Method of transmitting security information of single-bit ADC wiretap channel
11418548 · 2022-08-16
Assignee
- Daegu Gyeongbuk Institute Of Science And Technology (Daegu, KR)
- Postech Research And Business Development Foundation (Pohang-si, KR)
Inventors
Cpc classification
H04L25/06
ELECTRICITY
H04L63/30
ELECTRICITY
H04L27/186
ELECTRICITY
H04L27/18
ELECTRICITY
Y02D30/70
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
H04W24/06
ELECTRICITY
International classification
Abstract
Provided is a method of transmitting security information of a single-bit analog-to-digital converter (ADC) wiretap channel. In the method of transmitting the security information of the single-bit ADC channel, a transmitting terminal adds additive noise to a transmission signal and transmits the transmission signal, and a receiving terminal and a wiretap terminal which each include a single-bit ADC receive the transmission signal, wherein received information is processed so as not to be determined by the wiretap terminal. When intensity of additive noise of the receiving terminal is less than that of additive noise of the wiretap terminal, a binary phase-shift keying (BPSK) distribution is used, and when the intensity of the additive noise of the receiving terminal is greater than that of the additive noise of the wiretap terminal, a codebook is designed using an asymmetric BPSK distribution in which both of two message points have a positive value.
Claims
1. A method of transmitting security information of a single-bit analog-to-digital converter (ADC) channel, the method comprising: transmitting, by a transmitting terminal, a transmission signal having additive noise; receiving, by a receiving terminal having a single bit ADC, the transmission signal; receiving, by a wiretap terminal having a single bit ADC, the transmission signal; when a first intensity of additive noise included in the received signal of the receiving terminal is less than a second intensity of additive noise included in the received signal of the wiretap terminal, transmitting, by the transmitting terminal, the transmission signal using a binary phase-shift keying (BPSK) distribution; and when the first intensity of the additive noise of the receiving terminal is greater the second intensity of the additive noise of the wiretap terminal, transmitting, by the transmitting terminal, the transmission signal using an asymmetric BPSK distribution in which both of two message points have a positive value.
2. The method of claim 1, wherein, when the first intensity of the additive noise of the receiving terminal is less than the second intensity of the additive noise of the wiretap terminal, output power of the transmitting terminal is defined by Equation 1 below,
3. The method of claim 1, wherein, when the first intensity of the additive noise of the receiving terminal is greater than the second intensity of the additive noise of the wiretap terminal, an output distribution of the transmitting terminal is defined by Equation 2 below,
4. The method of claim 3, wherein in order to maximize a difference between amounts of pieces of information of the receiving terminal and the wiretap terminal, the message point b is treated as a positive integer close to infinity.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The above and other objects, features and advantages of the present invention will become more apparent to those of ordinary skill in the art by describing exemplary embodiments thereof in detail with reference to the accompanying drawings, in which:
(2)
(3)
(4)
(5)
DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS
(6) Hereinafter, various embodiments of the present invention will be described in detail with reference to the accompanying drawings. In this case, it should be noted that like reference numerals in the accompanying drawings denote like elements. The accompanying drawings of the present invention are provided to aid understanding of the present invention and it should be noted that the present invention is not limited to the form or arrangement illustrated in the drawings of the present invention. In addition, detailed descriptions of well-known functions and configurations that may unnecessarily obscure the gist of the invention will not be repeated. The following descriptions will be made focusing on configurations necessary for understanding operations according to various embodiments of the present invention. Therefore, descriptions of other configurations that might obscure gist of the present invention will be omitted.
(7) In descriptions of the embodiments, descriptions of technical contents that are well known in the technical field to which the present invention belongs that are not directly related to the present invention will be omitted. This serves to convey the gist of the invention more clearly by omitting unnecessary descriptions.
(8) For the same reason, in the accompanying drawings, some elements are exaggerated, omitted, or schematically illustrated. In addition, a size of each element does not fully reflect an actual size. The same or corresponding elements in each drawing are given the same reference numerals.
(9) Advantages and features of the present invention and methods of achieving the same will be clearly understood with reference to the accompanying drawings and the following detailed embodiments. However, the present invention is not limited to the embodiments to be disclosed but may be implemented in various different forms. The embodiments are provided in order to fully explain the present invention and fully explain the scope of the present invention for those skilled in the art. The scope of the present invention is defined by the appended claims. Throughout this specification, like reference numerals denote like elements.
