Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
net/publication/286595013
Blind detection approach for LDPC, convolutional, and turbo codes in non-noisy
environment
CITATION READS
1 7
4 authors, including:
8 PUBLICATIONS 30 CITATIONS
The University of Western Ontario
363 PUBLICATIONS 4,772 CITATIONS
SEE PROFILE
SEE PROFILE
Jean-Yves Chouinard
Laval University
227 PUBLICATIONS 1,388 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Ahmed Refaey on 07 March 2019.
Abstract—In a non-cooperative context such as military or II. I DENTIFICATION OF LDPC CODE PARAMETERS
spectrum surveillance application, a passive adversary has to
solve the problem of estimating the transmitter parameters. LDPC codes can be described either using matrices or
In addition, wireless systems cause signaling overhead since graphical representations. Herein, the proposed technique uti-
their transmitter must inform the receiver about the chosen lize the matrix representation. Given the generator matrix G
bit allocation table or the Forward Error Correction (FEC) that can be written as [P |I] , the encoder can be designed
scheme. In this work, a perception of a smart receiver able
using NOR gates. Each user bit sequence x = (x0 , x1 , ..., xm )
to blindly estimate a specific transmission context based on an
intercepted stream is proposed. In particular, a new technique is encoded to a codeword y = (y0 , y1 , ..., yn ). Based on the
addressing the blind recognition of low-density parity-check dimensions of H, there will be k parity-check constraints for
(LDPC), convolutional, and turbo codes’ encoding parameters at a length n codeword. However, if H is not full rank, implying
the receiver is introduced. The proposed blind detection for the that some of the parity-check equations are linearly dependent,
FEC code technique considers a new iterative method based on
the generator matrix can use only the independent parity-
Gauss-Jordan elimination through a pivoting algorithm devoted
to the blind estimation of these codes encoding parameters in a check equations. In that case, there can be fewer parity-check
non-noisy context. bits than the number of parity-check constraints. Without loss
of generality, this work considers this encoding approach.
However, although this is a possible encoding approach, the
I. I NTRODUCTION encoding complexity is high considering that the density of
"l"s in the P matrix can be very high.
A smart and independent receiver that can operate based on Principle of LDPC Codes Identification
less information from the transmitter will add more security to
the established wireless connection. Furthermore, the problem Herein, the approach introduced in [4] is modified to esti-
of blind detection of a channel coding scheme is important mate the data block length as well as the code rate for LDPC
for reducing the signaling overhead. However, there are not codes. The previous approach was based on showing that the
many researches addressing this problem. Nevertheless, search normalized rank of a blind constructed matrix contains the
algorithms has been introduced for the detection of binary codewords which decreases when the size of the intercepted
linear codes by Valembois in [1]. Likewise, Rice in [2] intro- block length is a multiple of the interleaver period. In this
duced the first approach to identify a convolutional encoder. work, assuming that there is no interleaver, the block length
However, this work was limited to rate 1/n convolutional can be estimated instead of the interleaver size.
codes. Among all the available methods to blindly recover FEC Modified approach description:
at the receiver side, only few researchers were concerned about 1) Noise-free channel.
the blind identification for the FEC in a noisy environment. For 2) Dividing the received stream into analysis blocks of
example, Dingel and Hagenauer in [3] considered the problem (nreceived ) variable size.
of estimating the parameters of a convolutional encoder when 3) Building up a matrix (Hestimated ) containing the code-
the encoded bits are received with errors. words, where, its rows are of the same value as
In this work, a generalized detection method to identify (nreceived ), (see Figure 1).
the LDPC, convolutional, and turbo code schemes parameters 4) α is defined as:
is introduced. First, based on the Gauss-Jordan elimination
rank(Hestimated )
through pivoting algorithm, an extended approach to find α= (1)
almost dependent columns of reconstructed matrix from the nreceived
intercepted sequences (assumed to be error free) to estimate Now assuming the intercepted data block is based on Figure
the LDPC and turbo encoders’ parameters is introduced. Af- 1, the left side of the figure shows the known encoded data
terwords, we propose an interative method to blindly identify while the right side depicts the intercepted data at the receiver.
the intercepted sequences in a noisy environment. There are unknown parameters associated with the received
Alpha
0.6
into analysis blocks nreceived with variable length (assumed a 0.4
Alpha (nintercepted)
Upper bound
reasonable range to cover the expected code length value, i.e. 0.2
0
Lower bound
0 2 4 6 8 10 12 14 16 18
if we expect an LDPC code one should assume a large value nreceived
Estimation of frame length/ code rate, frame length 5 bits, Desyncronized
Alpha
0.6
that the interception matrix behaves like a random binary Fig. 2. α versus nintercepted when the analysis blocks are synchronized
matrix. Then some bits of the linear combination may have and desynchronized (the upper bound is reached).
moved to the next line as shown in Figure 1 and so the
Estimation of frame length/ code for LDPC code, frame length 256 bits, Syncronized
XOR of the considered columns is not equal to zero anymore 1.2
1
(desynchronization case). It is shown that if the length of the 0.8
Alpha
0.6
Number of rows
0.6
50
= =
Number of columns Magnify for the frame/ code rate point
Whereas kintercepted /nintercepted kc /nc
r(coderate), then the upper bound for the ratio Fig. 3. α versus nintercepted when the analysis blocks are synchronized
α = rank(Hestimated )/nreceived is as follows: (the upper bound is reached).
1
β ≤ min r + (−r + min (β, r) + min (1 − β, r)) , 1
bi codes derived by treating the latter as parallel concatenated
(2) convolutional codes. Consequently, we enable the detection of
1 1
where β = nda and 0 ≤ β ≤ ( bintercepted − nreceived ) where d convolutional and turbo codes by means of the same iterative
is an integer which represents the unknown desynchronization method (based on Gauss-Jordan elimination through pivoting
between interleaver blocks (in our case the coded block length) algorithm) used for LDPC codes.
and analysis blocks 0 ≤ d ≤ nintercepted − 1.
Furthermore, the synchronization and the desynchronization IV. C ONCLUSION
cases which are described in the two sub-matrices in 1 are In this work, we propose a method for detecting LDPC,
shown clearly by simulations in Figure 2 for a (5, 4)-linear convolutional, and turbo codes’ parameters based on Gauss-
code synchronized and desynchronized cases, respectively. Jordan elimination through pivoting algorithm. This method
Figure 3 shows a (255, 128)-LDPC code. involves the behavior of the normalized rank of the parity
check matrix H (which is constructed from the intercepted
6WUXFWXUHRIPDWUL[+HVWLPDWHG interleaved stream) to estimate the code rate, as well as
to perform a blind codeword synchronization. Although this
method is only suitable for LDPC codes of moderate length,
QUHFHLYHGQLQWHUFHSWHG
it works very well with convolutional and turbo codes of
different code lengths too.
5HFHLYHG'DWD
'HV\QFKURQL]HG
IUDPHV
R EFERENCES
QUHFHLYHG QLQWHUFHSWHG
QUHFHLYHG
503