[1] 総務省, “2020 年の 5G 実現に向けた取組,” https://www.soumu.go.jp/main_conten t/000593247.pdf, Dec. 2018.
[2] 総務省, “第 5 世代移動通信システム(5G)その概要と今後の展開,” https://www.sou mu.go.jp/main_content/000670738.pdf, Feb. 2020.
[3] 総務省, “令和2年度 地域課題解決型ローカル 5G 等の実現に向けた開発実証,” htt ps://www.soumu.go.jp/main_content/000712738.pdf, Oct. 2020.
[4] E. Piri, P. Ruuska, T. Kanstrén, J. Mäkelä, J. Korva, A. Hekkala, A. Pouttu, O. Liinamaa, “5GTN: A test network for 5G application development and testin g,” 2016 European Conference on Networks and Communications (EuCNC), p p. 27-30, June 2016.
[5] 浅井 裕介, “次世代高効率無線 LAN 規格 IEEE 802.11ax に関する国内外の動向,” h ttps://www.tele.soumu.go.jp/resource/j/equ/mra/pdf/30/j/15.pdf, Oct. 2019.
[6] 6G Flagship, “Key Drivers and Research Challenges for 6G Ubiquitous Wireless Intelligence,” http://jultika.oulu.fi/files/isbn9789526223544.pdf, Sept. 2019.
[7] 株式会社NTTドコモ, “5G の高度化と 6G,” https://www.nttdocomo.co.jp/binary/ pdf/corporate/technology/whitepaper_6g/DOCOMO_6G_White_PaperJP_2020012 2.pdf, Jan.,2020.
[8] 総務省, “Beyond 5G 推進戦略 概要,” https://www.soumu.go.jp/main_content/000 702111.pdf, June 2020.
[9] A. Avizienis, J.-C. Laprie, B. Randell, C. Landwehr, “Basic concepts and taxono my of dependable and secure computing,” IEEE Transactions on Dependable a nd Secure Computing, vol.1, no.1, pp.11-33, Oct. 2004.
[10] 総務省, “Beyond 5G 時代における新たな ICT 技術戦略について,” https://www.iei ce.org/jpn/kikakusenryaku/pdf/20200916_02.pdf, Sept. 2020.
[11] A. Testa, M. Cinque, A. Coronato, G. D. Pietro, J. C. Augusto, “Heuristic stra tegies for assessing wireless sensor network resiliency: an event-based formal ap proach,” Journal of Heuristics, vol.21, no.2, pp.145-175, April 2015.
[12] T. C. Jesus, P. Portugal, F. Vasques, D. G. Costa, “Automated Methodology fo r Dependability Evaluation of Wireless Visual Sensor Networks,” Sensors, vol.1 8, no.8, 2629, Aug. 2018.
[13] S. W. Oh, Y. Ma, M.-H. Tao, E. C. Y. Peh, “An overview and comparison of TV White Space regulations worldwide,” International Conference on Frontiers of Communications, Networks and Applications (ICFCNA 2014), Nov. 2014.
[14] PCAST-report,“Realizing the full potential of government-held spectrum to spur economic growth,” July 2012.
[15] 総務省, “異システム間の周波数共用技術の高度化,” https://www.tele.soumu.go.jp/j /sys/fees/purpose/diffsys/index.htm.
[16] 株式会社国際電気通信基礎技術研究所, 株式会社モバイルテクノ, “3 つの周波数帯 の無線チャネルを用いて同時伝送を行う無線 LAN 技術の有効性を伝送実験により 確認〜より高速で安定な無線 LAN 通信の実現を目指して〜,” https://www.fujitsu. com/jp/group/mtc/documents/resources/news/topics/Press-Release_WLANCA-mt c190328.pdf, March 2019.
[17] V. Srivastava, and M. Motani, “Cross-layer design: a survey and the road ahea d,” IEEE Communications Magazine, vol.43, no.12, pp.112-119, Dec. 2005.
[18] A. D. Wyner, “The wire-tap channel,” The Bell System Technical Journal, vol.5 4, no.8, pp.1355-1387, Oct. 1975.
[19] J. Kreer, “A question of terminology,” IRE Transactions on Information Theory, vol.3, no.3, pp.208, Sept. 1957.
[20] A. Mourad, F. Heigl, P. A. Hoeher, “Performance Evaluation of Concurrent IE EE 802.11 Systems in the Automotive Domain,” 2016 IEEE 41st Conference o n Local Computer Networks (LCN), pp.655-661, Nov. 2016.
[21] H. Han, S. Shakkottai, C. V. Hollot, R. Srikant, D. Towsley, “Multi-Path TCP: A Joint Congestion Control and Routing Scheme to Exploit Path Diversity in t he Internet,” IEEE/ACM Transactions on Networking, vol.14, no.6, pp.1260-12 71, 2006.
[22] IEEE, “IEEE Standard for Information technology--Telecommunications and info rmation exchange between systems Local and metropolitan area networks-- Spe cific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,” IEEE Std 802.11-2016, Dec. 2016.
