GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference 2009
DOI: 10.1109/glocom.2009.5426065
|View full text |Cite
|
Sign up to set email alerts
|

LDPC for Physical Layer Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(38 citation statements)
references
References 16 publications
0
38
0
Order By: Relevance
“…< R M , where mode "0" corresponds to no data transmission or outage. In this article, proper codes are those in their performance curve, a little change in SNR results in a great change in BER, accurately those with a low security gap (Klinc, Ha, McLaughlin, Barros, & Kwak, 2009). In Figure 2, security gap is shown; through a decrease of received SNR by the security gap d, BER decrease from proper level to improper level.…”
Section: Link Adaptationmentioning
confidence: 99%
“…< R M , where mode "0" corresponds to no data transmission or outage. In this article, proper codes are those in their performance curve, a little change in SNR results in a great change in BER, accurately those with a low security gap (Klinc, Ha, McLaughlin, Barros, & Kwak, 2009). In Figure 2, security gap is shown; through a decrease of received SNR by the security gap d, BER decrease from proper level to improper level.…”
Section: Link Adaptationmentioning
confidence: 99%
“…Nevertheless, medium or short length LDPC codes have also their applications. In [3] Klinc et al propose a coding scheme for the Gaussian wiretap channel based on LDPC codes (codeword length n = 2364 with code rate R = 2/3). Bit error rate -BER is used as a measure for security in this paper.…”
Section: B Application Of Short-length Ldpcmentioning
confidence: 99%
“…In the paper above, only theoretical derivation on the performance of coset coding was made, the implement method in detail was not underway yet. In [8][9], Klinc, Andersson and et al added randomness to increase the uncertainty of the eavesdropper. However, these methods decreased the reliability of the legitimate receiver in reverse.…”
Section: Introductionmentioning
confidence: 99%