Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

The system model.

More »

Fig 1 Expand

Fig 2.

Secret key generation steps for the wireless communication systems.

More »

Fig 2 Expand

Fig 3.

The secure transmission model based on the polar code.

More »

Fig 3 Expand

Fig 4.

Proposed crypto-coding scheme based on polar code.

More »

Fig 4 Expand

Fig 5.

An example of the proposed secure polar code.

More »

Fig 5 Expand

Table 1.

Parameters for some NIST tests

More »

Table 1 Expand

Table 2.

The tested values of the required NIST tests.

More »

Table 2 Expand

Table 3.

Simulation parameters.

More »

Table 3 Expand

Fig 6.

The BER of the systems with conventional polar code and the proposed secure polar code in case of N = 1024 and modified R.

More »

Fig 6 Expand

Fig 7.

The BER of the systems with conventional polar code and the proposed secure polar code in case of N = 2048 and modified R.

More »

Fig 7 Expand

Table 4.

Comparing our method with the previous methods for N = 1024 and R = 1 ∕ 2.

More »

Table 4 Expand

Fig 8.

The BER of the systems with conventional polar code and the proposed secure polar code in case of R = 1 ∕ 4 and modified N.

More »

Fig 8 Expand

Fig 9.

The BER of the systems with the conventional polar code and the proposed secure polar code in case of R = 1 ∕ 8 and modified N.

More »

Fig 9 Expand

Fig 10.

Security performance for N = 128, R = 1 ∕ 2.

More »

Fig 10 Expand

Fig 11.

Security performance for N = 256, R = 1 ∕ 4.

More »

Fig 11 Expand

Table 5.

Comparing the security performance of the proposed method and the previous methods

More »

Table 5 Expand

Table 6.

Total time complexity of the conventional polar code and the proposed secure polar code with R = 1 ∕ 2.

More »

Table 6 Expand