Abstract

In the military surveillance and security information systems, correct blind reconstruction of signal parameters from unknown signals is very important. Especially, many blind reconstruction methods of error-correcting codes have been proposed, and their theoretical performance analysis is essential for both the defender who wants to prevent information leakage and the challenger who wants to extract information from the intercepted signals. However, a proper performance analysis of most blind reconstruction methods has not been performed yet. Among many blind reconstruction methods of BCH codes proposed so far, the blind reconstruction method based on consecutive roots of generator polynomials proposed by Jo, Kwon, and Shin, called the JKS method, shows the best performance under the unknown channel information. However, the performance of the JKS method is only evaluated through simulation without performing theoretical analysis. In this paper, the JKS method is asymptotically analyzed under the binary symmetric channel with the cross-over probability $p$ . Since the blind reconstruction performance heavily depends on how many and which received codewords are used even for the same channel environment, sufficiently many codewords are assumed to perform asymptotic analysis. More specifically, an asymptotic threshold on $p$ , up to which blind reconstruction is successful, is derived when the number of received codewords is sufficiently large, which can be used as a new performance metric for blind reconstruction methods. Finally, the validity of the asymptotic analysis is confirmed through simulation.

Highlights

  • In the current digital communication systems, an errorcorrecting code (ECC) is essential to achieve reliable information communication [1]

  • Since the JKS method determines the most frequent starting value of consecutive roots (SVCR) and the most frequent maximum length of consecutive roots (MLCR) from the received codeword polynomials in this order, an asymptotic analysis will be performed by calculating the probability that sref and lref are equal to b and 2t of the generator polynomial, respectively, in this order

  • SIMULATION RESULTS To verify the validity of the asymptotic threshold derived in Section III, the JKS method is performed for various narrow-sense BCH codes

Read more

Summary

INTRODUCTION

In the current digital communication systems, an errorcorrecting code (ECC) is essential to achieve reliable information communication [1]. Since the JKS method determines the most frequent SVCR and the most frequent MLCR from the received codeword polynomials in this order, an asymptotic analysis will be performed by calculating the probability that sref and lref are equal to b and 2t of the generator polynomial, respectively, in this order. ASYMPTOTIC ANALYSIS OF THE JKS METHOD Since a blind reconstruction performance heavily depends on how many and which received codewords are used even for the same channel environment, an asymptotic analysis of the JKS method is performed under the assumption that the number of received codewords is sufficiently large Under this assumption, the reconstruction performance of the JKS method is analyzed to derive the maximum cross-over probability, which is called an asymptotic threshold, up to which the correct generator polynomial is successfully reconstructed. An asymptotic threshold is obtained by deriving an asymptotic threshold in the first majority vote and by deriving an asymptotic threshold in the second majority vote

NOTATIONS
ASYMPTOTIC ANALYSIS FOR THE FIRST MAJORITY VOTE
SIMULATION RESULTS
DISCUSSION AND CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call