Fig 1.
The system model.
Fig 2.
Secret key generation steps for the wireless communication systems.
Fig 3.
The secure transmission model based on the polar code.
Fig 4.
Proposed crypto-coding scheme based on polar code.
Fig 5.
An example of the proposed secure polar code.
Table 1.
Parameters for some NIST tests
Table 2.
The tested values of the required NIST tests.
Table 3.
Simulation parameters.
Fig 6.
The BER of the systems with conventional polar code and the proposed secure polar code in case of N = 1024 and modified R.
Fig 7.
The BER of the systems with conventional polar code and the proposed secure polar code in case of N = 2048 and modified R.
Table 4.
Comparing our method with the previous methods for N = 1024 and R = 1 ∕ 2.
Fig 8.
The BER of the systems with conventional polar code and the proposed secure polar code in case of R = 1 ∕ 4 and modified N.
Fig 9.
The BER of the systems with the conventional polar code and the proposed secure polar code in case of R = 1 ∕ 8 and modified N.
Fig 10.
Security performance for N = 128, R = 1 ∕ 2.
Fig 11.
Security performance for N = 256, R = 1 ∕ 4.
Table 5.
Comparing the security performance of the proposed method and the previous methods
Table 6.
Total time complexity of the conventional polar code and the proposed secure polar code with R = 1 ∕ 2.