A Nearly Information Theoretically Secure Approach for Semantic Communications over Wiretap Channel

Weixuan Chen,Shuo Shao,Qianqian Yang,Zhaoyang Zhang,Ping Zhang
2024-01-25
Abstract:This paper addresses the challenge of achieving information-theoretic security in semantic communication (SeCom) over a wiretap channel, where a legitimate receiver coexists with an eavesdropper experiencing a poorer channel condition. Despite previous efforts to secure SeCom against eavesdroppers, achieving information-theoretic security in such schemes remains an open issue. In this work, we propose a secure digital SeCom approach based on superposition codes, aiming to attain nearly information-theoretic security. Our proposed method involves associating semantic information with satellite constellation points within a double-layered constellation map, where cloud center constellation points are randomly selected. By carefully allocating power between these two layers of constellation, we ensure that the symbol error probability (SEP) of the eavesdropper decoding satellite constellation points is nearly equivalent to random guessing, while maintaining a low SEP for the legitimate receiver to successfully decode the semantic information. Simulation results showcase that the Peak Signal-to-Noise Ratio (PSNR) and Mean Squared Error (MSE) for the eavesdropper's reconstructed data, using our proposed method, can range from decoding Gaussian-distributed random noise to approaching the variance of the data. This validates the ability of our method to achieve nearly information-theoretic security, demonstrating superior data security compared to benchmark methods.
Information Theory,Image and Video Processing
What problem does this paper attempt to address?
This paper attempts to solve the problem of achieving information - theoretic security in semantic communication (SeCom), especially in the presence of eavesdroppers. Specifically, the paper focuses on how to achieve nearly information - theoretic secure digital semantic communication through a superposition - coding - based method under the channel conditions where legitimate receivers and eavesdroppers coexist. The main challenges of the paper are: 1. **Secure Transmission of Semantic Information**: In traditional communication systems, the transmitted information is often directly mapped to channel input symbols, which leads to an inherent association between channel input symbols and source data, enabling eavesdroppers to partially recover the source data. 2. **Difficulty in Learning Complex Coding Schemes**: The coding scheme for achieving the capacity of traditional Gaussian wiretap channels uses a complex two - step random codebook generation process, and this complexity makes it difficult for neural - network - based encoders to learn. To solve these problems, the paper proposes a secure digital SeCom method based on superposition coding. The main steps include: 1. **Two - layer Constellation Design**: Create a 16 - QAM constellation by superimposing two 4 - QAM constellations. The inner constellation (cloud - center codewords) is randomly generated and does not carry valid information; the outer constellation (satellite codewords) is used to modulate the extracted semantic information. 2. **Dynamic Power Allocation**: Dynamically adjust the power allocation between the inner and outer constellations according to the symbol error probabilities (SEP) of the legitimate receiver and the eavesdropper. The goal is to minimize the SEP of the legitimate receiver while keeping the SEP of the eavesdropper close to random guessing. 3. **Information - Theoretic Security Assurance**: Through the above methods, ensure that the SEP of the eavesdropper decoding the outer constellation is close to the probability of random guessing, thereby achieving nearly information - theoretic secure communication. The paper verifies the effectiveness of the proposed method through simulation results, demonstrating its ability to ensure information - theoretic security at a high compression ratio, which is superior to existing benchmark methods.