4.6 Article

Security Gap Improvement of BICM Systems Through Bit-Labeling Optimization for the Gaussian Wiretap Channel

Journal

IEEE ACCESS
Volume 10, Issue -, Pages 47805-47813

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2022.3172481

Keywords

Security; Signal to noise ratio; Optimization; Symbols; Quadrature amplitude modulation; Labeling; Modulation; Bit-interleaved coded modulation; Gaussian wiretap channel; physical layer security; security gap

Funding

  1. Ministry of Internal Affairs and Communications, Japan [JPJ000254]

Ask authors/readers for more resources

This paper investigates the impact of a bit-labeling scheme on the security performance of BICM systems and proposes optimization algorithms for bit-labeling. The results show that the proposed bit-labeling can significantly improve performance while degrading the error rate performance of the legitimate receiver, and can be combined with coding schemes to reduce the security gap.
In this paper, we investigate the impact of a bit-labeling scheme on security performance of bit-interleaved coded modulation (BICM) systems for the Gaussian wiretap channel, where the concept of security gap plays an important role. To exemplify this, we present optimization algorithms of bit-labeling, where a difference of the achievable information rates (AIRs) for the legitimate receiver and the eavesdropper is maximized. Our results demonstrate that the conventional Gray labeling may not be necessarily optimal in terms of security gap, and the proposed bit-labeling can significantly improve its performance at the cost of degradation in the achievable bit-error rate (BER) performance by the legitimate receiver. We also demonstrate that, for high order quadrature amplitude modulation (QAM), such as 64QAM, the dimension-wise optimization of bit-labeling may be sufficient to achieve similar security gap performance to the direct two-dimensional optimization. The proposed bit-labeling optimization approach can be combined with the state-of-the-art coding schemes to further reduce a security gap.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available