-in's ldpc decoder.It wirelessly communicates transmitting terminal LDPC encoder and utilizes system type LDPC The message bit sequence b that length is k is encoded to the code word c that length is n by encoder, is converted the codeword by serioparallel exchange module For check bit code cpWith message digit code cm, and export to BPSK demodulator;For i-th of code word ci, serioparallel exchange module is by its point The message digit bit sequence for being k for lengthThe check bit bit sequence for being r=n-k with length ColumnTwo parts, wherein r >=k.In message digit bitIn, parameter i represents message digit Bit belongs to i-th of code word, and parameter m represents the bit as message digit, and it is t-th of bit that parameter t, which represents the bit, wherein 1≤t ≤k.In check bit bitIn, parameter i represents message digit bit and belongs to i-th of code word, and parameter p represents the bit as school Position is tested, it is t-th of bit that parameter t, which represents the bit, wherein 1≤t≤r.
3. the decoding method of wireless communication physical layer communication safety as claimed in claim 2, it is characterised in that: transmitting terminal pair The partial bit of ρ original code word carries out bit XOR operation, ρ > 1.For the 1st code word, transmitting terminal series processing module will Its check bitPass to BPSK modulator;For i-th of code wordSend terminal sequence Processing module is by its preceding k bit check positionWith the message digit of (i-1) a code wordBit XOR operation is carried out, the neotectonics bit sequence that length is k is obtainedWherein 1 < i≤ρ.Length is k's by transmitting terminal series processing moduleThe residue check position bit sequence for being r-k with lengthPass to BPSK modulator;The ρ r bit tune that BPSK modulator will receive It is made as symbol sebolic addressing x, and in the form of BPSK symbol and is transmitted to receiving end, and symbol sebolic addressing x divides two-way to arrive separately to connect Receiving end and listener-in.
4. the decoding method of wireless communication physical layer communication safety as described in claim 1, it is characterised in that: receiving end is logical It crosses after main channel receives biphase phase shift keying BPSK symbol y, receiving end BPSK demodulator is according to the elder generation of preamble code word message digit The biphase phase shift keying BPSK symbol testing information and receiving demodulates the LLR value L (c of current code word check bitp), and transmit To receiving end ldpc decoder.The LLR value of codeword message position is initialized as 0 by receiving end ldpc decoder, utilizes belief propagation Algorithm obtains the log-likelihood ratio LLR value L (c of the codeword message positionm), and the LLR value of message digit is converted into binary bits sequence ColumnEstimate the message sequence of transmitting terminal transmission.Receiving end ldpc decoder is by the log-likelihood ratio LLR value of codeword message position L(cm) receiving end BPSK demodulator is passed to, as the prior information L for demodulating next code wordA(cm)。
5. the decoding method of wireless communication physical layer communication safety as claimed in claim 4, it is characterised in that: BPSK demodulation The codeword message position L that device is fed back according to receiving end ldpc decoderA(cm) prior information and channel receive symbol y, start to next The log-likelihood ratio LLR value of a code word check bit is demodulated, such receiving end BPSK demodulator and receiving end ldpc decoder Mutual iteration interactive information, the message digit until decoding out all code words complete entire demodulation coding process.
6. the decoding method of wireless communication physical layer communication safety as claimed in claim 4, it is characterised in that: receiving end After BPSK demodulator receives biphase phase shift keying BPSK symbol sebolic addressing y=x+n, the check bit of code word is demodulated and obtained Its LLR value, wherein n be mean value be 0, variance σ2=N0/ 2 Gaussian sequence.The processing of receiving end BPSK demodulator Process is divided into two kinds of situations, the i.e. demodulation to the demodulation of the 1st code word to other ρ -1 code words;It is demodulated in the 1st code word When, receiving end BPSK demodulator demodulates its check bit, and to obtain the LLR value of its check bit, t-th is compared Spy, LLR value are
Wherein, 1≤t≤r, y are the biphase phase shift keying BPSK symbol received, σ2For noise variance.
7. the decoding method of wireless communication physical layer communication safety as claimed in claim 4, it is characterised in that: at i-th When (1 < i≤ρ) code word demodulates, receiving end BPSK demodulator demodulates its check bit, to obtain the LLR value of check bit; It is k for length and carries out the check bit of bit XOR operation with preamble code word message digit, its t-th of (t≤k) bit is corresponding LLR value be
The untreated check bit for being r-k for length, its t-th of (k < t≤r) corresponding LLR value of bit are
Wherein, y is the BPSK symbol received, σ2For noise variance,It is (i-1) of ldpc decoder transmitting The prior information of t-th of message digit bit in a code word.
8. the decoding method of wireless communication physical layer communication safety as claimed in claim 4, it is characterised in that: receiving end Ldpc decoder decodes code word, obtains the LLR value of codeword message position and estimates message bit sequence, treatment process point For the decoding to preceding ρ -1 code words and to two kinds of situations of decoding of the ρ code word, when i-th of (1≤i < ρ) codeword decoding, connect Receiving end ldpc decoder receives the code word check bitLLR value sequenceIt should Codeword message positionLLR value be initialized as 0, obtain the posteriority LLR value of message digit using belief propagation algorithmTo estimate the message bit of transmitting terminal transmitting;For t-th of message ratio Spy, valuation areWherein, t≤k,It is translated for t-th of codeword message position bit LLR value after code.
9. the decoding method of wireless communication physical layer communication safety as claimed in claim 4, it is characterised in that: receiving end Ldpc decoder is by the LLR value of i-th of codeword message position (1≤i < ρ)Transmitting BPSK demodulator is given, the prior information of (i+1) a code word check bit LLR value is calculated as BPSK demodulator;T-th is compared It is special
10. the decoding method of wireless communication physical layer communication safety as claimed in claim 4, it is characterised in that: the ρ code When transliteration code, receiving end ldpc decoder receives the code word check bitLLR value sequenceReceiving end ldpc decoder is by codeword message positionLLR value be initialized as 0, The posteriority LLR value of message digit is obtained using belief propagation algorithmEstimate transmission Hold the message bit of transmitting;For t-th of message bit, t≤k, valuation isWherein,For the LLR value after the ρ t-th of codeword message position bit decoding.
CN201910442318.8A 2019-05-25 2019-05-25 Coding and decoding method for wireless communication physical layer communication safety Active CN110233701B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910442318.8A CN110233701B (en) 2019-05-25 2019-05-25 Coding and decoding method for wireless communication physical layer communication safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910442318.8A CN110233701B (en) 2019-05-25 2019-05-25 Coding and decoding method for wireless communication physical layer communication safety

Publications (2)

Publication Number Publication Date
CN110233701A true CN110233701A (en) 2019-09-13
CN110233701B CN110233701B (en) 2021-11-19

Family

ID=67861055

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910442318.8A Active CN110233701B (en) 2019-05-25 2019-05-25 Coding and decoding method for wireless communication physical layer communication safety

Country Status (1)

Country Link
CN (1) CN110233701B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111342958A (en) * 2020-02-13 2020-06-26 北京邮电大学 Low-bit-error-rate Y-00 quantum noise stream encryption transmission method
CN111447160A (en) * 2020-04-15 2020-07-24 上海交通大学 Signal detection method of large-scale MIMO passive random access based on neural network
CN112003626A (en) * 2020-08-31 2020-11-27 武汉梦芯科技有限公司 LDPC decoding method, system and medium based on known bits of navigation message
CN113630163A (en) * 2020-05-06 2021-11-09 哈尔滨工业大学 Artificial noise assisted beam forming method with robustness for related stealing channels
CN114337925A (en) * 2021-12-28 2022-04-12 福州大学 Joint coding and decoding method based on polarization code and physical layer under non-orthogonal multiple access

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102064917A (en) * 2011-01-11 2011-05-18 河海大学 Demodulation decoding method for LDPC (Low Density Parity Code) modulation system
WO2015045897A1 (en) * 2013-09-26 2015-04-02 ソニー株式会社 Data processing device and data processing method
CN104780022A (en) * 2015-04-10 2015-07-15 清华大学 Physical layer secure transmission method and system based on dynamic change of channel encoding matrix
WO2016079185A1 (en) * 2014-11-19 2016-05-26 Lantiq Beteiligungs-GmbH & Co.KG Ldpc decoding with finite precision and dynamic adjustment of the number of iterations
CN106209710A (en) * 2016-07-25 2016-12-07 河南科技大学 A kind of method building first kind tapping channel under BI AWGN broadcast channel

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102064917A (en) * 2011-01-11 2011-05-18 河海大学 Demodulation decoding method for LDPC (Low Density Parity Code) modulation system
WO2015045897A1 (en) * 2013-09-26 2015-04-02 ソニー株式会社 Data processing device and data processing method
WO2016079185A1 (en) * 2014-11-19 2016-05-26 Lantiq Beteiligungs-GmbH & Co.KG Ldpc decoding with finite precision and dynamic adjustment of the number of iterations
CN104780022A (en) * 2015-04-10 2015-07-15 清华大学 Physical layer secure transmission method and system based on dynamic change of channel encoding matrix
CN106209710A (en) * 2016-07-25 2016-12-07 河南科技大学 A kind of method building first kind tapping channel under BI AWGN broadcast channel

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
AHMADREZA AMIRZADEH 等: "Adaptive Granular HARQ LDPC-Based Coding for Secrecy Enhancement in Wiretap Channels", 《IEEE》 *
白慧卿: "基于无线信道特征的物理层安全编码技术研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111342958A (en) * 2020-02-13 2020-06-26 北京邮电大学 Low-bit-error-rate Y-00 quantum noise stream encryption transmission method
CN111447160A (en) * 2020-04-15 2020-07-24 上海交通大学 Signal detection method of large-scale MIMO passive random access based on neural network
CN113630163A (en) * 2020-05-06 2021-11-09 哈尔滨工业大学 Artificial noise assisted beam forming method with robustness for related stealing channels
CN112003626A (en) * 2020-08-31 2020-11-27 武汉梦芯科技有限公司 LDPC decoding method, system and medium based on known bits of navigation message
CN112003626B (en) * 2020-08-31 2023-11-10 武汉梦芯科技有限公司 LDPC decoding method, system and medium based on navigation message known bits
CN114337925A (en) * 2021-12-28 2022-04-12 福州大学 Joint coding and decoding method based on polarization code and physical layer under non-orthogonal multiple access
CN114337925B (en) * 2021-12-28 2024-01-26 福州大学 Combined coding and decoding method based on polarization code and physical layer under non-orthogonal multiple access

Also Published As

Publication number Publication date
CN110233701B (en) 2021-11-19

Similar Documents

Publication Publication Date Title
CN110233701A (en) Wirelessly communicate the decoding method of physical layer communication safety
US7415043B2 (en) Code division multiple access (CDMA) method and apparatus for protecting and authenticating wirelessly transmitted digital information
US20070121939A1 (en) Watermarks for wireless communications
US20050220322A1 (en) Watermarks/signatures for wireless communications
CN107148015B (en) Continuous encryption physical layer secure transmission method based on polarization code structure
CN104270227B (en) Based on the empty safe transmission method of physical layer for moving keying in MISO system
CN111065096B (en) Physical layer encryption transmission system and method for wireless communication
CN108632255A (en) A kind of convert communication system based on random noise modulation
CN104320777B (en) A kind of method of the raising multiaerial system communication security based on beam forming
CN107359929B (en) Air interface encryption method based on constellation overlapping in bidirectional relay system
CN101180846A (en) Detection of signal modulation format type
Borle et al. Physical layer spectrum usage authentication in cognitive radio: Analysis and implementation
CN101710852A (en) LDPC code encoding/decoding method and encoder/decoder with encryption function
Zhan et al. A differential chaotic bit-interleaved coded modulation system over multipath Rayleigh channels
CN109462456B (en) Streaming media safe transmission method based on error code diffusion and noise aggregation
CN109743155B (en) Physical layer secure transmission method based on antenna selection differential chaos keying
CN109617655A (en) A kind of polarization code wireless data safe transmission method based on random scrambling code auxiliary
CN109889254B (en) Satellite-ground link physical layer secure communication method suitable for satellite communication
CN109257743A (en) The method that WTC-I is constructed by steady BSBC when no channel state information
CN106059713A (en) Method for constructing first-class wiretap channel through BSBC (Binary Symmetric Broadcast Channel)
CN102647258B (en) Cross-layer enhancing safety processing method of wireless communication MIMO (Multi-Input Multi-Output) system
Vucetic et al. Performance off 8-PSK trellis codes over nonlinear fading mobile satellite channels
Vo-Huu et al. Mitigating rate attacks through crypto-coded modulation
CN106209710A (en) A kind of method building first kind tapping channel under BI AWGN broadcast channel
CN109688582A (en) Without the method based on BI-AWGN channel build WTC-I under channel state information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant