2018
DOI: 10.1049/iet-com.2017.1234
|View full text |Cite
|
Sign up to set email alerts
|

Concatenated physical layer encryption scheme based on rateless codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1

Relationship

7
1

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 35 publications
0
7
0
Order By: Relevance
“…where Y n ∈ R 3 , R(α, β, γ ) ∈ R 3×3 is the rotation matrix and α, β, γ ∼ U (0, 2π ) are phase parameters. R(α, β, γ ) is given by (18) and (19), as shown at the bottom of the next page. The distribution of Y n is shown in the Fig.5.…”
Section: ) Confusion Characteristics Of the Output Signalmentioning
confidence: 99%
See 1 more Smart Citation
“…where Y n ∈ R 3 , R(α, β, γ ) ∈ R 3×3 is the rotation matrix and α, β, γ ∼ U (0, 2π ) are phase parameters. R(α, β, γ ) is given by (18) and (19), as shown at the bottom of the next page. The distribution of Y n is shown in the Fig.5.…”
Section: ) Confusion Characteristics Of the Output Signalmentioning
confidence: 99%
“…Rather than replacing cryptography at higher layers, one of PLE's benefits is to enable using lightweight cryptosystems, an important issue in devices with limited resources. Researchers considered PLE in a variety of communication systems including OFDM systems [11], [12], massive MIMO systems [13]- [15], Untrusted Relaying Systems [16], IEEE 802.15.4 protocols [17], rateless codes [18] and sparse code multiple access (SCMA) [19]. The work in [17] implemented a PLE system in ASIC and FPGA with low complexity and latency.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, as the development of supercomputer, the traditional encryption techniques based on high calculated amounts are hard to satisfy the requirements of security. Against the background, as an important part of information‐theoretic security, physical layer security (PLS) [6] techniques have been proposed to exploit the feature of wireless communications to enhance the security such as security coding [7, 8], cooperative interference [9, 10] and key generation [11, 12].…”
Section: Introductionmentioning
confidence: 99%
“…Wireless physical layer security (PLS) [8] makes full use of the characteristics of channels in the wireless physical layer and both legitimate communication parties can recover the original information, while eavesdroppers (Eve) can not obtain secret information. Generally, PLS mainly includes security coding [9]- [11], cooperative interference [12], [13] and key generation [14]- [16]. Polar codes have excellent performance and special constructions due to their nested codeword structure [17] which can realize random binning [18] in PLS coding.…”
Section: Introductionmentioning
confidence: 99%