{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T11:07:37Z","timestamp":1762254457485},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2023,10,1]]},"DOI":"10.1587\/transcom.2022ebt0007","type":"journal-article","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T22:11:06Z","timestamp":1679955066000},"page":"987-996","source":"Crossref","is-referenced-by-count":1,"title":["High-Quality and Low-Complexity Polar-Coded Radio-Wave Encrypted Modulation Utilizing Multipurpose Frozen Bits"],"prefix":"10.23919","volume":"E106.B","author":[{"given":"Keisuke","family":"ASANO","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Graduate School of Engineering, Nagoya Institute of Technology"}]},{"given":"Takumi","family":"ABE","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Graduate School of Engineering, Nagoya Institute of Technology"}]},{"given":"Kenta","family":"KATO","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Graduate School of Engineering, Nagoya Institute of Technology"}]},{"given":"Eiji","family":"OKAMOTO","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Graduate School of Engineering, Nagoya Institute of Technology"}]},{"given":"Tetsuya","family":"YAMAMOTO","sequence":"additional","affiliation":[{"name":"Digital & AI Technology Center, Technology Division, Panasonic Holdings Corporation"}]}],"member":"263","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] G.A. Akpakwu, B.J. Silva, G.P. Hancke, and A.M. Abu-Mahfouz, \u201cA survey on 5G networks for the internet of things: Communication technologies and challenges,\u201d IEEE Access, vol.6, pp.3619-3647, 2018. 10.1109\/access.2017.2779844","DOI":"10.1109\/ACCESS.2017.2779844"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] J. Yuan, H. Shan, A. Huang, T.Q.S. Quek, and Y. Yao, \u201cMassive machine-to-machine communications in cellular network: Distributed queueing random access meets MIMO,\u201d IEEE Access, vol.5, pp.2981-2993, 2017. 10.1109\/access.2017.2670614","DOI":"10.1109\/ACCESS.2017.2670614"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] Y. Wu, A. Khisti, C. Xiao, G. Caire, K.-K. Wong, and X. Gao, \u201cA survey of physical layer security techniques for 5G wireless networks and challenges ahead,\u201d IEEE J. Sel. Areas Commun., vol.36, no.4, pp.679-695, April 2018. 10.1109\/jsac.2018.2825560","DOI":"10.1109\/JSAC.2018.2825560"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] F. Liu and L. Wang, \u201cMP-WFRFT and chaotic scrambling aided directional modulation technique for physical layer security enhancement,\u201d IEEE Access, vol.7, pp.74459-74470, June 2019. 10.1109\/access.2019.2921109","DOI":"10.1109\/ACCESS.2019.2921109"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] P. Angueira, I. Val, J. Montalban, O. Seijo, E. Iradier, P.S. Fontaneda, L. Fanari, and A. Arriola, \u201cA survey of physical layer techniques for secure wireless communications in industry,\u201d IEEE Commun. Surveys Tuts., vol.24, no.2, pp.810-838, Feb. 2022. 10.1109\/comst.2022.3148857","DOI":"10.1109\/COMST.2022.3148857"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] R.L. Rivest, A. Shamir, and L. Adleman, \u201cA method for obtaining digital signatures and public-key cryptosystems,\u201d Commun. ACM, vol.21, no.2, pp.120-126, Feb. 1978. 10.1145\/359340.359342","DOI":"10.1145\/359340.359342"},{"key":"7","unstructured":"[7] J. Daemen and V. Rijmen, \u201cAes proposal: Rijndael,\u201d 1999."},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, \u201cA survey on security and privacy issues in internet-of-things,\u201d IEEE Internet Things J., vol.4, no.5, pp.1250-1258, April 2017. 10.1109\/jiot.2017.2694844","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] M. Bloch, J. Barros, M.R.D. Rodrigues, and S.W. McLaughlin, \u201cWireless information-theoretic security,\u201d IEEE Trans. Inf. Theory, vol.54, no.6, pp.2515-2534, June 2008. 