Abstract
Channel coding technology plays an important role in wireless communication systems, and it serves as a crucial mechanism to reduce interference during the transmission process. As the fifth-generation (5G) and sixth-generation (6G) wireless communication systems rapidly advance, requirements of the users on the quality and security of wireless service are increasing. To solve these problems, it calls for us to explore the new channel coding technologies. In this paper, a linear feedback coding scheme for fading multiple-access channels with degraded message sets (FMAC-DMS) is proposed. In this scheme, the transmitting beamforming and channel splitting are used to transform the channel with complex signals into scalar equivalent sub-channels. Then, the extended Schalkwijk-Kailath coding scheme (SK) is further applied to each sub-channel. The channel capacity, finite blocklength (FBL) sum-rate and FBL secrecy achievable sum-rate of the FMAC-DMS in single-input single-output (SISO) and multi-input single-output (MISO) cases are derived. Finally, we show that the proposed scheme not only provides a FBL coding solution but also guarantees physical layer security(PLS). The numerical and simulation results show the effectiveness of the proposed scheme as a channel coding solution. The study of this paper provides a new method to construct a practical FBL scheme for the FMAC-DMS.
1 Introduction
The fastest-growing field in the telecommunications industry is wireless communication systems, with 5G currently in the early stages of commercial deployment worldwide. However, researchers need to develop new enabling technologies to overcome existing technical barriers. Channel coding, as one of the fundamental techniques in wireless communication systems, plays a crucial role in error detection and correction. It is the primary method to combat noise interference and improve signal quality during transmission. To meet the growing demands for high reliability and low latency, exploring new channel coding schemes is necessary.
Multiple-access fading channel (FMAC) is a typical channel model in wireless communication, and researchers [1–5] have studied linear feedback coding schemes for FMAC from an information theory perspective. Among them, [1–3] have extended the classical Schalkwijk-Kailath (SK) coding scheme [6] to wireless intelligent reflecting surfaces, single-input multi-output (SIMO) Rayleigh channels, and two-way full-duplex fading channels, respectively. These proposed schemes have been shown to possess self-secrecy when the code length exceeds a certain threshold, significantly enhancing the confidentiality of the target communication system and ensuring physical layer security (PLS). In [4], a linear coding scheme for fading broadcast channels with additive Gaussian white noise (AWGN) was proposed, which achieves rates close to the posterior matching scheme derived in [4] by choosing specific parameters.
With the deepening research on channel coding, many researchers have turned their attention to the field of PLS. [7, 8] have indicated that feedback signals can generate a secret key and encrypt the transmitted messages during the transmission process, thereby enhancing the secrecy capacity of discrete memoryless wiretap channels to the same channel capacity as the unconstrained secrecy case. However, these key-based feedback schemes are constructed based on Shannon’s classical random coding theory [9] and are not practical or implementable in real communication systems. Therefore, there is a need for research on finite blocklength (FBL) coding schemes. [9] proved that the classical SK feedback coding scheme [6] is an excellent FBL coding scheme for point-to-point Gaussian white noise channels. This paper, based on the demands for high reliability, low latency, and data protection in communication, takes an information-theoretic approach and combines the favorable properties of SK coding to design a linear feedback coding scheme for single-input single-output fading multiple-access channels with degraded message sets (SISO-FMAC-DMS), satisfying the requirements of PLS. The following questions are the focus of this study:
Can the classical SK coding scheme be extended to SISO-FMAC-DMS, considering its own favorable properties?
Can the proposed scheme be extended to multi-input single-output fading multiple-access channels with degraded message sets (MISO-FMAC-DMS)?
Can the proposed scheme ensure physical layer security (PLS) in the presence of eavesdroppers?
