1 |
SHANNON C E . Communication theory of secrecy systems[J]. Bell Labs Technical Journal, 1949, 28 (4): 656- 715.
doi: 10.1002/j.1538-7305.1949.tb00928.x
|
2 |
WYNER A D . The wire-tap channel[J]. Bell Labs Technical Journal, 1975, 54 (8): 1355- 1387.
doi: 10.1002/j.1538-7305.1975.tb02040.x
|
3 |
CSISZAR I , KORNER J . Broadcast channels with confidential messages[J]. IEEE Trans.on Information Theory, 1978, 24 (3): 339- 348.
doi: 10.1109/TIT.1978.1055892
|
4 |
JOÃO B, RODRIGUES M R D. Secrecy capacity of wireless channels[C]//Proc.of the IEEE International Symposium on Information Theory, 2006: 356-360.
|
5 |
OOHAMA Y. Capacity theorems for relay channels with confidential messages[C]// Proc.of the IEEE International Symposium on Information Theory, 2007: 926-930.
|
6 |
GGIER F , HASSIBI B . A perspective on the MIMO wiretap channel[J]. Proceedings of the IEEE, 2015, 103 (10): 1874- 1882.
doi: 10.1109/JPROC.2015.2468077
|
7 |
HONG Y W P , LAN P-C , KUO C C J . Enhancing physical-layer secrecy in multi-antenna wireless systems: an overview of signal processing approaches[J]. IEEE Signal Processing Magazine, 2013, 30 (5): 29- 40.
doi: 10.1109/MSP.2013.2256953
|
8 |
UKHERJEE A , FAKOORIAN S A A , HUANG J , et al. Principles of physical layer security in multiuser wireless networks: a survey[J]. IEEE Communications Surveys and Tutorials, 2014, 16 (3): 1550- 1573.
doi: 10.1109/SURV.2014.012314.00178
|
9 |
WANG H M , XIA X G . Enhancing wireless secrecy via cooperation signal design and optimization[J]. IEEE Communications Magazine, 2015, 53 (12): 47- 53.
doi: 10.1109/MCOM.2015.7355565
|
10 |
CHEN X , NG D W K , GERSTACKER W H , et al. A survey on multiple-antenna techniques for physical layer security[J]. IEEE Communications Surveys and Tutorials, 2017, 19 (2): 1027- 1053.
doi: 10.1109/COMST.2016.2633387
|
11 |
HUO Y , TIAN Y , MA L , et al. Jamming strategies for physical layer security[J]. IEEE Wireless Communications, 2018, 25 (1): 148- 153.
doi: 10.1109/MWC.2017.1700015
|
12 |
HAN S , KIM H J , LEE J , et al. Secure capacity analysis for magnetic inductive coupling-based SWIPT system[J]. IEEE Access, 2018, 6, 49182- 49191.
doi: 10.1109/ACCESS.2018.2868225
|
13 |
HARRISON W K , ALMEIDA J , BLOCH M R , et al. Coding for secrecy: an overview of error-control coding techniques for physical-layer security[J]. IEEE Signal Processing Magazine, 2013.
|
14 |
BLOCH M , HAYASHI M , THANGARAJ A . Error-control coding for physical-layer secrecy[J]. Proceedings of the IEEE, 2015, 103 (10): 1725- 1746.
doi: 10.1109/JPROC.2015.2463678
|
15 |
OGGIER F , SOLE P , BELFIORE J C . Lattice codes for the wiretap Gaussian channel: construction and analysis[J]. IEEE Trans.on Information Theory, 2016, 62 (10): 5690- 5708.
doi: 10.1109/TIT.2015.2494594
|
16 |
CHOU R A , BLOCH M R . Polar coding for the broadcast channel with confidential messages: a random binning analogy[J]. IEEE Trans.on Information Theory, 2016, 62 (5): 2410- 2429.
doi: 10.1109/TIT.2016.2539145
|
17 |
CHOU RA , VELLAMBI B N , BLOCH M R , et al. Coding schemes for achieving strong secrecy at negligible cost[J]. IEEE Trans.on Information Theory, 2017, 63 (3): 1858- 1873.
doi: 10.1109/TIT.2016.2645225
|
18 |
SAYED M A M , LIU R , ZHANG C . A novel scrambler design for enhancing secrecy transmission based on polar code[J]. IEEE Communications Letters, 2017, 21 (8): 1679- 1682.
doi: 10.1109/LCOMM.2017.2697427
|
19 |
KIM I , KIM B , AHN J K . Secure polar coding with REP and XOR coding[J]. IEEE Communications Letters, 2017, 21 (10): 2126- 2129.
doi: 10.1109/LCOMM.2017.2726523
|
20 |
HAO W , YIN L , HUANG Q . Secrecy transmission scheme based on 2-D polar coding over block fading wiretap channels[J]. IEEE Communications Letters, 2018, 22 (5): 882- 885.
doi: 10.1109/LCOMM.2018.2810888
|
21 |
白慧卿, 金梁, 肖帅芳, 等. 多天线系统中面向物理层安全的极化编码方法[J]. 电子与信息学报, 2017, 39 (11): 2587- 2593.
|
|
BAI H Q , JIN L , XIAO S F , et al. Polar code for physical layer security in multi-antenna systems[J]. Journal of Electronics and Information Technology, 2017, 39 (11): 2587- 2593.
|
22 |
易鸣, 季新生, 黄开枝, 等. 一种具有最佳错误扩散的无线物理层安全编码[J]. 信息工程大学学报, 2014, 15 (4): 417- 424.
doi: 10.3969/j.issn.1671-0673.2014.04.006
|
|
YI M , JI X S , HUANG K Z , et al. Wireless physical layer security coding with optimized error propagation[J]. Journal of Information Engineering University, 2014, 15 (4): 417- 424.
doi: 10.3969/j.issn.1671-0673.2014.04.006
|
23 |
KLINC D , MCLAUGHLIN S W , BARROS J . LDPC codes for the Gaussian wiretap channel[J]. IEEE Trans.on Information Forensics and Security, 2011, 6 (3): 532- 540.
doi: 10.1109/TIFS.2011.2134093
|
24 |
BALDI M , BIANCHI M , CHIARALUCE F . Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: a security gap analysis[J]. IEEE Trans.on Information Forensics and Security, 2012, 7 (3): 883- 894.
doi: 10.1109/TIFS.2012.2187515
|
25 |
ZHANG Y , LIU A , GONG C , et al. Polar-LDPC concatenated coding for the AWGN wiretap channel[J]. IEEE Communications Letters, 2014, 18 (10): 1683- 1686.
doi: 10.1109/LCOMM.2014.2353811
|
26 |
NOORAIEPOUR A , DUMAN T M . Randomized convolutional codes for the wiretap channel[J]. IEEE Trans.on Communications, 2017, 65 (8): 3442- 3452.
|