Highly reliable DHR-based polar compilation code communication method

The advent of fifth-generation mobile communication technology, 5G, has raised the bar for data transmission rates, information security, and reliability. Polar codes, the channel coding scheme in the 5G communication standard, encounter issues of singularity, limitations, and passivity in the face...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Computer networks (Amsterdam, Netherlands : 1999) Ročník 252; s. 110673
Hlavní autoři: Zheng, Yulu, Gu, Tiansheng, Liu, Shangdong, Shao, Sisi, Yang, Qian, Du, Hongyu, Shi, Yuchen, Nie, Yijun, Ji, Zongkai, Ji, Yimu
Médium: Journal Article
Jazyk:angličtina
Vydáno: Elsevier B.V 01.10.2024
Témata:
ISSN:1389-1286
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract The advent of fifth-generation mobile communication technology, 5G, has raised the bar for data transmission rates, information security, and reliability. Polar codes, the channel coding scheme in the 5G communication standard, encounter issues of singularity, limitations, and passivity in the face of unknown attacks. Therefore, this study introduces a highly reliable DHR-based polar coding communication approach. Drawing parallels between cyber attacks and channel noise, the method incorporates reconfigurable executors, decoding decisions, strategy scheduling, and other mechanisms to enable active defense. The True Relatively Axiom (TRA) is employed to theoretically validate the method’s heterogeneity, redundancy, and dynamics. Comparative simulation experiments with traditional polar decoding algorithms, such as SCL, SC, BP, SCAN, and SSC decoding algorithms, demonstrate that the proposed method not only improves secure transmission efficiency but also guarantees secure and reliable transmission across various attack scenarios. Our code is available at https://github.com/yuluzi/my-code.git.
AbstractList The advent of fifth-generation mobile communication technology, 5G, has raised the bar for data transmission rates, information security, and reliability. Polar codes, the channel coding scheme in the 5G communication standard, encounter issues of singularity, limitations, and passivity in the face of unknown attacks. Therefore, this study introduces a highly reliable DHR-based polar coding communication approach. Drawing parallels between cyber attacks and channel noise, the method incorporates reconfigurable executors, decoding decisions, strategy scheduling, and other mechanisms to enable active defense. The True Relatively Axiom (TRA) is employed to theoretically validate the method’s heterogeneity, redundancy, and dynamics. Comparative simulation experiments with traditional polar decoding algorithms, such as SCL, SC, BP, SCAN, and SSC decoding algorithms, demonstrate that the proposed method not only improves secure transmission efficiency but also guarantees secure and reliable transmission across various attack scenarios. Our code is available at https://github.com/yuluzi/my-code.git.
ArticleNumber 110673
Author Du, Hongyu
Shao, Sisi
Yang, Qian
Liu, Shangdong
Shi, Yuchen
Nie, Yijun
Zheng, Yulu
Ji, Yimu
Gu, Tiansheng
Ji, Zongkai
Author_xml – sequence: 1
  givenname: Yulu
  orcidid: 0009-0009-2738-7456
  surname: Zheng
  fullname: Zheng, Yulu
  organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
– sequence: 2
  givenname: Tiansheng
  surname: Gu
  fullname: Gu, Tiansheng
  organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
– sequence: 3