In this paper, we first present the main idea of the layered SK scheme and apply it to FMAC-DMS in both single-input single-output (SISO) and multi-input single-output antenna systems (MISO). The channel capacities and FBL achievable rate expressions for both scenarios are derived. The FBL achievable secure rate expressions are also analyzed in the presence of eavesdroppers. Finally, data simulations are performed, and compared to classical LDPC codes, Turbo codes, and LDGM codes, the proposed layered SK coding scheme significantly reduces the blocklength. Further analysis of the characteristics of this scheme is conducted.
This paper is organized as follows. In Section 2, we briefly review the related works. Formal definition of the SISO-FMAC-DMS and MISO-FMAC-DMS models studied in this paper and previous results is introduced in Section 3. Our proposed coding schemes for SISO-FMAC-DMS and MISO-FMAC-DMS are shown in Section 4. Section 5 shows that our proposed scheme for the MISO-FMAC-DMS is also a secure FBL scheme when the coding blocklength is lager than a certain threshold. Simulation results and numerical examples are given in Section 6. Section 7 summary of all results in this paper and discusses future work.
2 Discussion
As early as 1966, Schalkwijk and Kailath [6] proposed a capacity-achieving coding scheme for point-to-point channels with AWGN, known as the SK coding scheme. The SK coding scheme [6] is an excellent constructive coding scheme for the white Gaussian channel, and it has extremely low complexity in encoding and decoding. Furthermore, the decoding error probability of SK scheme doubly exponentially decays as the coding code length increases, which indicates that the SK scheme [6] necessitates an extremely short coding code length to achieve a target decoding error probability. Then, Ozarow [10] extended the SK coding [6] to the multiple access channel (MAC) with AWGN, it showed that the feedback can increase the achievable rate region of the MAC, and this coding scheme is also capacity-achieving for the MAC with feedback. In [11], the SK-type scheme proposed in [10] was further extended to L-user (L ≥ 3) Gaussian MAC with noiseless feedback, and the sum-rate capacity was determined for some specific cases. Recently, [1] has extended the classical SK scheme [6] to intelligent reflecting surfaces in the presence of an eavesdropper, and it was shown that the proposed scheme is self-secure when the code length exceeds a certain threshold. Reference [2] extended the classical SK scheme [6] to both SIMO Rayleigh channels and wire-tap channels, and it demonstrated that the extended scheme is self-secure capacity-achieving. In [3], the classical SK scheme [6] was extended to two-way full-duplex Gaussian channels, and further prove that the proposed scheme is self-secure. A self-secure capacity-achieving feedback scheme for the Gaussian MAC with degraded message sets (DMS) is proposed in [12], which is an extended version of the classical SK scheme [6]. Furthermore, a summary of all works in the linear feedback coding scheme can be found in Table 1.
Table 1. Summarizing all works in the linear feedback coding scheme.
Though the SK-type coding scheme is well investigated in various channel models, however, SK-type FBL scheme for the FMAC with DMS remains unknown. In this paper, we focus on the SISO-FMAC-DMS and MISO-FMAC-DMS models and study how to design the SK-type FBL schemes for these models. Additionally, we also investigated whether these proposed schemes can achieve perfect secrecy by themselves.
3 Model formulation
For convenience, Table 2 summarizes the key notations introduced in this paper.
Table 2. Key notations.
