• Login
    View Item 
    •   Shocker Open Access Repository Home
    • Engineering
    • Electrical and Computer Engineering
    • ECE Research Publications
    • View Item
    •   Shocker Open Access Repository Home
    • Engineering
    • Electrical and Computer Engineering
    • ECE Research Publications
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Short blocklength wiretap channel codes via deep learning: Design and performance evaluation

    View/Open
    Preprint (3.422Mb)
    Date
    2023-01-18
    Author
    Rana, Vidhi
    Chou, Rémi A.
    Metadata
    Show full item record
    Citation
    V. Rana and R. A. Chou, "Short Blocklength Wiretap Channel Codes via Deep Learning: Design and Performance Evaluation," in IEEE Transactions on Communications, doi: 10.1109/TCOMM.2023.3237259.
    Abstract
    We design short blocklength codes for the Gaussian wiretap channel under information-theoretic security guarantees. Our approach consists in decoupling the reliability and secrecy constraints in our code design. Specifically, we handle the reliability constraint via an autoencoder, and handle the secrecy constraint with hash functions. For blocklengths smaller than or equal to 128, we evaluate through simulations the probability of error at the legitimate receiver and the leakage at the eavesdropper for our code construction. This leakage is defined as the mutual information between the confidential message and the eavesdropper’s channel observations, and is empirically measured via a neural network-based mutual information estimator. Our simulation results provide examples of codes with positive secrecy rates that outperform the best known achievable secrecy rates obtained non-constructively for the Gaussian wiretap channel. Additionally, we show that our code design is suitable for the compound and arbitrarily varying Gaussian wiretap channels, for which the channel statistics are not perfectly known but only known to belong to a pre-specified uncertainty set. These models not only capture uncertainty related to channel statistics estimation, but also scenarios where the eavesdropper jams the legitimate transmission or influences its own channel statistics by changing its location.
    Description
    Preprint version available from arXiv. Click on the DOI to access the publisher's version of this article.
    URI
    https://doi.org/10.1109/TCOMM.2023.3237259
    https://soar.wichita.edu/handle/10057/25023
    Collections
    • ECE Research Publications

    Browse

    All of Shocker Open Access RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsBy TypeThis CollectionBy Issue DateAuthorsTitlesSubjectsBy Type

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    DSpace software copyright © 2002-2023  DuraSpace
    DSpace Express is a service operated by 
    Atmire NV