10.1109\/tit.2008.921908","DOI":"10.1109\/TIT.2008.921908"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] S. Golstein, T.-H. Nguyen, F. Horlin, P.D. Doncker, and J. Sarrazin, \u201cPhysical layer security in frequency-domain time-reversal SISO OFDM communication,\u201d Proc. Int. Conf. Comput., Netw. Commun. (ICNC), pp.222-227, Feb. 2020. 10.1109\/icnc47757.2020.9049811","DOI":"10.1109\/ICNC47757.2020.9049811"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] D. Wang, B. Bai, W. Zhao, and Z. Han, \u201cA survey of optimization approaches for wireless physical layer security,\u201d IEEE Commun. Surveys Tuts., vol.21, no.2, pp.1878-1911, Nov. 2018. 10.1109\/comst.2018.2883144","DOI":"10.1109\/COMST.2018.2883144"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] N. Wang, P. Wang, A. Alipour-Fanid, L. Jiao, and K. Zeng, \u201cPhysical layer security of 5G wireless networks for IoT: Challenges and opportunities,\u201d IEEE Internet Things J., vol.6, no.5, pp.8169-8181, Oct. 2019. 10.1109\/jiot.2019.2927379","DOI":"10.1109\/JIOT.2019.2927379"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] L. Mucchi, F. Nizzi, T. Pecorella, R. Fantacci, and F. Esposito, \u201cBenefits of physical layer security to cryptography: Tradeoff and applications,\u201d 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), pp.1-3, June 2019. 10.1109\/blackseacom.2019.8812778","DOI":"10.1109\/BlackSeaCom.2019.8812778"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] H. Wang, B. Zhao, and T. Zheng, \u201cAdaptive full-duplex jamming receiver for secure D2D links in random networks,\u201d IEEE Trans. Commun., vol.67, no.2, pp.1254-1267, Feb. 2019. 10.1109\/tcomm.2018.2880216","DOI":"10.1109\/TCOMM.2018.2880216"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] S.-H. Park and X. Jin, \u201cJoint secure design of downlink and D2D cooperation strategies for multi-user systems,\u201d IEEE Signal Process. Lett., vol.28, pp.917-921, April 2021. 10.1109\/lsp.2021.3073849","DOI":"10.1109\/LSP.2021.3073849"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] J. Lim, T. Kim, and I. Bang, \u201cImpact of outdated CSI on the secure communication in untrusted in-band full-duplex relay networks,\u201d IEEE Access, vol.10, pp.19825-19835, Feb. 2022. 10.1109\/access.2022.3151792","DOI":"10.1109\/ACCESS.2022.3151792"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] G. Chen, Y. Gong, P. Xiao, and J.A. Chambers, \u201cPhysical layer network security in the full-duplex relay system,\u201d IEEE Trans. Inf. Forensics Security, vol.10, no.3, pp.574-583, March 2015. 10.1109\/tifs.2015.2390136","DOI":"10.1109\/TIFS.2015.2390136"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] G. Zheng, L.C. Choo, and K.K. Wong, \u201cOptimal cooperative jamming to enhance physical layer security using relays,\u201d IEEE Trans. Signal Process., vol.59, no.3, pp.1317-1322, March 2011. 10.1109\/tsp.2010.2092774","DOI":"10.1109\/TSP.2010.2092774"},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] R. Hooshmand and M.R. Aref, \u201cPolar code-based secure channel coding scheme with small key size,\u201d IET Commun., vol.11, no.15, pp.2357-2361, Oct. 2017. 10.1049\/iet-com.2016.1489","DOI":"10.1049\/iet-com.2016.1489"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] Y. Peng, P. Wang, W. Xiang, and Y. Li, \u201cSecret key generation based on estimated channel state information for TDD-OFDM systems over fading channels,\u201d IEEE Trans. Wireless Commun., vol.16, no.8, pp.5176-5186, Aug. 2017. 10.1109\/twc.2017.2706657","DOI":"10.1109\/TWC.2017.2706657"},{"key":"21","doi-asserted-by":"publisher","unstructured":"[21] K. Zeng, \u201cPhysical layer key generation in wireless networks: Challenges and opportunities,\u201d IEEE Commun. Mag., vol.53, no.6, pp.33-39, 2015. 