universität siegen institut für digitale kommunikationssysteme univ.-prof. dr. christoph ruland...

15
Universität Siegen Universität Siegen Institut für Digitale Institut für Digitale Kommunikationssysteme Kommunikationssysteme Univ.-Prof. Dr. Christoph Ruland Univ.-Prof. Dr. Christoph Ruland Hölderlinstraße 3 Hölderlinstraße 3 D-57076 Siegen D-57076 Siegen http://www.dcs.uni-siegen.de http://www.dcs.uni-siegen.de FEC over Wireless Channels using FEC over Wireless Channels using Cryptographic Check Values as Cryptographic Check Values as Coding Redundancy Coding Redundancy Belgrade, April 2, 2009 Belgrade, April 2, 2009 Nataša Živić Nataša Živić

Upload: winfred-melton

Post on 29-Dec-2015

220 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Universität Siegen Institut für Digitale Kommunikationssysteme Univ.-Prof. Dr. Christoph Ruland Hölderlinstraße 3 D-57076 Siegen

Universität SiegenUniversität SiegenInstitut für Digitale KommunikationssystemeInstitut für Digitale KommunikationssystemeUniv.-Prof. Dr. Christoph RulandUniv.-Prof. Dr. Christoph RulandHölderlinstraße 3Hölderlinstraße 3D-57076 SiegenD-57076 Siegenhttp://www.dcs.uni-siegen.dehttp://www.dcs.uni-siegen.de

FEC over Wireless Channels using FEC over Wireless Channels using Cryptographic Check Values as Coding Cryptographic Check Values as Coding

RedundancyRedundancy

Belgrade, April 2, 2009Belgrade, April 2, 2009Nataša ŽivićNataša Živić

Page 2: Universität Siegen Institut für Digitale Kommunikationssysteme Univ.-Prof. Dr. Christoph Ruland Hölderlinstraße 3 D-57076 Siegen

Wireless Communication SystemsWireless Communication Systems

Wireless communication systems have found heavy Wireless communication systems have found heavy deployments over recent yearsdeployments over recent years

Many popular applications have emerged for wireless Many popular applications have emerged for wireless networks including, voice calls, SMS, MMS, web browsing networks including, voice calls, SMS, MMS, web browsing and video conferencing, to name a few.and video conferencing, to name a few.

These services not only needs to be provided but rather These services not only needs to be provided but rather provided in a secure and reliable mannerprovided in a secure and reliable manner

Our work focus on reliablity of data transfer, from source to Our work focus on reliablity of data transfer, from source to destination, using security mechanisms as a tooldestination, using security mechanisms as a tool

18.04.2008 ITG-Fachgruppensitzung 2

Page 3: Universität Siegen Institut für Digitale Kommunikationssysteme Univ.-Prof. Dr. Christoph Ruland Hölderlinstraße 3 D-57076 Siegen

Channel Coding & CryptographyChannel Coding & Cryptography

We consider the following two basic limitations of a wireless We consider the following two basic limitations of a wireless channel,channel,

1.1. Wireless channel is inherently prone to transmission errorsWireless channel is inherently prone to transmission errors Forward Error Correction (FEC) is used as a solution in those Forward Error Correction (FEC) is used as a solution in those

scenarios where the feedback link is missing and thus Automatic scenarios where the feedback link is missing and thus Automatic Repeat Request (ARQ) can not be usedRepeat Request (ARQ) can not be used

2.2. Wireless channel is prone to the problem of data security Wireless channel is prone to the problem of data security tootoo Cryptography and digital signatures are used as a solution to these Cryptography and digital signatures are used as a solution to these

problemsproblems Cryptography solves the problems of eves-dropping & digital Cryptography solves the problems of eves-dropping & digital

signatures is a solution to repudiation by the sendersignatures is a solution to repudiation by the sender

18.04.2008 ITG-Fachgruppensitzung 3

Page 4: Universität Siegen Institut für Digitale Kommunikationssysteme Univ.-Prof. Dr. Christoph Ruland Hölderlinstraße 3 D-57076 Siegen

Joint Channel Coding & CryptographyJoint Channel Coding & Cryptography

So far, data security and the correction of errors induced by So far, data security and the correction of errors induced by the transmission channel have been dealt separatelythe transmission channel have been dealt separately

In this work we present a novel technique which combines In this work we present a novel technique which combines these two different areas together to give a joint solution to these two different areas together to give a joint solution to both the problems discussed beforeboth the problems discussed before

We use cryptography (in the form of cryptographic check We use cryptography (in the form of cryptographic check functions) to improve the BER over the channelfunctions) to improve the BER over the channel

Moreover we use the channel coding to improve the results Moreover we use the channel coding to improve the results of cryptography as wellof cryptography as well

We call this technique as Joint Channel Coding & We call this technique as Joint Channel Coding & CryptographyCryptography

18.04.2008 ITG-Fachgruppensitzung 4

Page 5: Universität Siegen Institut für Digitale Kommunikationssysteme Univ.-Prof. Dr. Christoph Ruland Hölderlinstraße 3 D-57076 Siegen