  givenname: Shangdong
  surname: Liu
  fullname: Liu, Shangdong
  organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
– sequence: 4
  givenname: Sisi
  surname: Shao
  fullname: Shao, Sisi
  organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
– sequence: 5
  givenname: Qian
  surname: Yang
  fullname: Yang, Qian
  organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
– sequence: 6
  givenname: Hongyu
  surname: Du
  fullname: Du, Hongyu
  organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
– sequence: 7
  givenname: Yuchen
  surname: Shi
  fullname: Shi, Yuchen
  organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
– sequence: 8
  givenname: Yijun
  surname: Nie
  fullname: Nie, Yijun
  organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
– sequence: 9
  givenname: Zongkai
  surname: Ji
  fullname: Ji, Zongkai
  organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
– sequence: 10
  givenname: Yimu
  orcidid: 0009-0003-0796-5294
  surname: Ji
  fullname: Ji, Yimu
  email: jiym@njupt.edu.cn
  organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
BookMark eNp9j81OwzAQhH0oEm3hDTjkBRK8tpMmFyRUCkGqhITgbPlnTV0lcWUHpL49qcKZy-5qtDOab0UWQxiQkDugBVCo7o-FCf2AY8EoEwUArTZ8QZbA6yYHVlfXZJXSkVIqBKuXZNf6r0N3ziJ2XukOs6f2Pdcqoc1OoVMxm9JOvlOjD8N0W7wI_ffgzSz1OB6CvSFXTnUJb__2mnw-7z62bb5_e3ndPu5zw8pyzJXmDCtFlaFls-GiBs4boZ1tnAWnK9to6rBWNZ-GK60poWJqetTQoADN10TMuSaGlCI6eYq-V_EsgcoLvjzKGV9e8OWMP9keZhtO3X48RpmMx8Gg9RHNKG3w_wf8ArK7ag8
Cites_doi 10.1007/s11432-022-3623-y
10.1109/COMST.2019.2916180
10.1109/COMST.2020.2967127
10.1109/TIT.2009.2021379
10.1109/TIT.2022.3228862
10.1109/LCOMM.2019.2910059
10.1109/JSAC.2014.140515
10.1109/LCOMM.2018.2850772
10.1016/j.telpol.2022.102327
10.23919/JCC.2023.01.013
10.1109/TIT.2015.2410251
10.1109/LWC.2017.2743080
10.1109/TWC.2020.3022922
10.1109/TCOMM.2013.070213.120789
ContentType Journal Article
Copyright 2024 Elsevier B.V.
Copyright_xml – notice: 2024 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.comnet.2024.110673
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
ExternalDocumentID 10_1016_j_comnet_2024_110673
S138912862400505X
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
6OB
7-5
71M
77K
8P~
AABNK
AACTN
AAEDT
AAEDW
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABFNM
ABMAC
ABTAH
ABXDB
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJOXV
AKRWK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
AXJTR
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EJD
EO8
EO9
EP2
EP3
F0J
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
PQQKQ
Q38
R2-
RIG
ROL
RPZ
RXW
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
TAE
TN5
ZMT
ZY4
~G-
77I
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ACLOT
ACVFH
ADCNI
AEIPS
AEUPX
AFJKZ
AFPUW
AIGII
AIIUN
AKBMS
AKYEP
ANKPU
APXCP
CITATION
EFKBS
EFLBG
~HD
ID FETCH-LOGICAL-c255t-ab32e6a0ac059734813394bfd9fd1fb6d9b0fe8a83e8af5dc5162a734b19e41b3
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001288258100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1389-1286
IngestDate Sat Nov 29 05:30:37 EST 2025
Sat Aug 24 15:41:40 EDT 2024
IsPeerReviewed true
IsScholarly true
Keywords Cyberspace security
Polar code
Active defense
The true relatively axiom
DHR
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c255t-ab32e6a0ac059734813394bfd9fd1fb6d9b0fe8a83e8af5dc5162a734b19e41b3
ORCID 0009-0003-0796-5294
0009-0009-2738-7456
ParticipantIDs crossref_primary_10_1016_j_comnet_2024_110673
elsevier_sciencedirect_doi_10_1016_j_comnet_2024_110673