10.1109\/mcom.2015.7120014","DOI":"10.1109\/MCOM.2015.7120014"},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] P. Chen, Y. Fang, K. Su, and G. Chen, \u201cDesign of a capacity-approaching chaos-based multi-access transmission system,\u201d IEEE Trans. Veh. Technol., vol.66, no.12, pp.10806-10816, Dec. 2017. 10.1109\/tvt.2017.2723608","DOI":"10.1109\/TVT.2017.2723608"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] Z.X. Wang, K.Y. Sha, and X.L. Gao, \u201cDigital watermarking technology based on LDPC code and chaotic sequence,\u201d IEEE Access, vol.10, pp.38785-38792, April 2022. 10.1109\/access.2022.3166475","DOI":"10.1109\/ACCESS.2022.3166475"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] E. Okamoto and Y. Inaba, \u201cA chaos MIMO transmission scheme using turbo principle for secure channel-coded transmission,\u201d IEICE, Trans. Commun., vol.E98-B, no.8, pp.1482-1491, Aug. 2015. 10.1587\/transcom.e98.b.1482","DOI":"10.1587\/transcom.E98.B.1482"},{"key":"25","doi-asserted-by":"publisher","unstructured":"[25] K. Asano, M. Okumura, T. Abe, E. Okamoto, and T. Yamamoto, \u201cHigh-quality secure wireless transmission scheme using polar codes and radio-wave encrypted modulation,\u201d IEICE Trans. Commun., vol.E106-B, no.4, pp.374-383, April 2023. 10.1587\/transcom.2022ebp3098","DOI":"10.1587\/transcom.2022EBP3098"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] E. Arikan, \u201cChannel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels,\u201d IEEE Trans. Inf. Theory, vol.55, no.7, pp.3051-3073, July 2009. 10.1109\/tit.2009.2021379","DOI":"10.1109\/TIT.2009.2021379"},{"key":"27","doi-asserted-by":"publisher","unstructured":"[27] S.B. Korada and R. Urbanke, \u201cPolar codes are optimal for lossy source coding,\u201d IEEE Trans. Inf. Theory, vol.56, no.4, pp.1751-1768, March 2010. 10.1109\/tit.2010.2040961","DOI":"10.1109\/TIT.2010.2040961"},{"key":"28","doi-asserted-by":"publisher","unstructured":"[28] I. Tal and A. Vardy, \u201cList decoding of polar codes,\u201d IEEE Trans. Inf. Theory, vol.61, no.5, pp.2213-2226, May 2015. 10.1109\/tit.2015.2410251","DOI":"10.1109\/TIT.2015.2410251"},{"key":"29","doi-asserted-by":"publisher","unstructured":"[29] K. Niu and K. Chen, \u201cCRC-aided decoding of polar codes,\u201d IEEE Commun. Lett., vol.16, no.10, pp.1668-1671, Sept. 2012. 10.1109\/lcomm.2012.090312.121501","DOI":"10.1109\/LCOMM.2012.090312.121501"},{"key":"30","unstructured":"[30] RAN1 Chairman&apos;s Notes, \u201cFinal report of 3GPP TSG RAN WG1 #87 v1.0.0,\u201d 3GPP TSG-RAN WG1 #87, Technical Report, 2016."},{"key":"31","doi-asserted-by":"publisher","unstructured":"[31] R. Wang and R. Liu, \u201cA novel puncturing scheme for polar codes,\u201d IEEE Commun. Lett., vol.18, no.12, pp.2081-2084, Dec. 2014. 10.1109\/lcomm.2014.2364845","DOI":"10.1109\/LCOMM.2014.2364845"},{"key":"32","doi-asserted-by":"publisher","unstructured":"[32] L. Li, Z. Xu, and Y. Hu, \u201cChannel estimation with systematic polar codes,\u201d IEEE Trans. Veh. Technol., vol.67, no.6, pp.4880-4889, June 2018. 10.1109\/tvt.2018.2806364","DOI":"10.1109\/TVT.2018.2806364"},{"key":"33","doi-asserted-by":"publisher","unstructured":"[33] M.A.M. Sayed, R. Liu, and C. Zhang, \u201cA novel scrambler design for enhancing secrecy transmission based on polar code,\u201d IEEE Commun. Lett., vol.21, no.8, pp.1679-1682, Aug. 2017. 10.1109\/lcomm.2017.2697427","DOI":"10.1109\/LCOMM.2017.2697427"},{"key":"34","doi-asserted-by":"publisher","unstructured":"[34] X. Lu, J. Lei, W. Li, K. Lai, and Z. Pan, \u201cPhysical layer encryption algorithm based on polar codes and chaotic sequences,\u201d IEEE Access, vol.7, pp.4380-4390, Dec. 2018. 