Citation: | BAI Huiqing, JIN Liang, XIAO Shuaifang, YI Ming*. Polar Code for Physical Layer Security in Multi-antenna Systems[J]. Journal of Electronics & Information Technology, 2017, 39(11): 2587-2593. doi: 10.11999/JEIT170068 |
KOLOKOTRONIS N, KATSIONTIS A, and KALOUPTSIDIS N. Secretly pruned convolutional codes: Security analysis and performance results[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(7): 1500-1514. doi: 10.1109/ TIFS.2016.2537262.
|
WANG Bo, MU Pengcheng, WANG Chao, et al. Combining dirty-paper coding and artificial noise for secrecy[C]. IEEE International Communication on Acoustics, Speech and Signal Processing, Shanghai, China, 2016: 2034-2038.
|
KLINC D, JEONGSEOK H, MCLAUGHLIN S W, et al. LDPC codes for the Gaussian wiretap channel[J]. IEEE Transactions on Information Forensics Security, 2011, 6(3): 532-540. doi: 10.1109/TIFS.2011.2134093.
|
BALDI M, BIANCHI M, and CHIARALUCE F. Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: A security gap analysis[J]. IEEE Transactions on Information Forensics Security, 2012, 7(3): 883-894. doi: 10.1109/TIFS.2012.2187515.
|
YI Ming, JI Xinsheng, HUANG Kaizhi, et al. Achieving strong security based on fountain code with coset precoding[J]. IET Communications, 2014, 8(14): 2476-2483. doi: 10.1049/iet-com.2013.1033.
|
ARIKAN E. Channel polarization: A method for constructing capacity-achieving codes for symmetry binary input memoryless channels[J]. IEEE Transactions on Information Theory, 2009, 55(7): 3051-3073. doi: 10.1109/ TIT.2009. 2021379.
|
HAJIMOMENI M, AGHAEINIA H, KIM I M, et al. Cooperative jamming polar codes for multiple-access wiretap channels[J]. IET Communications, 2016, 10(4): 407-415. doi: 10.1049/iet-com.2015.0624.
|
WEI Yipeng and ULUKUS S. Polar coding for the general wiretap channel with extensions to multiuser scenarios[J]. IEEE Journal on Selected Areas in Communications, 2016, 34(2): 278-291. doi: 10.1109/JSAC.2015.2504275.
|
ANDERSSON M, RATHI V, THOBABEN R, et al. Nested polar codes for wiretap and relay channels[J]. IEEE Communications Letters, 2010, 14(4): 752-754. doi: 10.1109/ LCOMM.2010.08.100875.
|
MAHDAVIFAR H and VARDY A. Achieving the secrecy capacity of wiretap channels using polar codes[J]. IEEE Transactions on Information Theory, 2011, 57(10): 6428-6443. doi: 10.1109/TIT.2011.2162275.
|
MIRGHASEMI H and BELFIORE J. The un-polarized bit-channels in the wiretap polar coding scheme[C]. International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace Electronic Systems, Manchester, Denmark, 2014: 1-5.
|
NIU K, CHEN K, and LIN J R. Beyond turbo codes: Ratecompatible punctured polar codes[C]. IEEE International Conference on Communications, Budapest, Hungary, 2013: 3423-3427.
|
易鸣, 季新生, 黄开枝, 等. 面向物理层安全的一种打孔极化编码方法[J]. 电子与信息学报. 2014, 36(12): 2835-2841. doi: 10.3724/SP.J.1146.2014.00013.
|
YI Ming, JI Xinsheng, HUANG Kaizhi, et al. A method based on puncturing polar codes for physical layer security[J]. Journal of Electronics Information Technology, 2014, 36(12): 2835-2841. doi: 10.3724/SP.J.1146.2014.00013.
|
GAO Y, CAI Y, SHI Q, et al. Joint transceiver designs for secure communications over MIMO relay[C]. IEEE International Conference on Acoustics, Speech and Signal Processing, Shanghai, China, 2016: 3851-3855.
|
CHEN K, NIU K, and LIN J. Practical polar code construction over parallel channels[J]. IET Communications, 2013, 7(7): 620-627. doi: 10.1049/iet-com.2012.0428.
|
ARIKAN E and TELATAR E. On the rate of channel polarization[C]. IEEE International Symposium on Information Theory, Seoul, South Korea, 2009: 1493-1495.
|
WANG W, TEH K C, and LI K H. Artificial noise aided physical layer security in multi-antenna small-cell networks [J]. IEEE Transactions on Information Forensics and Security, 2017, 12(6): 1470-1482. doi: 10.1109/TIFS.2017. 2663336.
|