Summary: | The advent of fifth-generation (5G) technology has ushered in a new era of connectivity, promising unprecedented data rates and ultra-reliable low-latency communication. As the demand for high-speed and secure communication continues to surge, there is a critical need for robust communication systems to increase wireless networks' security level. In this context, this paper investigates secure communication techniques, specifically focusing on utilizing the hash function as an authentication mechanism and the presence of polar codes. The integration of polar codes within the communication framework and their effectiveness are examined to enhance error correction capabilities by ensuring the integrity of transmitted data. Furthermore, the transmissions between Alice, Bob, and Eve are evaluated in terms of authentication rate, secrecy rate, and secrecy capacity in determining the effect of the hash function, the presence of channel pre-coding algorithm, and various codeword lengths. This paper also investigates the impact of different codeword values on the overall system performance, shedding light on the advantages of tailoring these parameters to the unique requirements of 5G networks. The results found that the performance of secure communication with the presence of polar codes is better than that of transmission without polar codes. The secrecy rate is reduced to below 10-4 after the transmission reaches 7 dB, Bob's authentication rate remains high, almost reaching 1. © 2024 IEEE.
|