10.1109\/access.2018.2888883","DOI":"10.1109\/ACCESS.2018.2888883"},{"key":"35","doi-asserted-by":"publisher","unstructured":"[35] R.M. Oliveira and R.C. De Lamare, \u201cPolar codes based on piecewise Gaussian approximation: Design and analysis,\u201d IEEE Access, vol.10, pp.73571-73582, July 2022. 10.1109\/access.2022.3190393","DOI":"10.1109\/ACCESS.2022.3190393"},{"key":"36","doi-asserted-by":"publisher","unstructured":"[36] M. Adil, S. Wyne, and S.J. Nawaz, \u201cOn quantization for secret key generation from wireless channel samples,\u201d IEEE Access, vol.9, pp.21653-21668, Jan. 2021. 10.1109\/access.2021.3055561","DOI":"10.1109\/ACCESS.2021.3055561"},{"key":"37","doi-asserted-by":"publisher","unstructured":"[37] R.M. May, \u201cSimple mathematical models with very complicated dynamics,\u201d Nature, vol.261, pp.459-467, June 1976. 10.1038\/261459a0","DOI":"10.1038\/261459a0"},{"key":"38","doi-asserted-by":"publisher","unstructured":"[38] M. Okumura, T. Kaga, E. Okamoto, and T. Yamamoto, \u201cImprovement of channel coding gain of chaos modulation using logistic maps,\u201d IEICE Commun. Express, vol.10, no.9, pp.1-6, 2021. 10.1587\/comex.2021xbl0111","DOI":"10.1587\/comex.2021XBL0111"},{"key":"39","doi-asserted-by":"publisher","unstructured":"[39] L. Xiang, Y. Liu, Z.B. Kaykac Egilmez, and R.G. Maunder, \u201cSoft list decoding of polar codes,\u201d IEEE Trans. Veh. Technol., vol.69, no.11, pp.13921-13926, Sept. 2020. 10.1109\/tvt.2020.3021258","DOI":"10.1109\/TVT.2020.3021258"},{"key":"40","doi-asserted-by":"publisher","unstructured":"[40] V. Bioglio, C. Condo, and I. Land, \u201cDesign of polar codes in 5G new radio,\u201d IEEE Commun. Surveys Tuts., vol.23, no.1, pp.29-40, Jan. 2021. 10.1109\/comst.2020.2967127","DOI":"10.1109\/COMST.2020.2967127"},{"key":"41","doi-asserted-by":"publisher","unstructured":"[41] R.S. Zakariyya, K.H. Jewel, A.O. Fadamiro, O.J. Famoriji, and F. Lin, \u201cAn efficient polar coding scheme for uplink data transmission in narrowband Internet of Things systems,\u201d IEEE Access, vol.8, pp.191472-191481, Oct. 2020. 10.1109\/access.2020.3032636","DOI":"10.1109\/ACCESS.2020.3032636"},{"key":"42","doi-asserted-by":"publisher","unstructured":"[42] J. Jiao, K. Liang, B. Feng, Y. Wang, S. Wu, and Q. Zhang, \u201cJoint channel estimation and decoding for polar coded SCMA system over fading channels,\u201d IEEE Trans. Cogn. Commun. Netw., vol.7, no.1, pp.210-221, March 2021. 10.1109\/tccn.2020.2991425","DOI":"10.1109\/TCCN.2020.2991425"},{"key":"43","doi-asserted-by":"publisher","unstructured":"[43] T. Kaga, M. Okumura, E. Okamoto, and T. Yamamoto, \u201cMulti-level encrypted transmission scheme using hybrid chaos and linear modulation,\u201d IEICE Trans. Commun., vol.E105-B, no.5, pp.638-647, May 2022. 10.1587\/transcom.2021ebp3092","DOI":"10.1587\/transcom.2021EBP3092"},{"key":"44","doi-asserted-by":"publisher","unstructured":"[44] H. Sun, Y. Wang, R. Tian, and H. Zhao, \u201cA nearly optimal method of polar code constructions for the AWGN channel,\u201d IEEE Access, vol.9, pp.17266-17274, Dec. 2020. 10.1109\/access.2020.3047127","DOI":"10.1109\/ACCESS.2020.3047127"}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E106.B\/10\/E106.B_2022EBT0007\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T15:02:11Z","timestamp":1704898931000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E106.B\/10\/E106.B_2022EBT0007\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,1]]},"references-count":44,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.2022ebt0007","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"value":"0916-8516","type":"print"},{"value":"1745-1345","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,1]]},"article-number":"2022EBT0007"}}