[23] 3GPP, “Physical channels and modulation (Release 13),” 3GPP TS 36.211 v13. 0.0 (2015-12), Jan. 2016.
[24] 3GPP, “Multiplexing and channel coding (Release 13),” 3GPP TS 36.212 v13. 0.0 (2015-12), Jan. 2016.
[25] 3GPP, “Physical layer procedures (Release 13),” 3GPP TS 36.213 v13.0.1 (201 6-01), Jan. 2016.
[26] 3GPP, “Physical layer; Measurements (Release 13),” 3GPP TS 36.214 v13.0.0 (2015-12), Jan. 2016.
[27] T. Shono, K. Uehara, S. Kubota, “Proposal and evaluation of system diversity f or software defined radio,” 2002 IEEE International Conference on Communica tions, pp.490-496, April 2002.
[28] Y. Takizawa, N. Taniguchi, S. Yamanaka, A. Yamaguchi, and S. Obana, “Traffi c control for cognitive wireless networks composed of IEEE802.11 and IEEE80 2.16,” 2007 IEEE Wireless Communications and Networking Conference, pp.38 34-3840, March 2007.
[29] Y. Cao, L. Zeng, Q. Liu, G. Lei, M. Huang, H. Wang, “Receiver-Assisted Parti al-Reliable Multimedia Multipathing Over Multi-Homed Wireless Networks,” IE EE Access, vol.7, pp.177675-177689, Dec. 2019.
[30] S. Ferlin, S. Kucera, H. Claussen, Ö. Alay, “MPTCP Meets FEC: Supporting L atency-Sensitive Applications Over Heterogeneous Networks,” IEEE/ACM Trans actions on Networking, vol.26, no.5, pp.2005-2018, Oct. 2018.
[31] Y. S. Lim, Y. C. Chen, E. M. Nahum, D. Towsley, and K. W. Lee, “Cross-laye r path management in multi-path transport protocol for mobile devices,” IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, pp.1815-1 823, April 2014.
[32] L. Song, Y. Zhang, R. Yu, W. Yao, Z. Wu, “Cross-Layer Optimized Routing fo r Wireless Sensor Networks Using Dynamic Programming,” 2009 IEEE Internat ional Conference on Communications, June 2009.
[33] M. Basavarajaiah, P. Sharma, “Cross Layer Optimization for Wireless Video Tr ansmission Using Machine Learning,” 2018 7th International Conference on Rel iability, Infocom Technologies and Optimization, pp.308-312, Aug. 2018.
[34] Y. Cao, S. D. Blostein, “Cross-layer optimization of rateless coding over wireles s fading channels,” 2010 25th Biennial Symposium on Communications, pp.144 -149, May 2010.
[35] A. Saif, M. Othman, S. Subramaniam, N. AbdulHamid, “Impact of aggregation headers on aggregating small MSDUs in 802.11n WLANs,” 2010 International Conference on Computer Applications and Industrial Electronics, pp.630-635, D ec. 2010.
[36] D. Chase, “Code combining - A maximum-likelihood decoding approach for co mbining an arbitrary number of noisy packets,” IEEE Transactions on Commun ications, vol.COM-33, no.5, pp.385-393, May 1985.
[37] J. Hagenauer, “Rate-compatible punctured convolutional codes (RCPC codes) a nd their applications,” IEEE Transactions on Communications, vol.36, no.4, pp. 389-400, April 1988.
[38] J. Pirskanen, T. Koskela, A. Pantelidou, H. Wei, T. Levanen and J. Talvitie, “P otential approach to improve WLAN BSS edge performance,” doc.:IEEE 802.11- 13/0852-00, July, 2013.
[39] J. Y. Kim, S. H. Kim, and D. K. Sung, “Hybrid ARQ-based Fairness Enhancem ent in Uplink WLAN,” IEEE Transactions on Wireless Communications, vol.17, no.7, pp.4362-4373, April 2018.
[40] W. Diffie, M. Hellman, “New directions in cryptography,” IEEE Transactions o n Information Theory, vol.22, no.6, pp.644-654, Nov. 1976.
[41] R. Perlman, “An overview of PKI trust models,” IEEE Network, vol.13, no.6, p p.38-43, Nov. 1999.
[42] M. Vandenwauver, R. Govaerts, J. Vandewalle, “Overview of authentication prot ocols,” Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology, pp.108-113, Oct. 1997.
[43] J.E. Hershey, A.A. Hassan, R. Yarlagadda, “Unconventional cryptographic keying variable management,” IEEE Transactions on Communications, vol.43, no.1, p p.3-6, Jan. 1995.
[44] X. Wu, P. Wang, K. Wang, Y. Xu, “Biometric cryptographic key generation bas ed on city block distance,” 2009 Workshop on Applications of Computer Vision (WACV), Dec. 2009.
