期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Practical Regular LDPC Coded Scheme for Physical-Layer Information Security
1
作者 Du Junyi 《China Communications》 SCIE CSCD 2024年第5期190-201,共12页
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L... In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes. 展开更多
关键词 extrinsic information transfer function physical layer scheme secure open channel security gap
下载PDF
The Analysis of Secure HARQ with Chase Combining over Block Fading Channel 被引量:1
2
作者 Yue Wu Lukman A Olawoyin +1 位作者 Nana Zhang Hongwen Yang 《China Communications》 SCIE CSCD 2016年第5期82-88,共7页
In this letter, the physical layer security of hybrid automatic repeat request with chase combining(HARQ-CC) scheme is investigated from the viewpoint of information theory. Different from the literature which used Wy... In this letter, the physical layer security of hybrid automatic repeat request with chase combining(HARQ-CC) scheme is investigated from the viewpoint of information theory. Different from the literature which used Wyner code, our analysis focuses on the general scenario without specific code. We firstly obtain the outage probability of both main channel and wiretap channel. Since retransmissions are completely determined by main channel, we then prove that its achievable diversity order equals to maximum transmission number() while this order of wiretap channel is only one. Furthermore, we evaluate the metric of secure gap which demonstrates the difference between main channel and wiretap channel with reliable and secure constraints. As increases, the secure gap decreases monotonously. When is large enough, the security can be guaranteed even if wiretap channel is better than main channel. 展开更多
关键词 physical layer security HARQ chase combining outage probability diversity order secure gap
下载PDF
A Modified Cellular Automaton Model for Traffic Flow
3
作者 葛红霞 董力耘 +1 位作者 雷丽 戴世强 《Journal of Shanghai University(English Edition)》 CAS 2004年第1期1-3,共3页
A modified cellular automaton model for traffic flow was proposed. A novel concept about the changeable security gap was introduced and a parameter related to the variable security gap was determined. The fundamental ... A modified cellular automaton model for traffic flow was proposed. A novel concept about the changeable security gap was introduced and a parameter related to the variable security gap was determined. The fundamental diagram obtained by simulation shows that the maximum flow more approaches to the observed data than that of the NaSch model, indicating that the presented model is more reasonable and realistic. 展开更多
关键词 traffic flow cellular automaton model changeable security gap.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部