Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy
The existing physical layer security schemes, which are based on the key generation model and the wire-tap channel model, achieve security by utilizing channel reciprocity entropy and noise entropy, respective...