Results 131 to 140 of about 451,706 (170)
Some of the next articles are maybe not open access.

Quantization for Physical Layer Security

2016 IEEE Globecom Workshops (GC Wkshps), 2016
We propose a multi-level CSI quantization and key reconciliation scheme for physical layer security. The noisy wireless channel estimates obtained by the users first run through a transformation, prior to the quantization step. This enables the definition of guard bands around the quantization boundaries, tailored for a specific efficiency and not ...
Oana Graur, Nazia Islam, Werner Henkel
openaire   +1 more source

Physical Layer Security

2021
This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-LoS correlated fading environments. The authors theoretically and practically provide physical layer security analyses for several technologies and networks such as Fifth-Generation (5G) networks, Internet of Things (IoT) applications, and Non-orthogonal ...
openaire   +2 more sources

Securing massive MIMO at the physical layer

2015 IEEE Conference on Communications and Network Security (CNS), 2015
We consider a single-cell downlink massive MIMO system in the presence of an adversary capable of jamming and eavesdropping. We show that, classical attacks of eavesdropping and data jamming can be simultaneously rendered useless. Specifically, we show that, the secure degrees of freedom (DoF) attained in the presence of classical attacks is as same as
Yuksel Ozan Basciftci   +2 more
openaire   +2 more sources

Jamming Strategies for Physical Layer Security

IEEE Wireless Communications, 2018
This article provides a comprehensive overview on jamming strategies in the physical layer for securing wireless communications. As a complement to traditional cryptography-based approaches, physical layer based security provisioning techniques offer a number of promising features that have not been previously available.
Yan Huo, Tao Jing
exaly   +2 more sources

A Rateless Approach to Physical-Layer Security

2018 IEEE International Conference on Communications (ICC), 2018
A majority of coding constructions for physical-layer security are based on linear block codes and their cosets. One issue with these codes is that they require knowledge of channel state information (CSI) for both the friendly party and the eavesdropper in the wiretap channel prior to constructing the code.
Matthew H. Johnson, Willie K. Harrison
openaire   +1 more source

Physical Layer Security

2018
Wireless communications’ infrastructures are frequently selected as a cable replacement in many applications, giving an immediate advantage on the wireless investment. However, the worldwide proliferation of wireless local area network (WLAN) imposed large investments on the network security.
Soderi, Simone   +4 more
openaire   +2 more sources

Stopping sets for physical-layer security

2010 IEEE Information Theory Workshop, 2010
Physical-layer security based on wiretap codes can be used to complement cryptographic applications at higher layers of the protocol stack. We assume a passive eavesdropper that has access to noise-corrupted codewords with erasures that are statistically independent to those of the legitimate communication partners.
Willie K. Harrison   +4 more
openaire   +1 more source

A survey on OFDM physical layer security

Physical Communication, 2019
Abstract Physical Layer Security (PLS) is an emerging paradigm employed to enhance wireless network security without relying on higher-layer encryption techniques. PLS enables legitimate users to exchange confidential messages over a wireless medium in the presence of adversaries, by utilizing the main properties and characteristics of the wireless ...
Reem Melki   +3 more
openaire   +1 more source

The challenges facing physical layer security

IEEE Communications Magazine, 2015
There has recently been significant interest in applying the principles of information-theoretical security and signal processing to secure physical layer systems. Although the community has made progress in understanding how the physical layer can support confidentiality and authentication, it is important to realize that there are many important ...
exaly   +2 more sources

IoT Physical Layer Security Enhancement

2018 Global Information Infrastructure and Networking Symposium (GIIS), 2018
Excellent quality of security is very important in Internet of Things (IoT). The last few years there has been an increased research interest to deploy security techniques that fit to the low power constraints and complexity features of state-of-the art IoT devices.
openaire   +1 more source

Home - About - Disclaimer - Privacy