Learning End-to-End Codes for the BPSK-constrained Gaussian Wiretap
Channel
- URL: http://arxiv.org/abs/2003.10577v1
- Date: Mon, 23 Mar 2020 23:26:36 GMT
- Title: Learning End-to-End Codes for the BPSK-constrained Gaussian Wiretap
Channel
- Authors: Alireza Nooraiepour and Sina Rezaei Aghdam
- Abstract summary: The goal is to find codes which allow a pair of transmitter and receiver to communicate reliably and securely in the presence of an adversary.
The security is evaluated in terms of mutual information utilizing a deep learning tool called MINE.
Numerical results demonstrate that the legitimate parties can indeed establish a secure transmission in this setting.
- Score: 1.9036571490366496
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Finite-length codes are learned for the Gaussian wiretap channel in an
end-to-end manner assuming that the communication parties are equipped with
deep neural networks (DNNs), and communicate through binary phase-shift keying
(BPSK) modulation scheme. The goal is to find codes via DNNs which allow a pair
of transmitter and receiver to communicate reliably and securely in the
presence of an adversary aiming at decoding the secret messages. Following the
information-theoretic secrecy principles, the security is evaluated in terms of
mutual information utilizing a deep learning tool called MINE (mutual
information neural estimation). System performance is evaluated for different
DNN architectures, designed based on the existing secure coding schemes, at the
transmitter. Numerical results demonstrate that the legitimate parties can
indeed establish a secure transmission in this setting as the learned codes
achieve points on almost the boundary of the equivocation region.
Related papers
- Deep Learning-based Codes for Wiretap Fading Channels [27.397083701319744]
This work provides the first experimental characterization of a deep learning-based, finite-blocklength code construction for multi-tap fading wiretap channels.
In addition to the evaluation of the average probability of error and information leakage, we illustrate the influence of (i) the number of fading taps, (ii) differing variances of the fading coefficients and (iii) the seed selection for the hash function-based security layer.
arXiv Detail & Related papers (2024-09-13T12:45:30Z) - Physical Layer Deception with Non-Orthogonal Multiplexing [52.11755709248891]
We propose a novel framework of physical layer deception (PLD) to actively counteract wiretapping attempts.
PLD combines PLS with deception technologies to actively counteract wiretapping attempts.
We prove the validity of the PLD framework with in-depth analyses and demonstrate its superiority over conventional PLS approaches.
arXiv Detail & Related papers (2024-06-30T16:17:39Z) - LIGHTCODE: Light Analytical and Neural Codes for Channels with Feedback [10.619569069690185]
We focus on designing low-complexity coding schemes that are interpretable and more suitable for communication systems.
First, we demonstrate that POWERBLAST, an analytical coding scheme inspired by Schalkwijk-Kailath (SK) and Gallager-Nakiboglu (GN) schemes, achieves notable reliability improvements over both SK and GN schemes.
Next, to enhance reliability in low-SNR regions, we propose LIGHTCODE, a lightweight neural code that achieves state-of-the-art reliability while using a fraction of memory and compute.
arXiv Detail & Related papers (2024-03-16T01:04:34Z) - Flexible polar encoding for information reconciliation in QKD [2.627883025193776]
Quantum Key Distribution (QKD) enables two parties to establish a common secret key that is information-theoretically secure.
Errors that are generally considered to be due to the adversary's tempering with the quantum channel need to be corrected using classical communication over a public channel.
We show that the reliability sequence can be derived and used to design an encoder independent of the choice of decoder.
arXiv Detail & Related papers (2023-11-30T16:01:10Z) - Semantics Alignment via Split Learning for Resilient Multi-User Semantic
Communication [56.54422521327698]
Recent studies on semantic communication rely on neural network (NN) based transceivers such as deep joint source and channel coding (DeepJSCC)
Unlike traditional transceivers, these neural transceivers are trainable using actual source data and channels, enabling them to extract and communicate semantics.
We propose a distributed learning based solution, which leverages split learning (SL) and partial NN fine-tuning techniques.
arXiv Detail & Related papers (2023-10-13T20:29:55Z) - Secure Deep-JSCC Against Multiple Eavesdroppers [13.422085141752468]
We propose an end-to-end (E2E) learning-based approach for secure communication against multiple eavesdroppers.
We implement deep neural networks (DNNs) to realize a data-driven secure communication scheme.
Our experiments show that employing the proposed secure neural encoding can decrease the adversarial accuracy by 28%.
arXiv Detail & Related papers (2023-08-05T14:40:35Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - A Scalable Graph Neural Network Decoder for Short Block Codes [49.25571364253986]
We propose a novel decoding algorithm for short block codes based on an edge-weighted graph neural network (EW-GNN)
The EW-GNN decoder operates on the Tanner graph with an iterative message-passing structure.
We show that the EW-GNN decoder outperforms the BP and deep-learning-based BP methods in terms of the decoding error rate.
arXiv Detail & Related papers (2022-11-13T17:13:12Z) - Model-based Deep Learning Receiver Design for Rate-Splitting Multiple
Access [65.21117658030235]
This work proposes a novel design for a practical RSMA receiver based on model-based deep learning (MBDL) methods.
The MBDL receiver is evaluated in terms of uncoded Symbol Error Rate (SER), throughput performance through Link-Level Simulations (LLS) and average training overhead.
Results reveal that the MBDL outperforms by a significant margin the SIC receiver with imperfect CSIR.
arXiv Detail & Related papers (2022-05-02T12:23:55Z) - End-to-End Learning of Neuromorphic Wireless Systems for Low-Power Edge
Artificial Intelligence [38.518936229794214]
We introduce a novel "all-spike" low-power solution for remote wireless inference that is based on neuromorphic sensing, Impulse Radio (IR), and Spiking Neural Networks (SNNs)
We introduce an end-to-end training procedure that treats the cascade of encoder, channel, and decoder as a probabilistic SNN-based autoencoder that implements Joint Source-Channel Coding (JSCC)
The experiments confirm that the proposed end-to-end neuromorphic edge architecture provides a promising framework for efficient and low-latency remote sensing, communication, and inference.
arXiv Detail & Related papers (2020-09-03T09:10:16Z) - DeepSIC: Deep Soft Interference Cancellation for Multiuser MIMO
Detection [98.43451011898212]
In multiuser multiple-input multiple-output (MIMO) setups, where multiple symbols are simultaneously transmitted, accurate symbol detection is challenging.
We propose a data-driven implementation of the iterative soft interference cancellation (SIC) algorithm which we refer to as DeepSIC.
DeepSIC learns to carry out joint detection from a limited set of training samples without requiring the channel to be linear.
arXiv Detail & Related papers (2020-02-08T18:31:00Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.