Performance Analysis of Secure Communication with the Presence of Polar Codes

The advent of fifth-generation (5G) technology has ushered in a new era of connectivity, promising unprecedented data rates and ultra-reliable low-latency communication. As the demand for high-speed and secure communication continues to surge, there is a critical need for robust communication system...

Full description

Bibliographic Details
Published in:2024 6th IEEE Symposium on Computers and Informatics, ISCI 2024
Main Author: Suhaimi H.; Mohamad R.; Yussof Y.M.; Yasmin Abdul Rahman F.; Suliman S.I.
Format: Conference paper
Language:English
Published: Institute of Electrical and Electronics Engineers Inc. 2024
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85204980509&doi=10.1109%2fISCI62787.2024.10668101&partnerID=40&md5=0389cfb35b58e051dbb505eb60e6d302
id 2-s2.0-85204980509
spelling 2-s2.0-85204980509
Suhaimi H.; Mohamad R.; Yussof Y.M.; Yasmin Abdul Rahman F.; Suliman S.I.
Performance Analysis of Secure Communication with the Presence of Polar Codes
2024
2024 6th IEEE Symposium on Computers and Informatics, ISCI 2024


10.1109/ISCI62787.2024.10668101
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85204980509&doi=10.1109%2fISCI62787.2024.10668101&partnerID=40&md5=0389cfb35b58e051dbb505eb60e6d302
The advent of fifth-generation (5G) technology has ushered in a new era of connectivity, promising unprecedented data rates and ultra-reliable low-latency communication. As the demand for high-speed and secure communication continues to surge, there is a critical need for robust communication systems to increase wireless networks' security level. In this context, this paper investigates secure communication techniques, specifically focusing on utilizing the hash function as an authentication mechanism and the presence of polar codes. The integration of polar codes within the communication framework and their effectiveness are examined to enhance error correction capabilities by ensuring the integrity of transmitted data. Furthermore, the transmissions between Alice, Bob, and Eve are evaluated in terms of authentication rate, secrecy rate, and secrecy capacity in determining the effect of the hash function, the presence of channel pre-coding algorithm, and various codeword lengths. This paper also investigates the impact of different codeword values on the overall system performance, shedding light on the advantages of tailoring these parameters to the unique requirements of 5G networks. The results found that the performance of secure communication with the presence of polar codes is better than that of transmission without polar codes. The secrecy rate is reduced to below 10-4 after the transmission reaches 7 dB, Bob's authentication rate remains high, almost reaching 1. © 2024 IEEE.
Institute of Electrical and Electronics Engineers Inc.

English
Conference paper

author Suhaimi H.; Mohamad R.; Yussof Y.M.; Yasmin Abdul Rahman F.; Suliman S.I.
spellingShingle Suhaimi H.; Mohamad R.; Yussof Y.M.; Yasmin Abdul Rahman F.; Suliman S.I.
Performance Analysis of Secure Communication with the Presence of Polar Codes
author_facet Suhaimi H.; Mohamad R.; Yussof Y.M.; Yasmin Abdul Rahman F.; Suliman S.I.
author_sort Suhaimi H.; Mohamad R.; Yussof Y.M.; Yasmin Abdul Rahman F.; Suliman S.I.
title Performance Analysis of Secure Communication with the Presence of Polar Codes
title_short Performance Analysis of Secure Communication with the Presence of Polar Codes
title_full Performance Analysis of Secure Communication with the Presence of Polar Codes
title_fullStr Performance Analysis of Secure Communication with the Presence of Polar Codes
title_full_unstemmed Performance Analysis of Secure Communication with the Presence of Polar Codes
title_sort Performance Analysis of Secure Communication with the Presence of Polar Codes
publishDate 2024
container_title 2024 6th IEEE Symposium on Computers and Informatics, ISCI 2024
container_volume
container_issue
doi_str_mv 10.1109/ISCI62787.2024.10668101
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85204980509&doi=10.1109%2fISCI62787.2024.10668101&partnerID=40&md5=0389cfb35b58e051dbb505eb60e6d302
description The advent of fifth-generation (5G) technology has ushered in a new era of connectivity, promising unprecedented data rates and ultra-reliable low-latency communication. As the demand for high-speed and secure communication continues to surge, there is a critical need for robust communication systems to increase wireless networks' security level. In this context, this paper investigates secure communication techniques, specifically focusing on utilizing the hash function as an authentication mechanism and the presence of polar codes. The integration of polar codes within the communication framework and their effectiveness are examined to enhance error correction capabilities by ensuring the integrity of transmitted data. Furthermore, the transmissions between Alice, Bob, and Eve are evaluated in terms of authentication rate, secrecy rate, and secrecy capacity in determining the effect of the hash function, the presence of channel pre-coding algorithm, and various codeword lengths. This paper also investigates the impact of different codeword values on the overall system performance, shedding light on the advantages of tailoring these parameters to the unique requirements of 5G networks. The results found that the performance of secure communication with the presence of polar codes is better than that of transmission without polar codes. The secrecy rate is reduced to below 10-4 after the transmission reaches 7 dB, Bob's authentication rate remains high, almost reaching 1. © 2024 IEEE.
publisher Institute of Electrical and Electronics Engineers Inc.
issn
language English
format Conference paper
accesstype
record_format scopus
collection Scopus
_version_ 1814778502526795776