PublicationCentury 2000
PublicationDate October 2024
2024-10-00
PublicationDateYYYYMMDD 2024-10-01
PublicationDate_xml – month: 10
  year: 2024
  text: October 2024
PublicationDecade 2020
PublicationTitle Computer networks (Amsterdam, Netherlands : 1999)
PublicationYear 2024
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Ahmad, Shahabuddin, Kumar, Okwuibe, Gurtov, Ylianttila (b1) 2019; 21
Lin, Li, Hou, Yang, Li (b27) 2017
Pan, Zhang, Ma, Yao, Ji (b29) 2021; 42
Mendonça, Damásio, de Freitas, Oliveira, Cichy, Nicita (b3) 2022; 46
Song, Liu, Wei, Zhang, Tan (b28) 2020; 41
Qin (b20) 2020
Gao, Dai, Niu (b8) 2019
Arikan (b9) 2009; 55
He, Du (b32) 2016; 42
Fayyaz, Barry (b16) 2014; 32
Xu (b23) 2020
Chen, Niu, Lin (b15) 2013; 61
Mondelli, Hashemi, Cioffi, Goldsmith (b17) 2020; 20
Wang, Wei, Chen, Yin, Li, Zhang (b7) 2023; 66
Wu (b10) 2020
Tal, Vardy (b12) 2015; 61
Zhang, Ma, Wu (b26) 2017; 2
Zhang (b22) 2021
Li, Ye, Hu (b5) 2022; 69
Lu, Huang, Cheng, Qin (b31) 2021; 44
Liang, Liu, Zhang, Zhang (b11) 2017; 6
Tong, Zhang, Zhang, Wu (b25) 2017; 28
Wei, Zhang, Su, Xue, Wen (b30) 2021; 47
Wu (b24) 2014; 30
Lin, Xiong, Yan (b13) 2015
Du, Xu (b33) 2016
Abidrabbu, Al-Mistarihi (b2) 2022; 33
Fang (b21) 2021
Wu, Wei (b18) 2019
Zhou, Lin, Wang (b19) 2019; 23
Pillet, Bioglio, Land (b34) 2022
Lu, Zhao, Lei, Wang, Zhao (b6) 2023; 20
Bioglio, Condo, Land (b4) 2020; 23
Elkelesh, Ebada, Cammerer, Ten Brink (b14) 2018; 22
Lu (10.1016/j.comnet.2024.110673_b31) 2021; 44
Abidrabbu (10.1016/j.comnet.2024.110673_b2) 2022; 33
Li (10.1016/j.comnet.2024.110673_b5) 2022; 69
Tal (10.1016/j.comnet.2024.110673_b12) 2015; 61
Ahmad (10.1016/j.comnet.2024.110673_b1) 2019; 21
Arikan (10.1016/j.comnet.2024.110673_b9) 2009; 55
Fayyaz (10.1016/j.comnet.2024.110673_b16) 2014; 32
Lin (10.1016/j.comnet.2024.110673_b27) 2017
Fang (10.1016/j.comnet.2024.110673_b21) 2021
Tong (10.1016/j.comnet.2024.110673_b25) 2017; 28
Du (10.1016/j.comnet.2024.110673_b33) 2016
Bioglio (10.1016/j.comnet.2024.110673_b4) 2020; 23
Pan (10.1016/j.comnet.2024.110673_b29) 2021; 42
Wei (10.1016/j.comnet.2024.110673_b30) 2021; 47
Zhang (10.1016/j.comnet.2024.110673_b22) 2021
Wu (10.1016/j.comnet.2024.110673_b24) 2014; 30
Gao (10.1016/j.comnet.2024.110673_b8) 2019
Liang (10.1016/j.comnet.2024.110673_b11) 2017; 6
Lin (10.1016/j.comnet.2024.110673_b13) 2015
Wang (10.1016/j.comnet.2024.110673_b7) 2023; 66
Wu (10.1016/j.comnet.2024.110673_b10) 2020
Wu (10.1016/j.comnet.2024.110673_b18) 2019
Mendonça (10.1016/j.comnet.2024.110673_b3) 2022; 46
Song (10.1016/j.comnet.2024.110673_b28) 2020; 41
Zhou (10.1016/j.comnet.2024.110673_b19) 2019; 23
Mondelli (10.1016/j.comnet.2024.110673_b17) 2020; 20
Lu (10.1016/j.comnet.2024.110673_b6) 2023; 20
Qin (10.1016/j.comnet.2024.110673_b20) 2020
Xu (10.1016/j.comnet.2024.110673_b23) 2020
He (10.1016/j.comnet.2024.110673_b32) 2016; 42
Zhang (10.1016/j.comnet.2024.110673_b26) 2017; 2
Elkelesh (10.1016/j.comnet.2024.110673_b14) 2018; 22
Pillet (10.1016/j.comnet.2024.110673_b34) 2022
Chen (10.1016/j.comnet.2024.110673_b15) 2013; 61
References_xml – start-page: 24
  year: 2016
  end-page: 27
  ident: b33
  article-title: The encode and decode theory of polar code and its performance simulating
  publication-title: 2016 8th IEEE International Conference on Communication Software and Networks
– volume: 22
  start-page: 1536
  year: 2018
  end-page: 1539
  ident: b14
  article-title: Belief propagation list decoding of polar codes
  publication-title: IEEE Commun. Lett.
