Results 1 to 10 of about 448,853 (274)

Physical-Layer Security in 6G Networks [PDF]

open access: yesIEEE Open Journal of the Communications Society, 2021
The sixth generation (6G) of mobile network will be composed by different nodes, from macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full connectivity fabric all around us.
Lorenzo Mucchi   +9 more
doaj   +6 more sources

Security- and Reliability-Guaranteed Transmission Control of Time-Sensitive Physical Layer Security Systems [PDF]

open access: yesEntropy, 2023
In this paper, we consider information transmission over a three-node physical layer security system. Based on the imperfect estimations of the main channel and the eavesdropping channel, we propose reducing the outage probability and interception ...
Jianye Li, Yunquan Dong, Chengsheng Pan
doaj   +2 more sources

Wireless physical layer security. [PDF]

open access: yesProc Natl Acad Sci U S A, 2017
Significance Security is a very important issue in the design and use of wireless networks. Traditional methods of providing security in such networks are impractical for some emerging types of wireless networks due to the light computational abilities of some wireless devices [such as radio-frequency identification (RFID) tags, certain ...
Poor HV, Schaefer RF.
europepmc   +4 more sources

Quantum Security for the Physical Layer [PDF]

open access: yesIEEE Communications Magazine, 2013
The physical layer describes how communication signals are encoded and transmitted across a channel. Physical security often requires either restricting access to the channel or performing periodic manual inspections.
Humble, Travis S.
core   +4 more sources

Physical Layer Security Using Two-Path Successive Relaying [PDF]

open access: yesSensors, 2016
Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this ...
Qian Yu Liau, Chee Yen Leow, Zhiguo Ding
doaj   +2 more sources

An Overview of Key Technologies in Physical Layer Security [PDF]

open access: yesEntropy, 2020
The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users.
Abraham Sanenga   +5 more
doaj   +2 more sources

Wireless Physical Layer Security

open access: yesEURASIP Journal on Wireless Communications and Networking, 2009
Security is a critical issue in multi-user wireless networks in which secure transmissions are becoming increasingly difficult to obtain in highly mobile and distributed environments. Interest in this area has exploded since 2000, motivated by the rise of wireless networking in general and by the increasing interest in large mobile networks with light ...
El-Gamal Hesham   +3 more
doaj   +2 more sources

UAV Swarm-Enabled Aerial CoMP: A Physical Layer Security Perspective [PDF]

open access: yesIEEE Access, 2019
Unlike aerial base station enabled by a single unmanned aerial vehicle (UAV), aerial coordinated multiple points (CoMP) can be enabled by a UAV swarm. In this case, the management of multiple UAVs is important.
Xuanxuan Wang   +3 more
doaj   +4 more sources

Survey on 5G Physical Layer Security Threats and Countermeasures [PDF]

open access: yesSensors
With the expansion of wireless mobile networks into both the daily lives of individuals as well as into the widely developing market of connected devices, communication is an increasingly attractive target for attackers.
Michal Harvanek   +5 more
doaj   +2 more sources

Quantum photonic network and physical layer security. [PDF]

open access: yesPhilos Trans A Math Phys Eng Sci, 2017
Quantum communication and quantum cryptography are expected to enhance the transmission rate and the security (confidentiality of data transmission), respectively. We study a new scheme which can potentially bridge an intermediate region covered by these two schemes, which is referred to as quantum photonic network.
Sasaki M   +6 more
europepmc   +4 more sources

Home - About - Disclaimer - Privacy