| Symbols | Definitions |
|---|---|
| N | Codeword blocklength |
| ε | Decoding error probability |
| Gaussian distribution with mean 0 and variance σ2 | |
| Circularly symmetric complex Gaussian distribution with mean 0 and variance σ2 | |
| A complex matrix of size M × N | |
| U(a, b) | A uniform distribution on the interval [a, b] |
| || ⋅ || | The 2-norm of a vector |
| | ⋅ | | The cardinality of a finite set |
| The conjugate of the complex-valued X | |
| I N | The identity matrix of size N × N |
| E[⋅] and Var[⋅] | The expected value and variance of a random variable, respectively |
| The conjugate transpose of X | |
| The value of the right tail function of the standard normal distribution at x | |
| The inverse function of the | |
| Rsum(N, ε) | Achievable sum rate of the SISO-FMAC-DMS |
| The maximum sum-rate of the SISO-FMAC-DMS | |
| Rsum−miso(N, ε) | Achievable sum rate of the MISO-FMAC-DMS |
| The maximum sum-rate of the MISO-FMAC-DMS | |
| Wa and Wb | Transmitted messages |
| Pa, Pb and P⋆ | Power constraints |
| ha, hb, ga and gb | Channel gains |
| Pa and Pb | Power constraints |
| εn and | Estimation errors of messages |
| Δ | Normalized equivocation of the eavesdropper characterizes the secrecy level |
| δ | Secrecy level |
| (Xa,n, Xb,n) and Yn | The channel outputs and the channel input, respectively |
| ρ | Correlation coefficient of Xa,n and Xb,n |
Assumptions:(1) In low-latency communication systems, the transmission time of data packets is much shorter compared to the time scale of fading variations. Therefore, such communication channels are often considered as quasi-static fading. Hence, we assume that the forward link and its feedback link are static fading channels, where the channel coefficients remain constant during the transmission process, and both the receiver and the transmitters perfectly know the channel state information (CSI).
(2) From similar argument in [13], we assume that the external eavesdropper is an active user but is untrusted by the legitimate receiver, which indicates that the perfect CSI of eavesdropper’s channel is known by the eavesdropper and the transceiver. In addition, we assume that the eavesdropper also knows the perfect CSI of the legitimate receiver’s channel.
The model formulation for the SISO-FMAC-DMS is given in Subsection 3.1, see details below.
3.1 Model formulation of the SISO-FMAC-DMS
For the SISO-FMAC-DMS (see Fig 1), the n-th (n = 1, 2, …, N) channel inputs and output relationship is given by
| (1) |
here note that , , , and .
Fig 1. The model of SISO-FMAC-DMS.
Definition 1. Xa,n and Xb,n are the outputs of the channel encoders subject to the average power constraints
| (2) |
The messages Wa and Wb are uniformly distributed on finite sets and , respectively. The legitimate receiver generates an estimation and , where ψa and ψb are the legitimate receiver’s decoding function.
Definition 2. The average decoding error probability equals
| (3) |
Definition 3. The (N, ε)-rate pair (Ra(N, ε), Rb(N, ε)) is achievable if for given blocklength N and decoding error probability ε, there exists a -code satisfying Definition 1 such that
| (4) |
For the SISO-FMAC-DMS, the achievable sum rate is denoted by
| (5) |
and the maximal sum-rate, denoted as , corresponds to the maximum sum-rate Rsum(N, ε) defined in (5). Then, the model formulation for the MISO-FMAC-DMS is given in Subsection 3.2, see details below.
3.2 Model formulation of the MISO-FMAC-DMS
For the MISO-FMAC-DMS (see Fig 2), the transmitter is equipped with A and B antennas, respectively, while the receiver is equipped with a single antenna. The channel fading coefficients are represented by and . At time n (n ∈ {1, 2, …, N}), the channel inputs and output relationship is given by
| (6) |
here note that , , , and .
Fig 2. The model of MISO-FMAC-DMS.
Definition 4. Xa,n and Xb,n are the outputs of the channel encoders subject to the average power constraint
| (7) |
The messages Wa and Wb are uniformly distributed on finite sets and , respectively. The legitimate receiver generates an estimation and , where ψa and ψb are the legitimate receiver’s decoding function.
Definition 5. The average decoding error probability is the same that of the Definition 2.
Definition 6. The (N, ε)-rate pair (Ra−miso(N, ε), Rb−miso(N, ε)) is achievable if for given blocklength N and decoding error probability ε there exists a -code satisfying Definition 4 such that
| (8) |
For the MISO-FMAC-DMS, the achievable sum rate is denoted by
| (9) |
and the maximal sum-rate, denoted as , corresponds to the maximum sum-rate Rsum−miso(N, ε) defined in (9).