– year: 2020
  ident: b10
  article-title: Cyberspace mimic defense: Generalized robust control and endogenous security
– year: 2021
  ident: b21
  article-title: Study of SC Decoding Algorithm for Improved Polarization Codes In eMBB Scenarios
– start-page: 2670
  year: 2017
  end-page: 2675
  ident: b27
  article-title: MDFS: A mimic defense theory based architecture for distributed file system
  publication-title: 2017 IEEE International Conference on Big Data (Big Data)
– start-page: 1
  year: 2019
  end-page: 6
  ident: b8
  article-title: Learning to decode polar codes with quantized LLRs passing
  publication-title: 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications
– start-page: 279
  year: 2019
  end-page: 284
  ident: b18
  article-title: Heterogeneous executors scheduling algorithm for mimic defense systems
  publication-title: 2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology
– year: 2020
  ident: b20
  article-title: Research On Compilation Code Algorithm of Polarized Codes in 5G Application Scenario
– volume: 6
  start-page: 798
  year: 2017
  end-page: 801
  ident: b11
  article-title: Analysis and adaptive design of polar coded HARQ transmission under SC-list decoding
  publication-title: IEEE Wirel. Commun. Lett.
– start-page: 110
  year: 2022
  end-page: 115
  ident: b34
  article-title: Classification of automorphisms for the decoding of polar codes
  publication-title: ICC 2022-IEEE International Conference on Communications
– start-page: 1
  year: 2015
  end-page: 6
  ident: b13
  article-title: Reduced complexity belief propagation decoders for polar codes
  publication-title: 2015 IEEE Workshop on Signal Processing Systems (SiPS)
– volume: 61
  start-page: 3100
  year: 2013
  end-page: 3107
  ident: b15
  article-title: Improved successive cancellation decoding of polar codes
  publication-title: IEEE Trans. Commun.
– volume: 33
  year: 2022
  ident: b2
  article-title: Performance analysis of 5G heterogeneous networks under the impact of aggregate interference over Nakagami-m fading channels
  publication-title: Trans. Emerg. Telecommun. Technol.
– volume: 42
  start-page: 13
  year: 2016
  end-page: 16
  ident: b32
  article-title: Research on a high performance low complexity polar code coding and decoding algorithm
  publication-title: Appl. Electron. Tech.
– volume: 30
  start-page: 1
  year: 2014
  end-page: 7
  ident: b24
  article-title: Meaning and vision of mimic computing and mimic security defense
  publication-title: Telecommun. Sci.
– volume: 20
  start-page: 18
  year: 2020
  end-page: 27
  ident: b17
  article-title: Sublinear latency for simplified successive cancellation decoding of polar codes
  publication-title: IEEE Trans. Wireless Commun.
– volume: 46
  year: 2022
  ident: b3
  article-title: The rise of 5G technologies and systems: A quantitative analysis of knowledge production
  publication-title: Telecommun. Policy
– volume: 2
  start-page: 13
  year: 2017
  end-page: 28
  ident: b26
  article-title: The test and analysis of prototype of mimic defense in web servers
  publication-title: J. Cyber Secur.
– volume: 47
  start-page: 30
  year: 2021
  end-page: 35
  ident: b30
  article-title: Higher-order heterogeneity large number judgment algorithms for mimetic defense systems
  publication-title: Comput. Eng.
– volume: 69
  start-page: 2269
  year: 2022
  end-page: 2299
  ident: b5
  article-title: Adjacent-bits-swapped polar codes: A new code construction to speed up polarization
  publication-title: IEEE Trans. Inform. Theory
– volume: 66
  year: 2023
  ident: b7
  article-title: Reduced-search guessing random additive noise decoding of polar codes
  publication-title: Sci. China Inf. Sci.
– year: 2020
  ident: b23
  article-title: Research On Polar Code Decoding Algorithm Based on Deep Learning
– volume: 55
  start-page: 3051
  year: 2009
  end-page: 3073
  ident: b9
  article-title: Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels
  publication-title: IEEE Trans. Inform. Theory
– volume: 23
  start-page: 29
  year: 2020
  end-page: 40
  ident: b4
  article-title: Design of polar codes in 5G new radio
  publication-title: IEEE Commun. Surv. Tutor.
