Deep Learning-based Codes for Wiretap Fading Channels
- URL: http://arxiv.org/abs/2409.08786v1
- Date: Fri, 13 Sep 2024 12:45:30 GMT
- Title: Deep Learning-based Codes for Wiretap Fading Channels
- Authors: Daniel Seifert, Onur Günlü, Rafael F. Schaefer,
- Abstract summary: This work provides the first experimental characterization of a deep learning-based, finite-blocklength code construction for multi-tap fading wiretap channels.
In addition to the evaluation of the average probability of error and information leakage, we illustrate the influence of (i) the number of fading taps, (ii) differing variances of the fading coefficients and (iii) the seed selection for the hash function-based security layer.
- Score: 27.397083701319744
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The wiretap channel is a well-studied problem in the physical layer security (PLS) literature. Although it is proven that the decoding error probability and information leakage can be made arbitrarily small in the asymptotic regime, further research on finite-blocklength codes is required on the path towards practical, secure communications systems. This work provides the first experimental characterization of a deep learning-based, finite-blocklength code construction for multi-tap fading wiretap channels without channel state information (CSI). In addition to the evaluation of the average probability of error and information leakage, we illustrate the influence of (i) the number of fading taps, (ii) differing variances of the fading coefficients and (iii) the seed selection for the hash function-based security layer.
Related papers
- Eavesdropper localization for quantum and classical channels via
nonlinear scattering [58.720142291102135]
Quantum key distribution (QKD) offers theoretical security based on the laws of physics.
We present a novel approach to eavesdropper location that can be employed in quantum as well as classical channels.
We demonstrate that our approach outperforms conventional OTDR in the task of localizing an evanescent outcoupling of 1% with cm precision inside standard optical fibers.
arXiv Detail & Related papers (2023-06-25T21:06:27Z) - Denoising Diffusion Error Correction Codes [92.10654749898927]
Recently, neural decoders have demonstrated their advantage over classical decoding techniques.
Recent state-of-the-art neural decoders suffer from high complexity and lack the important iterative scheme characteristic of many legacy decoders.
We propose to employ denoising diffusion models for the soft decoding of linear codes at arbitrary block lengths.
arXiv Detail & Related papers (2022-09-16T11:00:50Z) - Disentangled Representation Learning for RF Fingerprint Extraction under
Unknown Channel Statistics [77.13542705329328]
We propose a framework of disentangled representation learning(DRL) that first learns to factor the input signals into a device-relevant component and a device-irrelevant component via adversarial learning.
The implicit data augmentation in the proposed framework imposes a regularization on the RFF extractor to avoid the possible overfitting of device-irrelevant channel statistics.
Experiments validate that the proposed approach, referred to as DR-RFF, outperforms conventional methods in terms of generalizability to unknown complicated propagation environments.
arXiv Detail & Related papers (2022-08-04T15:46:48Z) - Short Blocklength Wiretap Channel Codes via Deep Learning: Design and
Performance Evaluation [5.203329540700176]
We design short blocklength codes for the Gaussian wiretap channel under information-theoretic security guarantees.
We handle the reliability constraint via an autoencoder, and handle the secrecy constraint with hash functions.
For blocklengths smaller than or equal to 16, we evaluate through simulations the probability of error at the legitimate receiver.
arXiv Detail & Related papers (2022-06-07T17:52:46Z) - Semantic Security with Infinite Dimensional Quantum Eavesdropping
Channel [19.275181096881454]
We propose a new proof method for direct coding theorems for wiretap channels.
The method yields errors that decay exponentially with increasing block lengths.
It provides a guarantee of a quantum version of semantic security.
arXiv Detail & Related papers (2022-05-16T13:25:56Z) - Reinforce Security: A Model-Free Approach Towards Secure Wiretap Coding [30.74553644848033]
Deep learning techniques for approxing secure encoding functions have attracted considerable interest in wireless communications.
In this paper, the approach of reinforcement learning is studied and, in particular, the policy gradient method for a model-free approach of neural network-based secure encoding is investigated.
arXiv Detail & Related papers (2021-06-01T09:30:15Z) - Solving Sparse Linear Inverse Problems in Communication Systems: A Deep
Learning Approach With Adaptive Depth [51.40441097625201]
We propose an end-to-end trainable deep learning architecture for sparse signal recovery problems.
The proposed method learns how many layers to execute to emit an output, and the network depth is dynamically adjusted for each task in the inference phase.
arXiv Detail & Related papers (2020-10-29T06:32:53Z) - Deep-Learning Based Blind Recognition of Channel Code Parameters over
Candidate Sets under AWGN and Multi-Path Fading Conditions [13.202747831999414]
We consider the problem of recovering channel code parameters over a candidate set by merely analyzing the received encoded signals.
We propose a deep learning-based solution that is capable of identifying the channel code parameters for any coding scheme.
arXiv Detail & Related papers (2020-09-16T16:10:39Z) - Operation-Aware Soft Channel Pruning using Differentiable Masks [51.04085547997066]
We propose a data-driven algorithm, which compresses deep neural networks in a differentiable way by exploiting the characteristics of operations.
We perform extensive experiments and achieve outstanding performance in terms of the accuracy of output networks.
arXiv Detail & Related papers (2020-07-08T07:44:00Z) - Learning End-to-End Codes for the BPSK-constrained Gaussian Wiretap
Channel [1.9036571490366496]
The goal is to find codes which allow a pair of transmitter and receiver to communicate reliably and securely in the presence of an adversary.
The security is evaluated in terms of mutual information utilizing a deep learning tool called MINE.
Numerical results demonstrate that the legitimate parties can indeed establish a secure transmission in this setting.
arXiv Detail & Related papers (2020-03-23T23:26:36Z) - DeepSIC: Deep Soft Interference Cancellation for Multiuser MIMO
Detection [98.43451011898212]
In multiuser multiple-input multiple-output (MIMO) setups, where multiple symbols are simultaneously transmitted, accurate symbol detection is challenging.
We propose a data-driven implementation of the iterative soft interference cancellation (SIC) algorithm which we refer to as DeepSIC.
DeepSIC learns to carry out joint detection from a limited set of training samples without requiring the channel to be linear.
arXiv Detail & Related papers (2020-02-08T18:31:00Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.