4 SK feedback scheme for the FMAC-DMS
The SK feedback coding schemes for the SISO-FMAC-DMS is given in Subection 4.1, see details below.
4.1 Main results of the SISO-FMAC-DMS
Theorem 1. For given decoding error probability ε and codeword length N, the maximal sum-rate of the SISO-FMAC-DMS is lower bounded by
| (10) |
where
| (11) |
here note that
| (12) |
and a and b are the magnitudes of ha and hb, respectively.
Proof:
Let
| (13) |
where a and b represent the magnitudes of ha and hb, respectively.
The power constraints of and are given by
| (14) |
which indicates that the power constraints of and are equivalent to those of the Xa,n and Xb,n, respectively. Therefore, the input-output relationship of the channel can be described as follows
| (15) |
By channel splitting, (15) is equivalent to
| (16) |
where XaR,n and XaI,n are the real part and imaginary part of , respectively, and the other items are analogous. Here let .
Brief introduction about the proposed two-step SK coding scheme: Fig 3 plot the equivalent channel of two-step SK encoding. The two encoders encode the common message Wa and private message Wb, respectively. Encoder 1 encodes the message Wa and feedback YN−1 into with power Pa. Encoder 2 encodes the message Wa and feedback YN−1 into UN with power ρ2Pb, and encodes the message Wb and feedback YN−1 into VN with power (1 − ρ2)Pb, where 0 ≤ ρ ≤ 1. The receiver decodes UN and first, and then subtracts them from the received message to further decode VN. Therefore, when Encoder 2 encodes Wb, the influence of message Wa can be completely eliminated. This indicates that for message Wb, the encoding equivalent channel is single-input single-output with AWGN noise. As for the encoding process for message Wa, the input to the encoding equivalent channel is , and the noise of the channel is non-Gaussian white noise ηN + bVN.
Fig 3. The steps of the SISO-FMAC-DMS two-step coding scheme.
Since the expressions of the two sub-channels are similar, analyzing one of them is sufficient. Doubling the achievable sum rate obtained from the analysis will give the achievable rate of the original channel. The following is an introduction to the encoding and decoding process for the real part of the subchannel. The expression for the output of the real part subchannel at time n(n ∈ {1, 2, …, N}) is as follows
| (17) |
Define
| (18) |
The expression for the real part sub-channel at time n is , where P* is given by
| (19) |
where , and is given by
| (20) |
and , , the relationship between UR,n and XaR,n is given by
| (21) |
Message mapping: Dividing Wa into two parts (WaR, WaI), where WaR and WaI take values in and , respectively. Then divide the interval [-0.5,0.5] into 2NRaR(N, ε) equally spaced sub-intervals, and the center of each sub-interval is mapped to a message value in . Let θ1 be the center of the sub-interval with respect to the message WaR. Since WaR is equi-probably distributed over the set , θ1 is approximately uniformly distributed over the interval [−0.5, 0.5] and its variance approximately equals , i.e. . Wb, WbR and θ2 are similar to Wa, WaR and θ1, respectively, hence we omit them here.
At time 1, the encoder 1 transmits
| (22) |
the encoder 2 transmits
| (23) |
and
| (24) |
The receiver receives , and obtains an estimation of θ2 by computing
| (25) |
where , and .
At time 2, the encoder 1 transmits XaR,2, encoder 2 transmits
| (26) |
is given by
| (27) |
the receiver obtains , and gets an estimation of θ1 by computing
| (28) |
where and .
At time n (3 ≤ n ≤ N), the transmitter 1 transmits XaR,n and , is given by
| (29) |
and transmitter 2 transmits
| (30) |
The receiver obtains , and gets the estimation of θ1,n and θ2,n by computing
| (31) |
where
| (32) |
Lemma 1: For given decoding error probability ε and codeword length N, if the transmission rates Ra(N, ε) and Rb(N, ε) satisfy
| (33) |
the decoding error probability satisfy Pe ≤ ε.