– volume: 32
  start-page: 958
  year: 2014
  end-page: 966
  ident: b16
  article-title: Low-complexity soft-output decoding of polar codes
  publication-title: IEEE J. Sel. Areas Commun.
– volume: 44
  start-page: 8
  year: 2021
  ident: b31
  article-title: Multi-indicator fitted voting algorithm based on improved AHP-FCE modeling
  publication-title: J. Beijing Univ. Posts Telecommun.
– volume: 61
  start-page: 2213
  year: 2015
  end-page: 2226
  ident: b12
  article-title: List decoding of polar codes
  publication-title: IEEE Trans. Inf. Theory
– volume: 41
  year: 2020
  ident: b28
  article-title: Mimetic defense-based endogenous security architecture for ethernet switches
  publication-title: J. Commun. Tongxin Xuebao
– volume: 23
  start-page: 950
  year: 2019
  end-page: 953
  ident: b19
  article-title: Improved fast-SSC-flip decoding of polar codes
  publication-title: IEEE Commun. Lett.
– volume: 21
  start-page: 3682
  year: 2019
  end-page: 3722
  ident: b1
  article-title: Security for 5G and beyond
  publication-title: IEEE Commun. Surv. Tutor.
– volume: 42
  start-page: 37
  year: 2021
  end-page: 47
  ident: b29
  article-title: A mimetic defense approach for process control flow hijacking attacks
  publication-title: J. Commun. Tongxin Xuebao
– year: 2021
  ident: b22
  article-title: Research On Compilation Algorithm of Polar Codes in 5G System
– volume: 20
  start-page: 153
  year: 2023
  end-page: 170
  ident: b6
  article-title: Deep learning aided SCL decoding of polar codes with shifted-pruning
  publication-title: China Commun.
– volume: 28
  start-page: 883
  year: 2017
  end-page: 897
  ident: b25
  article-title: Design and implementation of mimic defense web server
  publication-title: J. Softw.
– volume: 66
  issue: 2
  year: 2023
  ident: 10.1016/j.comnet.2024.110673_b7
  article-title: Reduced-search guessing random additive noise decoding of polar codes
  publication-title: Sci. China Inf. Sci.
  doi: 10.1007/s11432-022-3623-y
– start-page: 1
  year: 2019
  ident: 10.1016/j.comnet.2024.110673_b8
  article-title: Learning to decode polar codes with quantized LLRs passing
– volume: 47
  start-page: 30
  issue: 5
  year: 2021
  ident: 10.1016/j.comnet.2024.110673_b30
  article-title: Higher-order heterogeneity large number judgment algorithms for mimetic defense systems
  publication-title: Comput. Eng.
– volume: 21
  start-page: 3682
  issue: 4
  year: 2019
  ident: 10.1016/j.comnet.2024.110673_b1
  article-title: Security for 5G and beyond
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2019.2916180
– volume: 23
  start-page: 29
  issue: 1
  year: 2020
  ident: 10.1016/j.comnet.2024.110673_b4
  article-title: Design of polar codes in 5G new radio
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2020.2967127
– volume: 44
  start-page: 8
  issue: 2
  year: 2021
  ident: 10.1016/j.comnet.2024.110673_b31
  article-title: Multi-indicator fitted voting algorithm based on improved AHP-FCE modeling
  publication-title: J. Beijing Univ. Posts Telecommun.
– year: 2020
  ident: 10.1016/j.comnet.2024.110673_b23
– volume: 2
  start-page: 13
  issue: 1
  year: 2017
  ident: 10.1016/j.comnet.2024.110673_b26
  article-title: The test and analysis of prototype of mimic defense in web servers
  publication-title: J. Cyber Secur.
