A Secure MQAM Scheme Based on Signal Constellation Hopping |
Zhang, Yingxian
(College of Communications Engineering, PLA University of Science and Technology)
Liu, Aijun (College of Communications Engineering, PLA University of Science and Technology) Pan, Xiaofei (College of Communications Engineering, PLA University of Science and Technology) Ye, Zhan (College of Communications Engineering, PLA University of Science and Technology) |
1 | E. Sasoglu and A. Vardy, "A new polar coding scheme for strong security on wiretap channels," in Proc. of 2013 IEEE International Symposium on Information Theory (ISIT 2013), pp. 1117-1121, July, 2013. |
2 | Y. Yan, L. Liu and C. Ling, "Polar lattices for strong secrecy over the mod-Λ Gaussian wiretap channel," arXiv:1401.4532, January, 2014. |
3 | C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe and Narayan, "Information- theoretically secret key generation for fading wireless channels," IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 240-254, June, 2010. DOI ScienceOn |
4 | G. R. Tsouri and D. M. Wagner, "Threshold constraints on symmetric key extraction from Rician fading estimates," IEEE Transactions on Mobile Computing, vol. 12, no. 12, pp. 2496-2506, December, 2013. DOI ScienceOn |
5 | O. Adamo, E. Ayeh and M. Varanasi, "Joint encryption error correction and modulation (JEEM) scheme," in Proc. of IEEE International Workshop Technical Committee on Communication Quality and Reliability, pp. 1-5, May 15-17, 2012. |
6 | J. G. Proakis, Digital Communications, 5th Edition, McGraw-Hill Higher Education, New York, USA, June, 2007. |
7 | A. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, January, 1975. DOI ScienceOn |
8 | I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Transaction on Information Theory, vol. 24, no. 3, pp. 339-348, May, 1978. DOI |
9 | H. Kim and J. D. Villasenor, "Secure MIMO communications in a system with equal numbers of transmit and receive antennas," IEEE Communications Letters, vol. 12, no. 5, pp. 386-388, May, 2008. DOI ScienceOn |
10 | L. Dong, Z. Han, A. P. Petropulu and H. V. Poor, "Secure wireless communications via cooperation," in Proc. of 46th Annual Allerton Conf. on Communication, Control, and Computing, pp. 1132-1138, Sept. 23-26, 2008. |
11 | S. Yan, N. Yang, R. Malaney and J. Yuan, "Transmit antenna selection with alamouti coding and power allocation in MIMO wiretap Channels," IEEE Transactions on Wireless Communications, vol. 13, no. 3, pp. 1656-1667, March, 2014. DOI ScienceOn |
12 | A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-part I:The MISOME wiretap channel," IEEE Transactions on Information Theory, vol. 56, no. 7, pp. 3088-3014, July, 2010. DOI ScienceOn |
13 | A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-part II: The MIMOME Wiretap Channel," IEEE Transactions on Information Theory, vol. 56, no. 11, pp. 5515-5532, November, 2010. DOI ScienceOn |
14 | F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel", IEEE Transaction on Information Theory, vol. 57, no. 8, pp. 4961-4972, August, 2011. DOI ScienceOn |
15 | L. Dong, Z. Han, A. P. Petropulu and H. V. Poor, "Amplify-and-Forward based cooperation for secure wireless communications," in Proc. of IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pp. 2613-2616, Apr. 19-24, 2009. |
16 | A. Mukherjee, "Imbalanced beam-forming by a multi-antenna source for secure utilization of an untrusted Relay," IEEE Communications Letters, vol. 17, no. 7, pp. 1309-1312, July, 2013. DOI ScienceOn |
17 | J. Deng, R. Zhang, L. Song, Z. Han and B. Jiao, "Truthful mechanisms for secure communication in wireless cooperative system," IEEE Transactions on Wireless Communications, vol. 12, no. 9, pp. 4236-4245, September, 2013. DOI ScienceOn |
18 | Y. Zou, X. Wang and W. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks," IEEE Journal on Selected Areas in Communications, vol. 31, no. 10, pp. 2099-2111, October, 2013. DOI ScienceOn |
19 | F. Renna, N. Laurenti and H. V. Poor, "Physical layer secrecy for OFDM systems," in Proc. of European Wireless Conference, pp. 782-789, Apr. 12-15, 2010. |
20 | X. Wang, M. Tao, J. Mo and Y. Xu, "Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 693-702, September, 2011. DOI ScienceOn |
21 | A. A. Tomko, "Physical-layer intrusion detection in wireless networks," in Proc. of IEEE Military Communication Conference, pp. 1-7,Oct. 23-25, 2006. |
22 | Z. Ding, Z. Ma and P. Fan , "Asymptotic studies for the impact of antenna selection on secure Two-Way relaying communications with artificial noise," IEEE Transactions on Wireless Communications, vol. 13, no. 4, pp. 2189-2203, April, 2014. DOI ScienceOn |
23 | P.-S. Murvay and B. Groza, "Source identification using signal characteristics in controller area networks," IEEE Signal Processing Letters, vol. 21, no. 4, pp. 395-399, April, 2014. DOI ScienceOn |
24 | S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Transactions on wireless communications, vol.7, no.6, pp.2180-2189, June, 2008. DOI ScienceOn |
25 | W. Li, M. Ghogho, B. Chen and C. Xiong, "Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis," IEEE Communications Letters, vol. 16, no. 10, pp. 1628-1631, October, 2012. DOI ScienceOn |
26 | A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin and J.-M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Transactions on Information Theory, vol. 53, no. 8, pp. 2933-2945, August, 2007. DOI ScienceOn |
27 | D. Silva and F. R. Kschischang, "Universal secure network coding via rank-metric codes," IEEE Transactions on Information Theory, vol. 57, no. 2, pp. 1124-1135, February, 2011. DOI ScienceOn |
28 | H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Transactions on Information Theory, vol. 57, no. 10, pp. 6428-6443, October, 2011. DOI ScienceOn |