[45] T. Yang, L. Kong, W. Xin, J. Hu, Z. Chen, “Resisting relay attacks on vehicula r Passive Keyless Entry and start systems,” 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, pp.2232-2236, May 2012.
[46] S. YAMASAKI, T. K. MATSUSHIMA, “A security enhancement technique for wireless communications using secret sharing and physical layer secrecy transmi ssion,” vol.E99-D, no.4, pp.830-838, April 2016.
[47] A. Shamir, “How to share a secret,” Communications of the ACM, vol.22, no.1 1, pp.612-613, Nov. 1979.
[48] X. Gong, P. Hu, K. W. Shum, C. W. Sung, “A Zigzag-Decodable Ramp Secret Sharing Scheme,” IEEE Transactions on Information Forensics and Security, vo l.13, no.8, pp.1906-1916, Feb. 2018.
[49] X. Li, E.P. Ratazzi, “MIMO transmissions with information-theoretic secrecy for secret-key agreement in wireless networks,” MILCOM 2005 - 2005 IEEE Milit ary Communications Conference, Oct. 2005.
[50] J. Rao, S. Vrzic, “Packet duplication for URLLC in 5G dual connectivity archit ecture,” 2018 IEEE Wireless Communications and Networking Conference (WC NC), April 2018.
[51] Y. Wan, Q. Wang, S. Duan, X. Zhang, “RAFH: Reliable Aware Frequency Hop ping Method for Industrial Wireless Sensor Networks,” 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, S ept. 2009.
[52] 総務省, “情報通信審議会 情報通信技術分科会 陸上無線通信委員会 UWB 無線シス テム屋利用検討作業班 報告概要(案),” https://www.soumu.go.jp/main_content/ 000711770.pdf, Oct. 2020.
[53] J. L.Goldwasser, “Shortened and punctured codes and the MacWilliams identitie s,” Linear Algebra and its Applications, vol.253, no.1-3, pp.1-13, March 1997.
[54] H. Mohammadmoradi, M. Heydariaan, O. Gnawali, “SRAC: Simultaneous Rangi ng and Communication in UWB Networks,” 2019 15th International Conferenc e on Distributed Computing in Sensor Systems (DCOSS), pp.9-16, May 2019.
[55] 河井 政宏, 宮路 祐一, 上原 秀幸, 大平 孝, “無線マルチホップネットワークにお けるスマートアンテナを用いた指向性傍受 MAC プロトコル,” 信学論(B), vol.J9 4-B, no.4, pp.555-566, April 2011.
[56] J. Webber, A. Mehbodniya, Y. Hou, K. Yano, and T. Kumagai, “Study on idle slot availability prediction for WLAN using a probabilistic neural network,” 201 7 23rd Asia-Pacific Conference on Communications (APCC), Dec. 2017.
[57] D. Divsalar, H. Jin, R. J McEliece, “Coding theorems for" turbo-like" codes,” 3 6th Annual Allerton Conference on Communication Control and Computing, p p.201-210, Sep. 1998.
[58] F. J. Vázquez-Araújo, M. González-López, L. Castedo, J. Garcia-Frias, “Capacit y Approaching Low-Rate LDGM Codes,” IEEE Transactions on Communication s, vol.59, no.2, pp.352-356, Feb. 2011.
[59] R. Gallager, “Low-density parity-check codes,” IRE Transactions on Information Theory, vol.8, no.1, pp.21-28, Jan. 1962.
[60] I. Domuta, T. P. Palade, E. Puschita, A. Pastrav, “Localization in 802. 15.4z S tandard,” 2020 International Workshop on Antenna Technology (iWAT), Feb. 2 020.
[61] V. Erceg et al., “TGn Channel Models,” doc.:IEEE 802.11-03/940r4, May, 200 4.
[62] J. Barros, M. R. D. Rodrigues, “Secrecy Capacity of Wireless Channels,” 2006 I EEE International Symposium on Information Theory, pp.356-360, July 2006.
[63] S. Leung-Yan-Cheong, M. Hellman, “The Gaussian wire-tap channel,” IEEE Tr ansactions on Information Theory, vol.24, no.4, pp.451-456, Jul. 1978.
[64] A.R. Jiménez, F. Seco, “Comparing Decawave and Bespoon UWB location syste ms: Indoor/outdoor performance analysis,” 2016 International Conference on In door Positioning and Indoor Navigation (IPIN), Oct. 2016.
[65] M. Heydariaan, H. Dabirian, O. Gnawali, “AnguLoc: Concurrent Angle of Arriv al Estimation for Indoor Localization with UWB Radios,” 2020 16th Internation al Conference on Distributed Computing in Sensor Systems (DCOSS), pp.112- 119, May 2020.
[66] C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smolin, “Experimental qu antum cryptography,” Journal of Cryptology, vol.5, no.1, pp.3-28, Jan. 1992.
[67] J.-F. Cheng, Y.-P. E. Wang, and S. Parkvall, “Adaptive Incremental Redundanc y,” 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall, pp.737- 741, Oct. 2003.