Performance Analysis of Secure Communication with the Presence of Polar Codes
The advent of fifth-generation (5G) technology has ushered in a new era of connectivity, promising unprecedented data rates and ultra-reliable low-latency communication. As the demand for high-speed and secure communication continues to surge, there is a critical need for robust communication system...
Published in: | 2024 6th IEEE Symposium on Computers and Informatics, ISCI 2024 |
---|---|
Main Author: | |
Format: | Conference paper |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2024
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85204980509&doi=10.1109%2fISCI62787.2024.10668101&partnerID=40&md5=0389cfb35b58e051dbb505eb60e6d302 |
id |
2-s2.0-85204980509 |
---|---|
spelling |
2-s2.0-85204980509 Suhaimi H.; Mohamad R.; Yussof Y.M.; Yasmin Abdul Rahman F.; Suliman S.I. Performance Analysis of Secure Communication with the Presence of Polar Codes 2024 2024 6th IEEE Symposium on Computers and Informatics, ISCI 2024 10.1109/ISCI62787.2024.10668101 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85204980509&doi=10.1109%2fISCI62787.2024.10668101&partnerID=40&md5=0389cfb35b58e051dbb505eb60e6d302 The advent of fifth-generation (5G) technology has ushered in a new era of connectivity, promising unprecedented data rates and ultra-reliable low-latency communication. As the demand for high-speed and secure communication continues to surge, there is a critical need for robust communication systems to increase wireless networks' security level. In this context, this paper investigates secure communication techniques, specifically focusing on utilizing the hash function as an authentication mechanism and the presence of polar codes. The integration of polar codes within the communication framework and their effectiveness are examined to enhance error correction capabilities by ensuring the integrity of transmitted data. Furthermore, the transmissions between Alice, Bob, and Eve are evaluated in terms of authentication rate, secrecy rate, and secrecy capacity in determining the effect of the hash function, the presence of channel pre-coding algorithm, and various codeword lengths. This paper also investigates the impact of different codeword values on the overall system performance, shedding light on the advantages of tailoring these parameters to the unique requirements of 5G networks. The results found that the performance of secure communication with the presence of polar codes is better than that of transmission without polar codes. The secrecy rate is reduced to below 10-4 after the transmission reaches 7 dB, Bob's authentication rate remains high, almost reaching 1. © 2024 IEEE. Institute of Electrical and Electronics Engineers Inc. English Conference paper |
author |
Suhaimi H.; Mohamad R.; Yussof Y.M.; Yasmin Abdul Rahman F.; Suliman S.I. |
spellingShingle |
Suhaimi H.; Mohamad R.; Yussof Y.M.; Yasmin Abdul Rahman F.; Suliman S.I. Performance Analysis of Secure Communication with the Presence of Polar Codes |
author_facet |
Suhaimi H.; Mohamad R.; Yussof Y.M.; Yasmin Abdul Rahman F.; Suliman S.I. |
author_sort |
Suhaimi H.; Mohamad R.; Yussof Y.M.; Yasmin Abdul Rahman F.; Suliman S.I. |
title |
Performance Analysis of Secure Communication with the Presence of Polar Codes |
title_short |
Performance Analysis of Secure Communication with the Presence of Polar Codes |
title_full |
Performance Analysis of Secure Communication with the Presence of Polar Codes |
title_fullStr |
Performance Analysis of Secure Communication with the Presence of Polar Codes |
title_full_unstemmed |
Performance Analysis of Secure Communication with the Presence of Polar Codes |
title_sort |
Performance Analysis of Secure Communication with the Presence of Polar Codes |
publishDate |
2024 |
container_title |
2024 6th IEEE Symposium on Computers and Informatics, ISCI 2024 |
container_volume |
|
container_issue |
|
doi_str_mv |
10.1109/ISCI62787.2024.10668101 |
url |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85204980509&doi=10.1109%2fISCI62787.2024.10668101&partnerID=40&md5=0389cfb35b58e051dbb505eb60e6d302 |
description |
The advent of fifth-generation (5G) technology has ushered in a new era of connectivity, promising unprecedented data rates and ultra-reliable low-latency communication. As the demand for high-speed and secure communication continues to surge, there is a critical need for robust communication systems to increase wireless networks' security level. In this context, this paper investigates secure communication techniques, specifically focusing on utilizing the hash function as an authentication mechanism and the presence of polar codes. The integration of polar codes within the communication framework and their effectiveness are examined to enhance error correction capabilities by ensuring the integrity of transmitted data. Furthermore, the transmissions between Alice, Bob, and Eve are evaluated in terms of authentication rate, secrecy rate, and secrecy capacity in determining the effect of the hash function, the presence of channel pre-coding algorithm, and various codeword lengths. This paper also investigates the impact of different codeword values on the overall system performance, shedding light on the advantages of tailoring these parameters to the unique requirements of 5G networks. The results found that the performance of secure communication with the presence of polar codes is better than that of transmission without polar codes. The secrecy rate is reduced to below 10-4 after the transmission reaches 7 dB, Bob's authentication rate remains high, almost reaching 1. © 2024 IEEE. |
publisher |
Institute of Electrical and Electronics Engineers Inc. |
issn |
|
language |
English |
format |
Conference paper |
accesstype |
|
record_format |
scopus |
collection |
Scopus |
_version_ |
1814778502526795776 |