TY - GEN
T1 - Pseudorandom Frozen Bits Value and Index-Based Encrypted Constrained Polar Codes
AU - Moussa, Karim H.
AU - El-Sakka, Ahmed H.
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - Enhancing channel capacity in 5G and Future Systems with Polar Codes have proven to be an effective coding technique for achieving channel capacity in 5G and beyond. However, concerns about their security have prompted the de-velopment of an enhanced solution: the encrypted constrained polar code (ECPC) security system. This system leverages polar codes in conjunction with a pre-shared secret keyed to bolster security. The secret key plays a crucial role in generating random values and indices for frozen bits, resulting in a more secure and robust coding scheme. By separating input codeword bits into random indices with low mutual information and fixed ones, the coded sequences exhibit greater randomness, thereby influencing the frozen bit values and indices in the polarized coded bit channels. Simulations presented have demonstrated that the suggested ECPC system outperforms its predecessor, achieving more than double the Bit Error Rate (BER) performance at the same Eb/N0-Testing across different code word lengths, half code rates, and frozen bit restricted ratios consistently showed improved BER performance, underscoring the efficacy of the proposed system. Furthermore, security testing has revealed that a one-bit discrepancy between the decoding encryption key and the encoding key can lead to a significant increase in the receiver's BER probability. With the receiver unable to discern the sent material without the whole 232-bit symmetric encryption key, the ECPC system offers a heightened level of security in communication channels with improved performance.
AB - Enhancing channel capacity in 5G and Future Systems with Polar Codes have proven to be an effective coding technique for achieving channel capacity in 5G and beyond. However, concerns about their security have prompted the de-velopment of an enhanced solution: the encrypted constrained polar code (ECPC) security system. This system leverages polar codes in conjunction with a pre-shared secret keyed to bolster security. The secret key plays a crucial role in generating random values and indices for frozen bits, resulting in a more secure and robust coding scheme. By separating input codeword bits into random indices with low mutual information and fixed ones, the coded sequences exhibit greater randomness, thereby influencing the frozen bit values and indices in the polarized coded bit channels. Simulations presented have demonstrated that the suggested ECPC system outperforms its predecessor, achieving more than double the Bit Error Rate (BER) performance at the same Eb/N0-Testing across different code word lengths, half code rates, and frozen bit restricted ratios consistently showed improved BER performance, underscoring the efficacy of the proposed system. Furthermore, security testing has revealed that a one-bit discrepancy between the decoding encryption key and the encoding key can lead to a significant increase in the receiver's BER probability. With the receiver unable to discern the sent material without the whole 232-bit symmetric encryption key, the ECPC system offers a heightened level of security in communication channels with improved performance.
KW - 5G mobile communication
KW - encrypted
KW - internet of things
KW - polar codes
KW - random number generator
UR - http://www.scopus.com/inward/record.url?scp=85202347571&partnerID=8YFLogxK
U2 - 10.1109/ITC-Egypt61547.2024.10620580
DO - 10.1109/ITC-Egypt61547.2024.10620580
M3 - Conference Proceeding
T3 - International Telecommunications Conference (ITC-Egypt)
SP - 712
EP - 716
BT - 2024 International Telecommunications Conference (ITC-Egypt)
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2024 International Telecommunications Conference, ITC-Egypt 2024
Y2 - 22 July 2024 through 25 July 2024
ER -