2018
DOI: 10.1109/access.2018.2848918
|View full text |Cite
|
Sign up to set email alerts
|

Research on Constellation-Splitting Criterion in Multiple Parameters WFRFT Modulations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…The authors in [33][34] modeled the WFRFT-based wireless PLS cooperation transmission problem as a coalitional game with non-transferable utility. The WFRFT technology with multiple parameters [35] [36] was applied into secure spatial modulation system in [37]. Moreover, the WFRFT technology was also applied into hybrid carrier system in [38]- [41] for wireless PLS transmissions.…”
Section: Introductionmentioning
confidence: 99%
“…The authors in [33][34] modeled the WFRFT-based wireless PLS cooperation transmission problem as a coalitional game with non-transferable utility. The WFRFT technology with multiple parameters [35] [36] was applied into secure spatial modulation system in [37]. Moreover, the WFRFT technology was also applied into hybrid carrier system in [38]- [41] for wireless PLS transmissions.…”
Section: Introductionmentioning
confidence: 99%
“…Further, consider the mathematical relationship between E b /N 0 and P 0 /N 1 , which is shown in formula (14), then the logarithmic E b /N 0 results of the unauthorized receivers are calculated as shown in formula (15), where W is signal bandwidth, R b is the number of bits transmitted per second, and it is also the transmission rate:…”
Section: Performance Analysismentioning
confidence: 99%
“…As a result, the confidentiality performance of unauthorized receivers with a rapid scanning ability is also threatened. Although the modulation order can be extended, from one to many, for example, in multiple parameters WFRFT [13][14][15], or the state function can be extended from four to many, as in MWFRFT [16,17], this will also increase the system complexity. us, to solve the hidden limitation of conventional WFRFT, chaos technology [18,19] is introduced, following which a random modulation order parameter pool is established, so that a WFRFTsecure communication method based on the chaotic parameter pool (CPP) is proposed.…”
Section: Introductionmentioning
confidence: 99%
“…The contributions to physical layer security were promising. Apart from the above-mentioned WFRFT schemes based on a single parameter, the multiparameter WFRFT synthesis approaches have also been investigated intensively [ 33 , 34 ]. The MP-WFRFT system has a good parameter resistance, allowing it to detect in the condition of the eavesdroppers with a known signal transformation mode; in particular, this method can be combined with the existing DM technology, which can further improve the capacity for anti-interception and anti-detection based on the original system confidentiality.…”
Section: Introductionmentioning
confidence: 99%