(10) In this case, it will be appreciated that each block of flowcharts and combinations of flowcharts may be performed by computer program instructions. Since the computer program instructions may be embedded in a processor of a general purpose computer, special purpose computer, or other programmable data processing equipment, the instructions executed through the processor of the computer or other programmable data processing equipment generate a means for performing the functions described in the block(s) of flowchart. Since the computer program instructions may be stored in a computer usable or computer readable memory that can be directed to a computer or other programmable data processing equipment to implement functionality in a particular manner, the instructions stored in the computer usable or computer readable memory may produce a manufactured item containing an instruction means for performing the functions described in the block(s) of flowchart. Since the computer program instructions may also be installed in a computer or other programmable data processing equipment, instructions for performing a series of operating steps on a computer or other programmable data processing equipment to generate a computer-implemented process to be performed on the computer or other programmable data processing equipment may provide steps for performing the functions described in the block(s) of flowchart.
(11) In addition, each block may represent a module, segment, or portion of code that includes one or more executable instructions for executing a specified logical function(s). It should also be noted that in some alternative implementations, the functions mentioned in the blocks may occur out of order. For example, two blocks illustrated in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending on the corresponding function.
(12) In this case, terms described in the specification as “part” refer to software or a hardware component such as a field-programmable gate array (FPGA) or an application-specific integrated circuit (ASIC), and the part performs certain functions. However, the “part” is not limited to software or hardware. The “part” may be configured in a storage medium that may be addressed or may be configured to be executed by at least one processor. Therefore, examples of the “part” include components such as software components, object-oriented software components, class components and task components, and processes, functions, attributes, procedures, subroutines, segments of program codes, drivers, firmware, micro codes, circuits, data, database, data structures, tables, arrays, and variables. Components and functions provided from “parts” may be combined into a smaller number of components and “parts” or may be further separated into additional components and “parts.”
(13) In addition, the components and “parts” may be implemented to operate one or more central processing units (CPUs) in a device or a secure multimedia card.
(14)
(15) Referring to
(16) The transmitting terminal 10 transmits data through a wireless channel, and the same data is received by each of the receiving terminal 20 and the wiretap terminal 30.
(17) The transmitting terminal 10, the receiving terminal 20, and the wiretap terminal 30 may be communicable computing devices such as various mobile terminals.
(18) The transmitting terminal 10 receives data through a wireless channel and each of the receiving terminal 20 and the wiretap terminal 30 which receive the data converts an analog signal into a digital signal using the ADC to restore the data.
(19) In this case, both of the receiving terminal 20 and the wiretap terminal 30 receive the same data, but the receiving terminal 20 may enable the decoding of the data, and the wiretap terminal 30 may cause the decoding of the data to fail with a very high probability, thereby enabling secure transmission.
(20) In a wireless communication process of the transmitting terminal 10, a communication channel has Gaussian noises N1 and N2, and the Gaussian noises received by the receiving terminal 20 and the wiretap terminal 30 may be different from each other.
(21) In
(22) In the present invention, different security techniques are used when intensity of the additive noise N1 of the receiving terminal 20 is less than that of the additive noise N2 of the wiretap terminal 30 and when intensity of the additive noise N1 of the receiving terminal 20 is greater than that of the additive noise N2 of the wiretap terminal 30.
(23) First, a description will be given of a security technique when intensity of the additive noise N1 of the receiving terminal 20 is less than that of the additive noise N2 of the wiretap terminal 30.
(24) When intensity of the additive noise N1 of the receiving terminal 20 is less than that of the additive noise N2 of the wiretap terminal 30, an input distribution using binary phase-shift keying (BPSK) is obtained.
(25) A secure transfer rate Rs in this case may be defined by Equation 1 below.
Rs=I(X;Y)−I(X;Z) [Equation 1]
(26) In addition, the reception signal Y of the receiving terminal 20 may be defined by sgn(X+N1), and the reception signal Z of the wiretap terminal 30 may be defined by sgn(X+N2).
(27) It is sufficient that the fact that a specific input distribution p(x) achieves a positive secure transfer rate means that a difference between amounts of pieces of mutual information, I(X;Y)−I(X;Z), which is the difference between the amounts of pieces of mutual information described above, has a positive value.
(28) The input distribution p(x) of the transmitting terminal 10 is set by BPSK corresponding to a given maximum power limit P. It can be appreciated that the maximum power limit P is caused by the use of a single-bit ADC. The input distribution p(x) may be defined by Equation 2 below.
p(x)=½, for x=√{square root over (P)}, −√{square root over (P)} [Equation 2]
(29) An equation representing the difference between the amounts of pieces of mutual information using the given input distribution p(x) may be expressed by Equation 3 below.
