Results 131 to 140 of about 451,706 (170)
Some of the next articles are maybe not open access.
Quantization for Physical Layer Security
2016 IEEE Globecom Workshops (GC Wkshps), 2016We propose a multi-level CSI quantization and key reconciliation scheme for physical layer security. The noisy wireless channel estimates obtained by the users first run through a transformation, prior to the quantization step. This enables the definition of guard bands around the quantization boundaries, tailored for a specific efficiency and not ...
Oana Graur, Nazia Islam, Werner Henkel
openaire +1 more source
2021
This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-LoS correlated fading environments. The authors theoretically and practically provide physical layer security analyses for several technologies and networks such as Fifth-Generation (5G) networks, Internet of Things (IoT) applications, and Non-orthogonal ...
openaire +2 more sources
This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-LoS correlated fading environments. The authors theoretically and practically provide physical layer security analyses for several technologies and networks such as Fifth-Generation (5G) networks, Internet of Things (IoT) applications, and Non-orthogonal ...
openaire +2 more sources
Securing massive MIMO at the physical layer
2015 IEEE Conference on Communications and Network Security (CNS), 2015We consider a single-cell downlink massive MIMO system in the presence of an adversary capable of jamming and eavesdropping. We show that, classical attacks of eavesdropping and data jamming can be simultaneously rendered useless. Specifically, we show that, the secure degrees of freedom (DoF) attained in the presence of classical attacks is as same as
Yuksel Ozan Basciftci +2 more
openaire +2 more sources
Jamming Strategies for Physical Layer Security
IEEE Wireless Communications, 2018This article provides a comprehensive overview on jamming strategies in the physical layer for securing wireless communications. As a complement to traditional cryptography-based approaches, physical layer based security provisioning techniques offer a number of promising features that have not been previously available.
Yan Huo, Tao Jing
exaly +2 more sources
A Rateless Approach to Physical-Layer Security
2018 IEEE International Conference on Communications (ICC), 2018A majority of coding constructions for physical-layer security are based on linear block codes and their cosets. One issue with these codes is that they require knowledge of channel state information (CSI) for both the friendly party and the eavesdropper in the wiretap channel prior to constructing the code.
Matthew H. Johnson, Willie K. Harrison
openaire +1 more source
2018
Wireless communications’ infrastructures are frequently selected as a cable replacement in many applications, giving an immediate advantage on the wireless investment. However, the worldwide proliferation of wireless local area network (WLAN) imposed large investments on the network security.
Soderi, Simone +4 more
openaire +2 more sources
Wireless communications’ infrastructures are frequently selected as a cable replacement in many applications, giving an immediate advantage on the wireless investment. However, the worldwide proliferation of wireless local area network (WLAN) imposed large investments on the network security.
Soderi, Simone +4 more
openaire +2 more sources
Stopping sets for physical-layer security
2010 IEEE Information Theory Workshop, 2010Physical-layer security based on wiretap codes can be used to complement cryptographic applications at higher layers of the protocol stack. We assume a passive eavesdropper that has access to noise-corrupted codewords with erasures that are statistically independent to those of the legitimate communication partners.
Willie K. Harrison +4 more
openaire +1 more source
A survey on OFDM physical layer security
Physical Communication, 2019Abstract Physical Layer Security (PLS) is an emerging paradigm employed to enhance wireless network security without relying on higher-layer encryption techniques. PLS enables legitimate users to exchange confidential messages over a wireless medium in the presence of adversaries, by utilizing the main properties and characteristics of the wireless ...
Reem Melki +3 more
openaire +1 more source
The challenges facing physical layer security
IEEE Communications Magazine, 2015There has recently been significant interest in applying the principles of information-theoretical security and signal processing to secure physical layer systems. Although the community has made progress in understanding how the physical layer can support confidentiality and authentication, it is important to realize that there are many important ...
exaly +2 more sources
IoT Physical Layer Security Enhancement
2018 Global Information Infrastructure and Networking Symposium (GIIS), 2018Excellent quality of security is very important in Internet of Things (IoT). The last few years there has been an increased research interest to deploy security techniques that fit to the low power constraints and complexity features of state-of-the art IoT devices.
openaire +1 more source

