The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
TENCON 2017 - 2017 IEEE Region 10 Conference 2017
DOI: 10.1109/tencon.2017.8227981
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of physical layer security over different t-error correcting codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…BCH is an error correcting code technique that is suitable for WSNs due to its properties of enhancing the efficiency of the energy by 23% [20]. BCH was selected by [21] to be scrambled to reduce the between the eavesdropper and the legitimate receiver. In this section, BCH has been evaluated without using the scrambling techniques and compared against Reed Solomon without scrambling.…”
Section: Bose-chaudhuri-hocquenghem (Bch)mentioning
confidence: 99%
See 1 more Smart Citation
“…BCH is an error correcting code technique that is suitable for WSNs due to its properties of enhancing the efficiency of the energy by 23% [20]. BCH was selected by [21] to be scrambled to reduce the between the eavesdropper and the legitimate receiver. In this section, BCH has been evaluated without using the scrambling techniques and compared against Reed Solomon without scrambling.…”
Section: Bose-chaudhuri-hocquenghem (Bch)mentioning
confidence: 99%
“…The BCH codes acchives high compared with LDPC codes. Thus, BCH is introduced with additional techniques such as scrambling [21]. Scrambling the data bits is employed as an additional strategy to improve the security by decreasing the gap between the eavesdropper node and legitimate receiver.…”
Section: Introductionmentioning
confidence: 99%
“…Consequently, the effective sum capacity achievable by both users will be improved. Although the sum capacity improvement is achieved by using the SIC operation, the total required computational complexity will further increase as the number of cellular network users is on the rising trend [18][19][20]. Therefore, the need for a user grouping and bandwidth allocation mechanism with a relatively lower computational complexity is higher.…”
Section: Introductionmentioning
confidence: 99%