(30)
(31) In Equation 3, Q(x) denotes a decreasing function having a value of ½ when x is zero, and H(y) denotes an increasing function, which has a maximum value when y=½ and increases in y∈[0, ½], as an entropy function.
(32) Using Equation 3, optimal BPSK of the transmitting terminal 10 may be obtained as shown in Equation 4 below.
(33)
(34) As described above, when intensity of the noise N1 added to the receiving terminal 20 is less than that of the noise N2 of the transmitting terminal 10, optimal BPSK may be applied within a range of the limited power P so that the secure transfer rate of Equation 1 above may be achieved. In the above method, two message points have both of a positive value and a negative value relative to zero.
(35) On the contrary, when intensity of the additive noise N1 of the receiving terminal 20 is greater than that of the additive noise N2 of the transmitting terminal 10, asymmetric BPSK is used in which both of two message points have positive values.
(36) An input distribution p1(x) of a signal transmitted by the transmitting terminal 10 may be expressed by Equation 5 below.
(37)
(38) When such an input distribution is used, a probability of achieving a positive secure transfer rate and a reception probability may be expressed as in the graph of
(39) In the above Equation 5, when x is b, a probability that both of Y and Z are one is high, and when x is a, Equation 6 below is satisfied.
p1(Y=−1;X=a)>p1(Z=−1;X=a) [Equation 6]
(40) In the above Equation 6, it can be seen that the signal received by the receiving terminal 20 distinguishes between two input symbols a and b better than the signal received by the wiretap terminal 30.
(41) In this case, when b has an infinite value close to infinity in the above input distribution, channels are generated between the transmitting terminal 10 and the receiving terminal 20 and between the transmitting terminal 10 and the wiretap terminal 30 as illustrated in
(42) Referring to
(43)
(44) The amount of mutual information is represented by a decreasing function with respect to a crossing probability, and when N1>N2, a difference between the amounts of pieces of mutual information has a positive value. That is, when b is close to infinity, the difference between the amounts of pieces of mutual information may become a positive value and may be expressed by Equation 8 below.
(45)
(46) Since the difference between the amounts of pieces of mutual information is a continuous function with respect to b, there exists a positive constant b which makes a secure transfer rate become a positive value for all a and π(pi).
(47) The a, b, and π obtained in this way may not satisfy the maximum power limit P. In this case, when communication is performed by setting a ratio of a time during which the transmitting terminal 10 transmits a signal to a total communication time and a time usage rate B, a positive secure transfer rate may be obtained while satisfying the maximum power limit.
(48) A relationship between the above variables may be expressed by Equation 9 below.
(49)
(50) In the asymmetric BPSK obtained in this way, effects of the respective variables on a secure transfer rate may be analyzed by simulations.
(51) A first method, which is a method of maximizing a secure transfer rate, is an example in which b of Equation 9 is determined by maximizing the secure transfer rate for a, b, and π and then limiting the maximum power limit P to 0.01. The first method is represented by solid blue lines (Bursty opt) in
(52) A second method is a method in which the time usage rate B is fixed to 1 and maximized for a, b, and π. The second method is represented by solid red lines (Not Bursty opt).
(53) A third method is a method in which a secure transfer rate is maximized for all possible combinations of a, b, π, and B. The third method is represented by solid yellow lines (Joint opt).
(54) The additive noise N1 is fixed to one in all simulations.
(55) When the maximum power limit is high, similar secure transfer rates are obtained in all three methods. As the maximum power limit decreases, performance in the first method decreases and then the performance in the second method rapidly decreases. Accordingly, it may be analyzed that, in a region in which the maximum power limit is low, the time use rate has a dominant influence on the secure transfer rate, and in a region in which the maximum power limit is high, it is optimal to set the time use rate to one and a value of the input symbol b has a dominant influence.
(56) As described above, in the present invention, a positive secure transfer rate may be achieved by applying the BPSK or the asymmetric BPSK according to the intensity of the additive noises of the receiving terminal 20 and the wiretap terminal 30.
(57) According to the present invention, in the method of transmitting the security information of the single-bit ADC channel, the codebook reflecting the BPSK or the asymmetric BPSK can be used according to the intensity of the additive noises of the receiving terminal and the wiretap terminal which each use the single-bit ADC, thereby enabling an additive white Gaussian noise (AWGN) channel communication with low power.
(58) It will be apparent to those skilled in the art that the present invention is not limited to the above embodiments and may be variously modified and deformed without departing from the technical spirit of the present invention.