29 research outputs found

    Rateless Codes with Progressive Recovery for Layered Multimedia Delivery

    Full text link
    This paper proposes a novel approach, based on unequal error protection, to enhance rateless codes with progressive recovery for layered multimedia delivery. With a parallel encoding structure, the proposed Progressive Rateless codes (PRC) assign unequal redundancy to each layer in accordance with their importance. Each output symbol contains information from all layers, and thus the stream layers can be recovered progressively at the expected received ratios of output symbols. Furthermore, the dependency between layers is naturally considered. The performance of the PRC is evaluated and compared with some related UEP approaches. Results show that our PRC approach provides better recovery performance with lower overhead both theoretically and numerically

    Code-Hopping Based Transmission Scheme for Wireless Physical-Layer Security

    No full text
    Due to the broadcast and time-varying natures of wireless channels, traditional communication systems that provide data encryption at the application layer suffer many challenges such as error diffusion. In this paper, we propose a code-hopping based secrecy transmission scheme that uses dynamic nonsystematic low-density parity-check (LDPC) codes and automatic repeat-request (ARQ) mechanism to jointly encode and encrypt source messages at the physical layer. In this scheme, secret keys at the transmitter and the legitimate receiver are generated dynamically upon the source messages that have been transmitted successfully. During the transmission, each source message is jointly encoded and encrypted by a parity-check matrix, which is dynamically selected from a set of LDPC matrices based on the shared dynamic secret key. As for the eavesdropper (Eve), the uncorrectable decoding errors prevent her from generating the same secret key as the legitimate parties. Thus she cannot select the correct LDPC matrix to recover the source message. We demonstrate that our scheme can be compatible with traditional cryptosystems and enhance the security without sacrificing the error-correction performance. Numerical results show that the bit error rate (BER) of Eve approaches 0.5 as the number of transmitted source messages increases and the security gap of the system is small

    Design and Analysis of Adaptive Message Coding on LDPC Decoder with Faulty Storage

    No full text
    Unreliable message storage severely degrades the performance of LDPC decoders. This paper discusses the impacts of message errors on LDPC decoders and schemes improving the robustness. Firstly, we develop a discrete density evolution analysis for faulty LDPC decoders, which indicates that protecting the sign bits of messages is effective enough for finite-precision LDPC decoders. Secondly, we analyze the effects of quantization precision loss for static sign bit protection and propose an embedded dynamic coding scheme by adaptively employing the least significant bits (LSBs) to protect the sign bits. Thirdly, we give a construction of Hamming product code for the adaptive coding and present low complexity decoding algorithms. Theoretic analysis indicates that the proposed scheme outperforms traditional triple modular redundancy (TMR) scheme in decoding both threshold and residual errors, while Monte Carlo simulations show that the performance loss is less than 0.2 dB when the storage error probability varies from 10-3 to 10-4

    Code-Hopping Based Transmission Scheme for Wireless Physical-Layer Security

    No full text

    Energy-Efficient Route Optimization for Adaptive MPSK-Based Wireless Sensor Networks

    No full text
    We study a certain route configuration problem via optimization theory. We consider the optimal bit error rate (BER) and transmission rate allocations on each hop, subject to overall BER and delay constraints for a designated route. The pivot of the problem lies in the delay constraint, which divides the problem into two cases&#8212;the loose and the tight delay case. In the former, analytical solutions are obtained by applying the Karush-Kuhn-Tucker (KKT) theorem. Specifically, we discover in this case that for a given target BER, the optimum solutions are only related to the hop lengths in the route. When the delay constraint is tight, a mapping can be used to reduce the dimension of the problem by a factor of two; a numerical optimization algorithm has to be used to find the optimum. Simulation results show that by optimally configuring a chosen route, substantial energy savings could be obtained, especially under tight delay constraints. Simulation also reveals that a performance limit is reached as the number of hops increases. A parameter determining this limit is defined, and physical explanations are given accordingly.</p

    Energy-Efficient Route Optimization for Adaptive MPSK-Based Wireless Sensor Networks

    Get PDF
    We study a certain route configuration problem via optimization theory. We consider the optimal bit error rate (BER) and transmission rate allocations on each hop, subject to overall BER and delay constraints for a designated route. The pivot of the problem lies in the delay constraint, which divides the problem into two cases&#8212;the loose and the tight delay case. In the former, analytical solutions are obtained by applying the Karush-Kuhn-Tucker (KKT) theorem. Specifically, we discover in this case that for a given target BER, the optimum solutions are only related to the hop lengths in the route. When the delay constraint is tight, a mapping can be used to reduce the dimension of the problem by a factor of two; a numerical optimization algorithm has to be used to find the optimum. Simulation results show that by optimally configuring a chosen route, substantial energy savings could be obtained, especially under tight delay constraints. Simulation also reveals that a performance limit is reached as the number of hops increases. A parameter determining this limit is defined, and physical explanations are given accordingly
    corecore