SOURCESOURCE

ENCODERCHANNELENCODER

MODULATOR

DEMODULATORCHANNELDECODER

SINK

Data Communication (Building Blocks)

SOURCEDECODER

L-values

NOISY CHANNEL

Data (Text, Audio, video)

Received Data (probably with errors)

Page 6: Universität Siegen Institut für Digitale Kommunikationssysteme Univ.-Prof. Dr. Christoph Ruland Hölderlinstraße 3 D-57076 Siegen

Objective

MODULATORCHANNELENCODER

SOURCEENCODER

SOURCE ENCRYPTOR

DECRYPTOR DEMODULATORCHANNEL DECODER

SOURCEDECODER

SINK

L-values

L-values

Data (Text, Audio, video)

Received Data (probably with errors)

NOISY CHANNEL

Page 7: Universität Siegen Institut für Digitale Kommunikationssysteme Univ.-Prof. Dr. Christoph Ruland Hölderlinstraße 3 D-57076 Siegen

CHANNEL DECODER(SISO)

SOFT INPUT DECRYPTOR

SID block L (1.bit) L (2.bit) L (3.bit)…

Soft Input

L = L-Values(Obtained from probability distribution)

Soft Input DecryptionSoft Input Decryption

Page 8: Universität Siegen Institut für Digitale Kommunikationssysteme Univ.-Prof. Dr. Christoph Ruland Hölderlinstraße 3 D-57076 Siegen

Soft Input Decryption AlgorithmSoft Input Decryption Algorithm

Channel

SISO Channel Decoder

Number of trials exceeded

the max?

No

Source Decoder

No

Bit flipping

No Successfully verified data

Verification successful?

Unsuccessfully verified data

(contains errors) Yes

L Values of bits

Ordering of bits into an increasing array of their |L|-

values

Decryptor (Verification)

Soft Input Decryption Process

Page 9: Universität Siegen Institut für Digitale Kommunikationssysteme Univ.-Prof. Dr. Christoph Ruland Hölderlinstraße 3 D-57076 Siegen

Feedback information about correct decoded bits

CHANNEL DECODER(SISO)

SOFT INPUT DECRYPTOR

SID block L (1.bit) L (2.bit) L (3.bit)…

Soft Input

Soft Input Decryption with FeedbackSoft Input Decryption with Feedback

Page 10: Universität Siegen Institut für Digitale Kommunikationssysteme Univ.-Prof. Dr. Christoph Ruland Hölderlinstraße 3 D-57076 Siegen

ma || na

block a

mb || nb

block b

a b … b a b … b a … … a b … b

u

…V: …

ma mb

na nb

CCF CCFkey key

CCF – Cryptographic Check Function

Assembling message u for TransmissionAssembling message u for Transmission

Page 11: Universität Siegen Institut für Digitale Kommunikationssysteme Univ.-Prof. Dr. Christoph Ruland Hölderlinstraße 3 D-57076 Siegen

Parallel Soft Input Decryption AlgorithmParallel Soft Input Decryption Algorithm

Demodulation

Channel

SID of Block a‘ SID of Block b‘

SISO Channel Decoding

Block a‘ Block b‘

BER1,SID BER1,SID

SISO Channel Decoding

BERfeedback

SID of Block a‘ SID of Block b‘

BER2,SID

Step

1

Step 1

Step 2

Step 3BER2,SID

BERcd1

SISO Channel Decoding

Segmentation of u‘

(into blocks a‘ & b‘)

BERfeedback

Page 12: Universität Siegen Institut für Digitale Kommunikationssysteme Univ.-Prof. Dr. Christoph Ruland Hölderlinstraße 3 D-57076 Siegen

Encoder: - Convolutional encoder (1/2) BPSK modulation AWGN channel Decoder: - Convolutional MAP decoder (1/2 and 1/3) Length of SID Blocks: 192 bits (128 bit message and 64 bit cryptographic

check value) 8 (16) bits with the minimal absolute L-values are tested Eb/N0 increased in steps of 0,5 dB For each result (point of curves) 50 000 tests are done

Simulation ParametersSimulation Parameters

Page 13: Universität Siegen Institut für Digitale Kommunikationssysteme Univ.-Prof. Dr. Christoph Ruland Hölderlinstraße 3 D-57076 Siegen

Simulation ResultsSimulation Results

Page 14: Universität Siegen Institut für Digitale Kommunikationssysteme Univ.-Prof. Dr. Christoph Ruland Hölderlinstraße 3 D-57076 Siegen

Joint Soft Input Decryption and Source Channel Coding

Improvement of arithmetic efficiency of Soft Input Decryption method

Development of new strategies for Soft Input Decryption

Extension of Soft Input Decryption with Feedback to Turbo principle

Analysis of the impact of the channel encoder to Soft Input Decryption

SISO decryption

SummarySummary

Page 15: Universität Siegen Institut für Digitale Kommunikationssysteme Univ.-Prof. Dr. Christoph Ruland Hölderlinstraße 3 D-57076 Siegen

Thank you very much

for your attention!