Proof: See S1 Appendix.
Finally, from (33), the achievable sum rate Rsum(N, ε) given in (11) is obtained. The details about SK feedback coding scheme for the MISO-FMAC-DMS are given in Subection 4.2.
4.2 Main results of MISO-FMAC-DMS
Theorem 2. For given decoding error probability ε and codeword length N, the maximal sum-rate of the MISO-FMAC-DMS is lower bounded by
| (34) |
where
| (35) |
and
| (36) |
and ρ is given in Theorem 1.
Proof:
Transmit beamforming strategy for the feedforward channel: In (6), letting
| (37) |
here note that , , , .
Therefore, the input-output relationship of the channel can be described as
| (38) |
By channel splitting, we have
| (39) |
and the power constraints are given below, .
Define
| (40) |
The expression for the real part sub-channel at time n is , where is given by
| (41) |
where , , and is given by
| (42) |
and , , the relationship between UR,n and XaR,n is given by
| (43) |
The encoding-decoding procedure of our proposed SK-type scheme for the MISO-FMAC-DMS of Fig 4 is described.
Fig 4. Procedure of our proposed SK-type scheme for the MISO-FMAC-DMS.
Along the lines of the encoding-decoding procedure in Section 4.1, we conclude that the transmission rates RaR−miso(N, ε) and RbR−miso(N, ε) can be expressed as
| (44) |
Therefore, the sum rate Rsum−miso(N, ε) given in (35) is obtained, and we complete the proof.
5 A secure FBL SK-type coding scheme for the MISO-FMAC-DMS with an external eavesdropper
The model formulation for MISO-FMAC-DMS with an external eavesdropper is given in Subsection 5.1, see details below.
5.1 Model formulation for MISO-FMAC-DMS with an external eavesdropper
The information-theoretic schematic diagram for the MISO-FMAC-DMS with an external eavesdropper is almost the same as that in Subsection 3.2 (see Fig 5), except that the existence of an eavesdropper equipped with C (C ≥ 1) antennas, the channel gains of eavesdropping channels for Transmitter 1 and Transmitter 2 are denoted by , , respectively, and they are mutually independent of each other and stay constants during the transmission.
Fig 5. The MISO-FMAC-DMS with an external eavesdropper.
At time n-th (n ∈ {1, 2, …, N}), the signal received by the eavesdropper is given by
| (45) |
where .
Definiton 7. By using the secrecy criteria defined in [14, 15], in this paper, a normalized equivocation of the eavesdropper characterizes the secrecy level and it is given by
| (46) |
where h = (ha, hb), g = (ga, gb).
The rate pair (Ra−miso(N, ε, δ), Rb−miso(N, ε, δ)) is said to be achievable with δ-secrecy, if for given blocklength N, decoding error probability ε there exists a (N, |Wa|, |Wb|, Pa, Pb)-code described in Definition 4 such that
| (47) |
Here note that 0 ≤ δ ≤ 1 is the required secrecy level. δ = 1 corresponds to perfect secrecy. For given N, ε and δ, a (N, |Wa|, |Wb|, Pa, Pb)-code defined in Definition 4 is said to be secure if (47) is satisfied, and the achievable secrecy sum rate is denoted by
| (48) |
Then, we show that our proposed scheme for the MISO-FMAC-DMS is also a secure FBL scheme when the coding blocklength is lager than a certain threshold in Subsection 5.2.
5.2 A secure FBL SK-type coding scheme for the MISO-FMAC-DMS with an external eavesdropper
Theorem 3. For given decoding error probability ε and secrecy level δ, if the blocklength N satisfies
| (49) |
an achievable secrecy sum rate Rsum−miso(N, ε, δ) of the MISO-FMAC-DMS with an external eavesdropper is given by
| (50) |
where
| (51) |
Proof:
At time n-th (n ∈ {1, 2, …, N}), the signal received by the eavesdropper can be rewritten as
| (52) |
To calculate the equivocation , we bound H(Wa, Wb|ZN, h, g) first, which is given by
| (53) |
Next, the term H(Wa|Wb, ZN, h, g) can be further bounded by
| (54) |
where (a) follows from conditioning reduce entropy, (b) is due to the fact that ZN can be concretely expressed as
| (55) |
when n = 2, 3, …, N, Xa,N is a function of (η2, η3, …, ηN−1), and VN is a function of (η1, η2, …, ηN−1), (c) follows from are independent of (Wa, Xa,2, ζ2), (d) follows from Xa,2 and U2 is a function of Wa, and Wa is independent of ζ1), (e) follows from
| (56) |
Analogously, the term H(Wb ∣ Wa, ZN, h, g) can be bounded by
| (57) |
Substituting (54) and (57) into Δ, we conclude that
| (58) |
where (f) follows from H(Wa, Wb) = H(Wa) + H(Wb) and , (g) is due to H(Wa) + H(Wb) = N(Ra−miso(N, ε, δ) + Rb−miso(N, ε, δ)) = NRsum−miso(N, ε, δ), (h) is follows from Rsum−miso(N, ε, δ) = Rsum−miso(N, ε). From (58), we conclude that Δ ≥ δ is guaranteed if
| (59) |
which can be rewritten as
| (60) |
and the proof is completed.
6 Simulation results
Here note that all simulation results are based on an average of 1000 independent channel realizations. Also, Table 3 provides a summary of the parameters used in the simulation.
Table 3. Parameters in simulation.
| Notations | Values |
|---|---|
| ρ | 0.5 |
| ha, hb, ga and gb | i.i.d. as |
| A, B and C | 6 |
| PA and PB | 10 |
| σ 2 | 20 |
| ε | 10−6 |
| 20 |
Figs 6 and 7 show the results of the comparison between the SNR, blocklength and decoding error probability of the LDPC code [15], Turbo code [16], LDGM code [17] and the proposed linear feedback coding scheme for the FMAC-DMS channel. From Figs 6 and 7, we see that the required coding blocklength and SNR for achieving the desired decoding error probability are significantly lower than the LDPC, Turbo, and LDGM codes. This significant reduction is attributed to the doubly exponential decay of the decoding error probability in our scheme as the coding blocklength increases, and error probabilities of other coding schemes only single-exponentially decay to zero as the blocklength length increases, which indicates that our proposed linear feedback coding scheme is a high-reliability and low-latency coding scheme.
Fig 6. Comparison of the SNR and decoding error probability of the LDPC code, Turbo code, LDGM code and the proposed linear feedback coding scheme for the FMAC-DMS.
Fig 7. Comparison of the blocklength and decoding error probability of the LDPC code, Turbo code, LDGM code and the proposed linear feedback coding scheme for the FMAC-DMS.
Fig 8 plots the relationship between the sum rate, number of transmitting antenna and power constraint of the feedback channels for the MISO-FMAC-DMS, and let blocklength N = 30. From Fig 8, we conclude that the sum rate is increasing while the number of transmitting antenna and power constraint of the feedback channel are increasing.
Fig 8. The relationship between the sum rate, number of transmitting antenna A = B and power constraint PA = PB = P for the MISO-FMAC-DMS.
Fig 9 plots the relationship between the FBL sum rate, decoding error probability and blocklength for the MISO-FMAC-DMS. From Fig 9, we conclude that the sum rate is increasing while the blocklength is increasing, and the blocklength reaches a threshold, reducing the bit error rate has little effect to the FBL sum rate. Furthermore, the required blocklength for achieving the desired decoding error probability is significantly short. The reason is that the decoding error probability of our scheme doubly exponentially decays as the coding blocklength increases.
Fig 9. The relationship between the FBL sum rate, decoding error probability and blocklength for the MISO-FMAC-DMS.
Fig 10 plots the relationship between the sum rate, decoding error probability and power constraint for the MISO-FMAC-DMS. Note that the power constraint PA = PB = P, blocklength N = 20. Furthermore, the LDPC code [15] in Fig 10 based on the secret key scheme [7, 8] (message encrypted by the key). Fig 10 shows that the sum rate is increasing while power constraint and decoding error probability are increasing. Additionally, when the decoding error probability is the same, the sum rate of our scheme is higher than that of LDPC code [15] based on the secret key scheme [7, 8]. This is because the feedback can enlarge the capacity region of the MAC.
Fig 10. The relationship between the sum rate, decoding error probability and power constraint for the MISO-FMAC-DMS.
Fig 11 shows that when the blocklength is greater than a threshold 129, the achievable secrecy sum rate Rsum−miso(N, ε, δ) approaches the corresponding achieveable sum rate Rsum−miso(N, ε) for the MISO-FMAC-DMS, which indicates that the proposed scheme is secure when the blocklength is larger than certain threshold. Here note that the secrecy level equal to 1 corresponds to perfect secrecy.
Fig 11. The sum rate and secrecy sum rate when the blocklength is larger than a threshold for the MISO-FMAC-DMS and external eavesdropper.
Fig 12 plots the relationship between the blocklength threshold satisfying secrecy constraint, the decoding error probability, and the secrecy level for the MISO-FMAC-DMS and external eavesdropper. From Fig 12, according to the simulation results, it can be seen that if the decoding error probability is smaller or the blocklength is bigger, the more stringent security requirements can be met. Furthermore, the secrecy level increases as the decoding error probability and code blocklength increase, this observation aligns with the theoretical analysis. For example, when the decoding error probability ϵ = 10−7 and the secrecy level δ = 0.99, the blocklength threshold satisfying secrecy constraint is about 400.
Fig 12. The relationship between the blocklength threshold satisfying secrecy constraint, the decoding error probability, and the secrecy level for the MISO-FMAC-DMS and external eavesdropper.
7 Conclusion and future work
This paper focuses on channel coding from an information theory perspective, addressing the demands for high reliability, low latency, and data transmission security in FMAC-DMS. A linear feedback coding scheme for FMAC-DMS is designed, incorporating the beamforming strategy, channel splitting method, and layered SK coding scheme. The proposed scheme is extended to SISO-FMAC-DMS and MISO-FMAC-DMS. This coding scheme not only provides a FBL coding solution but also guarantees PLS. The subsequent data simulation results demonstrate the effectiveness of the proposed scheme as a channel coding solution, and it ensures PLS when there is an eavesdropper, especially for sufficiently long code lengths. In future work, the application of the proposed scheme to FMAC-DMS with non-causal channel state information (NCSI) at the transmitter can be considered, along with the investigation of FBL achievability and rates, channel capacity, and security capacity in such a system.
Supporting information
(PDF)
Data Availability
All relevant data are within the paper.
Funding Statement
The authors received no specific funding for this work.
References
- 1. Xie G., Yang C., Feng Y. and Dai B., “Secure Finite Blocklength Coding Schemes for Reconfigurable Intelligent Surface Aided Wireless Channels With Feedback,” IEEE Transactions on Communications, vol. 75, no. 5, pp. 2931–2946, May. 2023. doi: 10.1109/TCOMM.2023.3256418 [DOI] [Google Scholar]
- 2.S. Yin and B. Dai, “Self-Secure Capacity-Achieving Feedback Scheme for SIMO Rayleigh Channel,” 2022 IEEE 8th International Conference on Computer and Communications (ICCC), Chengdu, China, 2022, pp. 79–83.
- 3.D. Xia, C. Yang and B. Dai, “A Finite Blocklength Coding Scheme for the Two-Way Full-duplex Fading Channel,” 2022 IEEE/CIC International Conference on Communications in China (ICCC Workshops), Sanshui, Foshan, China, 2022, pp. 1–6.
