Results 11 to 20 of about 451,706 (170)

An Overview of Key Technologies in Physical Layer Security [PDF]

open access: yesEntropy, 2020
The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users.
Abraham Sanenga   +5 more
doaj   +6 more sources

Physical-Layer Security in 6G Networks [PDF]

open access: yesIEEE Open Journal of the Communications Society, 2021
The sixth generation (6G) of mobile network will be composed by different nodes, from macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full connectivity fabric all around us.
Lorenzo Mucchi   +9 more
doaj   +5 more sources

Security- and Reliability-Guaranteed Transmission Control of Time-Sensitive Physical Layer Security Systems [PDF]

open access: yesEntropy, 2023
In this paper, we consider information transmission over a three-node physical layer security system. Based on the imperfect estimations of the main channel and the eavesdropping channel, we propose reducing the outage probability and interception ...
Jianye Li, Yunquan Dong, Chengsheng Pan
doaj   +2 more sources

Quantum Security for the Physical Layer [PDF]

open access: yesIEEE Communications Magazine, 2013
The physical layer describes how communication signals are encoded and transmitted across a channel. Physical security often requires either restricting access to the channel or performing periodic manual inspections.
Humble, Travis S.
core   +4 more sources

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [PDF]

open access: yesIEEE Journal on Selected Areas in Communications, 2018
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently.
Yongpeng Wu   +2 more
exaly   +4 more sources

Physical Layer Security Using Two-Path Successive Relaying [PDF]

open access: yesSensors, 2016
Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this ...
Qian Yu Liau, Chee Yen Leow, Zhiguo Ding
doaj   +2 more sources

UAV Swarm-Enabled Aerial CoMP: A Physical Layer Security Perspective [PDF]

open access: yesIEEE Access, 2019
Unlike aerial base station enabled by a single unmanned aerial vehicle (UAV), aerial coordinated multiple points (CoMP) can be enabled by a UAV swarm. In this case, the management of multiple UAVs is important.
Xuanxuan Wang   +3 more
doaj   +4 more sources

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

open access: yesIEEE Communications Surveys and Tutorials, 2014
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence
Amitav Mukherjee   +2 more
exaly   +3 more sources

Techniques for Enhanced Physical-Layer Security [PDF]

open access: yes2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems.
Barros, Joao   +2 more
core   +3 more sources

Survey on 5G Physical Layer Security Threats and Countermeasures [PDF]

open access: yesSensors
With the expansion of wireless mobile networks into both the daily lives of individuals as well as into the widely developing market of connected devices, communication is an increasingly attractive target for attackers.
Michal Harvanek   +5 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy