Results 11 to 20 of about 37,182 (154)

Physical-Layer Security in 6G Networks [PDF]

open access: yesIEEE Open Journal of the Communications Society, 2021
The sixth generation (6G) of mobile network will be composed by different nodes, from macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full connectivity fabric all around us.
Lorenzo Mucchi   +9 more
doaj   +6 more sources

Security- and Reliability-Guaranteed Transmission Control of Time-Sensitive Physical Layer Security Systems [PDF]

open access: yesEntropy, 2023
In this paper, we consider information transmission over a three-node physical layer security system. Based on the imperfect estimations of the main channel and the eavesdropping channel, we propose reducing the outage probability and interception ...
Jianye Li, Yunquan Dong, Chengsheng Pan
doaj   +2 more sources

Wireless physical layer security. [PDF]

open access: yesProc Natl Acad Sci U S A, 2017
Significance Security is a very important issue in the design and use of wireless networks. Traditional methods of providing security in such networks are impractical for some emerging types of wireless networks due to the light computational abilities of some wireless devices [such as radio-frequency identification (RFID) tags, certain ...
Poor HV, Schaefer RF.
europepmc   +4 more sources

Physical Layer Security Using Two-Path Successive Relaying [PDF]

open access: yesSensors, 2016
Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this ...
Qian Yu Liau, Chee Yen Leow, Zhiguo Ding
doaj   +2 more sources

Wireless Physical Layer Security

open access: yesEURASIP Journal on Wireless Communications and Networking, 2009
Security is a critical issue in multi-user wireless networks in which secure transmissions are becoming increasingly difficult to obtain in highly mobile and distributed environments. Interest in this area has exploded since 2000, motivated by the rise of wireless networking in general and by the increasing interest in large mobile networks with light ...
El-Gamal Hesham   +3 more
doaj   +2 more sources

An Overview of Key Technologies in Physical Layer Security [PDF]

open access: yesEntropy, 2020
The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users.
Abraham Sanenga   +5 more
doaj   +2 more sources

Survey on 5G Physical Layer Security Threats and Countermeasures [PDF]

open access: yesSensors
With the expansion of wireless mobile networks into both the daily lives of individuals as well as into the widely developing market of connected devices, communication is an increasingly attractive target for attackers.
Michal Harvanek   +5 more
doaj   +2 more sources

Quantum photonic network and physical layer security. [PDF]

open access: yesPhilos Trans A Math Phys Eng Sci, 2017
Quantum communication and quantum cryptography are expected to enhance the transmission rate and the security (confidentiality of data transmission), respectively. We study a new scheme which can potentially bridge an intermediate region covered by these two schemes, which is referred to as quantum photonic network.
Sasaki M   +6 more
europepmc   +4 more sources

Effect of Imperfect Artificial Noise on the Performance of Physical Layer Security for MU-Massive MIMO System

open access: yesJISR on Computing, 2021
Physical Layer Security (PLS) in Multiple Input Multiple Output (MIMO) systems is crucial to achieving reliable communication. Artificial Noise (AN) is a commonly employed technique to provide PLS-based secure communication.
Yazeed Abdulaziz Al-Haqbani
doaj   +1 more source

What Physical Layer Security Can Do for 6G Security

open access: yesIEEE Open Journal of Vehicular Technology, 2023
While existing security protocols were designed with a focus on the core network, the enhancement of the security of the B5G access network becomes of critical importance.
Miroslav Mitev   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy