The Journal of China Universities of Posts and Telecommunications ›› 2019, Vol. 26 ›› Issue (3): 50-55.doi: 10.19682/j.cnki.1005-8885.2019.0019

• Security • Previous Articles     Next Articles

High Efficiency Polar coding key reconciliation scheme in wireless channel

xiao-Tian ZHANG 2   

  • Received:2018-11-20 Revised:2019-04-08 Online:2019-06-30 Published:2019-06-30
  • Contact: xiao-Tian ZHANG E-mail:18362972110@163.com

Abstract: Recently, physical layer security in wireless communication system attracts much attention, and the reconciliation protocol plays an important role in the final secure key distillation, since the secret keys extracted from the realistic characteristics of the wireless channel may not be the same between the transmitter and legitimate receiver. A high efficiency Polar coding key reconciliation scheme is proposed in the paper to correct these errors. In the scheme, the transmitter generates a random stream with the known frozen bits and positions. After that, the transmitter encodes the random bit stream to a code stream by Polar encoding and sends the corrupted version of the code stream and the secret keys to the legitimate receiver. The receiver decodes the received stream with Polar successive cancellation decoding algorithm. With Polar encoding, the receiver obtains a random bit stream, and achieves the final secure key by XOR operator. The results show that the proposed scheme has a higher efficiency and a lower computational complexity, along with a high success rate. The consistency of the keys is very good after the reconciliation.

Key words: security of physical layer, Polar coding, channel characteristics, computational complexity, success rate

CLC Number: