Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions

@article{Wen2014AchievingSC,
  title={Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions},
  author={Hong Wen and Pin-Han Ho and Bin Wu},
  journal={IEEE Wireless Communications Letters},
  year={2014},
  volume={3},
  pages={273-276}
}
By manipulating both binary and non-binary resilient functions, a novel approach for generating security codes is introduced and their threshold probabilities are derived, which provides the security condition proof for the proposed security codes. In particular, by taking advantage of matrix general inverse algorithms the encoding method of the proposed security codes is derived and is practically implementable due to low complexity. Experiments are conducted to examine the proposed security… CONTINUE READING
Highly Cited
This paper has 24 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 12 extracted citations

Security-Coded OFDM System Based on Multiorder Fractional Fourier Transform

IEEE Communications Letters • 2016
View 5 Excerpts
Highly Influenced

A method of reconciling the key discrepancy by exploiting unconditional secure transmission

2017 IEEE Conference on Communications and Network Security (CNS) • 2017

A physical layer secure transmission method based on channel prediction and QoS

2017 IEEE Conference on Communications and Network Security (CNS) • 2017
View 1 Excerpt

Achieving Unconditional Security for MIMO-BAN under Short Blocklength Wiretap Code

2017 IEEE 86th Vehicular Technology Conference (VTC-Fall) • 2017
View 3 Excerpts

Cooperative Jamming Aided Secrecy Enhancement in Wireless Networks with Multiple Eavesdroppers

2017 IEEE 86th Vehicular Technology Conference (VTC-Fall) • 2017
View 1 Excerpt

Cooperative Jamming in a Two-Hop Relay Wireless Network with Buffer-Aided Relays

2017 Fifth International Symposium on Computing and Networking (CANDAR) • 2017
View 1 Excerpt

A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT)

IEEE Transactions on Emerging Topics in Computing • 2015
View 2 Excerpts

References

Publications referenced by this paper.
Showing 1-10 of 10 references

A study of correlation-immune, resilient and related cryptographic functions

K. Gopalakrishnan
Ph.D. thesis, University of Nebraska at Lincoln, 1994. • 1994
View 5 Excerpts
Highly Influenced

The wire-tap channel

The Bell System Technical Journal • 1975
View 4 Excerpts
Highly Influenced

Generalized Inverses of Linear Transformations

S. L. Campbell, C. D. Meyer, Jr.
1979
View 3 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…