– start-page: 24
  year: 2016
  ident: 10.1016/j.comnet.2024.110673_b33
  article-title: The encode and decode theory of polar code and its performance simulating
– start-page: 1
  year: 2015
  ident: 10.1016/j.comnet.2024.110673_b13
  article-title: Reduced complexity belief propagation decoders for polar codes
– start-page: 110
  year: 2022
  ident: 10.1016/j.comnet.2024.110673_b34
  article-title: Classification of automorphisms for the decoding of polar codes
– volume: 55
  start-page: 3051
  issue: 7
  year: 2009
  ident: 10.1016/j.comnet.2024.110673_b9
  article-title: Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels
  publication-title: IEEE Trans. Inform. Theory
  doi: 10.1109/TIT.2009.2021379
– volume: 41
  issue: 5
  year: 2020
  ident: 10.1016/j.comnet.2024.110673_b28
  article-title: Mimetic defense-based endogenous security architecture for ethernet switches
  publication-title: J. Commun. Tongxin Xuebao
– volume: 69
  start-page: 2269
  issue: 4
  year: 2022
  ident: 10.1016/j.comnet.2024.110673_b5
  article-title: Adjacent-bits-swapped polar codes: A new code construction to speed up polarization
  publication-title: IEEE Trans. Inform. Theory
  doi: 10.1109/TIT.2022.3228862
– volume: 23
  start-page: 950
  issue: 6
  year: 2019
  ident: 10.1016/j.comnet.2024.110673_b19
  article-title: Improved fast-SSC-flip decoding of polar codes
  publication-title: IEEE Commun. Lett.
  doi: 10.1109/LCOMM.2019.2910059
– volume: 32
  start-page: 958
  issue: 5
  year: 2014
  ident: 10.1016/j.comnet.2024.110673_b16
  article-title: Low-complexity soft-output decoding of polar codes
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2014.140515
– volume: 22
  start-page: 1536
  issue: 8
  year: 2018
  ident: 10.1016/j.comnet.2024.110673_b14
  article-title: Belief propagation list decoding of polar codes
  publication-title: IEEE Commun. Lett.
  doi: 10.1109/LCOMM.2018.2850772
– volume: 46
  issue: 4
  year: 2022
  ident: 10.1016/j.comnet.2024.110673_b3
  article-title: The rise of 5G technologies and systems: A quantitative analysis of knowledge production
  publication-title: Telecommun. Policy
  doi: 10.1016/j.telpol.2022.102327
– volume: 30
  start-page: 1
  issue: 7
  year: 2014
  ident: 10.1016/j.comnet.2024.110673_b24
  article-title: Meaning and vision of mimic computing and mimic security defense
  publication-title: Telecommun. Sci.
– volume: 33
  issue: 9
  year: 2022
  ident: 10.1016/j.comnet.2024.110673_b2
  article-title: Performance analysis of 5G heterogeneous networks under the impact of aggregate interference over Nakagami-m fading channels
  publication-title: Trans. Emerg. Telecommun. Technol.
– volume: 42
  start-page: 13
  issue: 7
  year: 2016
  ident: 10.1016/j.comnet.2024.110673_b32
  article-title: Research on a high performance low complexity polar code coding and decoding algorithm
  publication-title: Appl. Electron. Tech.
– start-page: 2670
  year: 2017
  ident: 10.1016/j.comnet.2024.110673_b27
  article-title: MDFS: A mimic defense theory based architecture for distributed file system
– volume: 20
  start-page: 153
  issue: 1
  year: 2023
  ident: 10.1016/j.comnet.2024.110673_b6
  article-title: Deep learning aided SCL decoding of polar codes with shifted-pruning
  publication-title: China Commun.
  doi: 10.23919/JCC.2023.01.013
– volume: 61
  start-page: 2213
  issue: 5
  year: 2015
  ident: 10.1016/j.comnet.2024.110673_b12
  article-title: List decoding of polar codes
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.2015.2410251
– start-page: 279
  year: 2019
  ident: 10.1016/j.comnet.2024.110673_b18
  article-title: Heterogeneous executors scheduling algorithm for mimic defense systems
– year: 2020
  ident: 10.1016/j.comnet.2024.110673_b20
– volume: 6
  start-page: 798
  issue: 6
  year: 2017
  ident: 10.1016/j.comnet.2024.110673_b11
  article-title: Analysis and adaptive design of polar coded HARQ transmission under SC-list decoding
  publication-title: IEEE Wirel. Commun. Lett.
  doi: 10.1109/LWC.2017.2743080
– year: 2020
  ident: 10.1016/j.comnet.2024.110673_b10
– volume: 20
  start-page: 18
  issue: 1
  year: 2020
  ident: 10.1016/j.comnet.2024.110673_b17
  article-title: Sublinear latency for simplified successive cancellation decoding of polar codes
  publication-title: IEEE Trans. Wireless Commun.
  doi: 10.1109/TWC.2020.3022922
– volume: 42
  start-page: 37
  issue: 1
  year: 2021
  ident: 10.1016/j.comnet.2024.110673_b29
  article-title: A mimetic defense approach for process control flow hijacking attacks
  publication-title: J. Commun. Tongxin Xuebao
– volume: 61
  start-page: 3100
  issue: 8
  year: 2013
  ident: 10.1016/j.comnet.2024.110673_b15
  article-title: Improved successive cancellation decoding of polar codes
  publication-title: IEEE Trans. Commun.
  doi: 10.1109/TCOMM.2013.070213.120789
– year: 2021
  ident: 10.1016/j.comnet.2024.110673_b21
– year: 2021
  ident: 10.1016/j.comnet.2024.110673_b22
– volume: 28
  start-page: 883
  issue: 4
  year: 2017
  ident: 10.1016/j.comnet.2024.110673_b25
  article-title: Design and implementation of mimic defense web server
  publication-title: J. Softw.
SSID ssj0004428
Score 2.4312332
Snippet The advent of fifth-generation mobile communication technology, 5G, has raised the bar for data transmission rates, information security, and reliability....
SourceID crossref
elsevier
SourceType Index Database
Publisher
StartPage 110673
SubjectTerms Active defense
Cyberspace security
DHR
Polar code
The true relatively axiom
Title Highly reliable DHR-based polar compilation code communication method
URI https://dx.doi.org/10.1016/j.comnet.2024.110673
Volume 252
WOSCitedRecordID wos001288258100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  issn: 1389-1286
  databaseCode: AIEXJ
  dateStart: 19990114
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: false
  ssIdentifier: ssj0004428
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELaWLQc4IJ6ivOQDt8rVOs468XEFiwqHCtEiLVwiO7ZFqm1abXercu0v74ydV6Gq6IGLFc0mTjbzaTyezDdDyPvMZZ4b6xlXRrHUW8FMnksGix1oW2jkUoZmE9n-fr5YqK-j0WXLhTlfZnWdX1yo0_-qapCBspE6ewd1d5OCAI5B6TCC2mH8J8Vj5sbyN5JUqkCL-rj3jeFaZbEhg16FJPIqZsDtIKEdBT1HpGkpPfRZ28YPO3VMGQ9x2tkxVliwDZx61nATYlBqEGL4-ctFi_Jjs9x0CT-bCBVYKvHnLjGoCvIDjGPbk14OghDUPajOqmGkIkm7nLfWuIJzxGA9lEPrm8QCto395FjRTtxo2mOU4Qg1A393F2-w259-vZL2Hytcl3fYprQdFXGWAmcp4iz3yFaSTVU-Jluzz_PFl55dm4YOvd3TtwTMkCX499Pc7OAMnJbDx-RRs9ugs4iSJ2Tk6qfk4aAG5TMyj3ihLV5ohxca8EIHeKGIF3oNLzTi5Tn5_ml--GGPNb01WAmbyDXTRiRO6okuwb_GCkdcCJUab5W33BtplZl4l-tcwOCntpxymWg40XDlUm7ECzKuT2r3klA30cb5LJOylOnEah2-DsO2X1gulVbbhLUvpDiNJVSK2xSxTbL2rRWNGxjduwKgcOuVr-54p9fkQY_TN2S8Xm3cW3K_PF9XZ6t3DQ6uAJQLft4
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Highly+reliable+DHR-based+polar+compilation+code+communication+method&rft.jtitle=Computer+networks+%28Amsterdam%2C+Netherlands+%3A+1999%29&rft.au=Zheng%2C+Yulu&rft.au=Gu%2C+Tiansheng&rft.au=Liu%2C+Shangdong&rft.au=Shao%2C+Sisi&rft.date=2024-10-01&rft.issn=1389-1286&rft.volume=252&rft.spage=110673&rft_id=info:doi/10.1016%2Fj.comnet.2024.110673&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_comnet_2024_110673
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1389-1286&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1389-1286&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1389-1286&client=summon