[1] |
JABER M , IMRAN M A , TAFAZOLLI R ,et al. 5G backhaul challenges and emerging research directions:a survey[J]. IEEE Access, 2016,4: 1743-1766.
|
[2] |
Huawei. New air interface and radio access virtualization[R]. Huawei White Paper,(2015-04)[2020-05-19].
|
[3] |
ARICAN E . Channel polarization:a method for constructing capacity-achieving codes for symmetric binary-input memoryless channels[J]. IEEE Transactions on Information Theory, 2009,55(7): 3051-3073
|
[4] |
HAMAMREH J M , BASAR E , ARSLAN H . OFDM-subcarrier index selection for enhancing security and reliability of 5G URLL services[J]. IEEE Access, 2017,5: 25863-25875.
|
[5] |
WYNER A D . The wire-tap channel[J]. The Bell System Technical Journal, 1975,54(8): 1355-1387.
|
[6] |
MAHDAVIFAR H , VARDY A . Achieving the secrecy capacity of wiretap channels using polar codes[J]. IEEE Transactions on Information Theory, 2011,57(10): 6428-6443.
|
[7] |
CSIZAR I , KORNER J . Broadcast channels with confidential messages[J]. IEEE transactions on Information Theory, 1978,24(3): 339-348.
|
[8] |
SASOGLU E , VARDY A . A new polar coding scheme for strong security on wiretap channels[C]// IEEE International Symposium on Information Theory. Piscataway:IEEE Press, 2013: 1117-1121.
|
[9] |
GULCU T C , BARG A . Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential component[J]. IEEE Transactions on Information Theory, 2017,63(2): 1311-1324.
|
[10] |
ZHAO Y Z , ZOU X C , LU Z J ,et al. Chaotic encrypted polar coding scheme for general wiretap channel[J]. IEEE Transactions on Very Large Scale Integration Systems, 2017,25(12): 3331-3340.
|
[11] |
LU X J , SHI Y X , LI W ,et al. A joint physical encryption and PAPR reduction scheme based on polar codes and chaotic sequences in OFDM system[J]. IEEE Access, 2019,7: 73036-73045.
|
[12] |
LU X J , LEI J , LI W ,et al. Physical layer encryption algorithm based on polar codes and chaotic sequences[J]. IEEE Access, 2019,7: 4380-4390.
|
[13] |
WU X G , ZHANG L . Chaos-based Information rotated polar coding scheme for visible light wiretap channel[C]// International Conference on Computing,Network and Communications. Piscataway:IEEE Press, 2019: 864-868.
|
[14] |
ZHAO Y Z , ZOU X C , LIU Z . Chaos embedded polar coding for wiretap channel in negative secrecy capacity case[C]// International Congress on Image and Signal Processing,BioMedical Engineering and Informatics. Piscataway:IEEE Press, 2016: 1949-1953.
|
[15] |
CHUNG S Y , RICHARDSON T J , URBANKE R L . Analysis of sum-product decoding of low-density parity-check codes using a Gaussian approximation[J]. IEEE Transactions on Information Theory, 2001,47(2): 657-670.
|
[16] |
MORI R , TOSHIYUKI T . Performance of polar codes with the construction using density evolution[J]. IEEE Communication Letters, 2009,13(7): 519-521.
|
[17] |
TONG W , ZHU P . Research and implementation of polar codes[M]. Beijing: China CITIC Publishing GroupPress, 2018.
|
[18] |
WANG S , WANG X . M-DCSK-based chaotic communication in MIMO multipath channels with no channel state information[J]. IEEE Transactions on Circuits and Systems, 2010,57(12): 1001-1005.
|
[19] |
YAO J , SUN Y , REN H . Experimental wireless communication using chaotic baseband waveform[J]. IEEE Transactions on Vehicular Technology, 2019,68(1): 578-591.
|
[20] |
ABDULLAH H N , ABDULLAH H A . Image encryption using hybrid chaotic map[C]// 2017 International Conference on Current Research in Computer Science and Information Technology. Piscataway:IEEE Press, 2017: 121-125.
|
[21] |
WANG C , JI Y F , WANG H X ,et al. Security-enhanced electro-optic feedback phase chaotic system based on nonlinear coupling of two delayed interfering branches[J]. IEEE Photonics Journal, 2018,10(4): 1-16.
|
[22] |
ZHANG J , ZHU H P , ZHU Y X ,et al. A hybrid DS/FH signal generator based of spatiotemporal chaotic OCML[C]// IEEE International Conference on Computer and Communications. Piscataway:IEEE Press, 2016: 2682-2686.
|
[23] |
ZHANG X Z , WANG Y , ZENG J ,et al. A secure OFDM transmission scheme based on chaos mapping[C]// International Performance Computing and Communications Conference. Piscataway:IEEE Press, 2015: 1-6.
|
[24] |
KANSO A , SMAOUI N . Logistic chaotic maps for binary number generations[J]. Chaos,Solitons and Fractals, 2009,40: 2557-2568.
|
[25] |
HERSHEY J E , HASSAN A A , YARLAGADDA R . Unconventional cryptographic keying variable management[J]. IEEE Transactions on Communications, 1995,43(1): 3-6.
|
[26] |
ALI S T , SIVARAMAN V , OSTRY D . Secret key generation rate vs reconciliation using wireless channel characteristics in body area networks[C]// IEEE/IFIP International Conference on Embedded and Ubiquitous Computing,Piscataway:IEEE Press, 2010: 644-650.
|
[27] |
CHEN C , JENSEN M A . Secret key establishment using temporally and spatially correlated wireless channel coefficients[J]. IEEE Transactions on Mobile Computing, 2010,10(2): 205-215.
|
[28] |
ZHU X , XU F , NOVAK E , TAN C C ,et al. Using wireless link dynamics to extract a secret key in vehicular scenarios[J]. IEEE Transactions on Mobile Computing, 2017,16(7): 2065-2078.
|
[29] |
WANG Q , SU H , REN K ,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks[C]// 2011 Proceedings IEEE INFOCOM. Piscataway:IEEE Press, 2011: 1422-1430.
|
[30] |
KORADA S B . Polar codes for channel and source coding[D]. Lausanne:Swiss Federal Institute of Technology in Lausanne, 2009.
|
[31] |
LEUNG Y C S . On a special class of wiretap channels[J]. IEEE Transactions on Information Theory, 1977,23(5): 625-627.
|
[32] |
SHIU Y C S , CHANG S Y , WU H C ,et al. Physical layer security in wireless networks:a tutorial[J]. IEEE Wireless Communications, 2011,18(2): 66-74.
|