- 4.S. Li, D. Tuninetti and N. Devroye, “A Control-Theoretic Linear Coding Scheme for the Fading Gaussian Broadcast Channel with Feedback,” 2021 IEEE International Symposium on Information Theory (ISIT), Melbourne, Australia, 2021, pp. 1–6.
- 5.S. Li, D. Tuninetti and N. Devroye, “The Fading Gaussian Broadcast Channel with Channel State Information and Output Feedback,” 2020 IEEE International Symposium on Information Theory (ISIT), Los Angeles, CA, USA, 2020, pp. 1474–1479.
- 6. Schalkwijk J. and Kailath T., “A coding scheme for additive noise channels with feedback–I: No bandwidth constraint,” IEEE Transactions on Information Theory, vol. 12, no. 2, pp. 172–182, 1966. doi: 10.1109/TIT.1966.1053880 [DOI] [Google Scholar]
- 7. Ahlswede R. and Cai N., “Transmission, identification and common randomness capacities for wire-tap channels with secure feedback from the decoder,” Gen. Theory Inf. Trans. Comb., pp. 258–275, 2006. [Google Scholar]
- 8. Schaefer R. F., Khisti A. and Poor H. V., “Secure Broadcasting Using Independent Secret Keys,” IEEE Transactions on Communications, vol. 66, no. 2, pp. 644–661, Feb. 2018. doi: 10.1109/TCOMM.2017.2764892 [DOI] [Google Scholar]
- 9. Cover T. M. and Thomas J. A., Elements of Information Theory, New York: Wiley, 1991. [Google Scholar]
- 10. Ozarow L., “The capacity of the white Gaussian multiple access channel with feedback,” IEEE Transactions on Information Theory, vol. 30, no. 4, pp. 623–629, July 1984. doi: 10.1109/TIT.1984.1056935 [DOI] [Google Scholar]
- 11. Kramer G., “Feedback strategies for white Gaussian interference networks,” IEEE Transactions on Information Theory, vol. 48, no. 6, pp. 1423–1438, June 2002. doi: 10.1109/TIT.2002.1003831 [DOI] [Google Scholar]
- 12. Dai B., Li C., Liang Y., Ma Z. and Shamai S., “Self-Secure Capacity-Achieving Feedback Schemes of Gaussian Multiple-Access Wiretap Channels With Degraded Message Sets,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 1583–1596, 2022. doi: 10.1109/TIFS.2022.3164196 [DOI] [Google Scholar]
- 13. Mukherjee A., Fakoorian S. A. A., Huang J. and Swindlehurst A. L., “Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey,” IEEE Communications Surveys & Tutorials, vol. 16, no. 3, pp. 1550–1573, Third Quarter 2014. doi: 10.1109/SURV.2014.012314.00178 [DOI] [Google Scholar]
- 14.E. Tekin and A. Yener, “The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints,” 2006 IEEE International Symposium on Information Theory, Seattle, WA, USA, 2006, pp. 1164–1168.
- 15.Y. Li, L. Wang and Y. Sun, “The Design of Network Low Density Parity Check Codes for Wireless Multiple-Access Relay Networks,” 2011 IEEE International Conference on Advanced Information Networking and Applications, Biopolis, Singapore, 2011, pp. 653–658.
- 16.J. Del Ser, P. M. Crespo, B. H. Khalaj and J. Gutierrez-Gutuirrez, “On Combining Distributed Joint Source-Channel-Network Coding and Turbo Equalization in Multiple Access Relay Networks,” Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007), White Plains, NY, USA, 2007, pp. 18–18.
- 17.W. Zhong and J. Garcia-Frias, “Parallel LDGM Codes for the Transmission of Highly Correlated Senders over Rayleigh Fading Multiple Access Channels,” 2006 40th Annual Conference on Information Sciences and Systems, Princeton, NJ, USA, 2006, pp. 1230–1235.












