Results 11 to 20 of about 451,706 (170)
An Overview of Key Technologies in Physical Layer Security [PDF]
The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users.
Abraham Sanenga +5 more
doaj +6 more sources
Physical-Layer Security in 6G Networks [PDF]
The sixth generation (6G) of mobile network will be composed by different nodes, from macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full connectivity fabric all around us.
Lorenzo Mucchi +9 more
doaj +5 more sources
Security- and Reliability-Guaranteed Transmission Control of Time-Sensitive Physical Layer Security Systems [PDF]
In this paper, we consider information transmission over a three-node physical layer security system. Based on the imperfect estimations of the main channel and the eavesdropping channel, we propose reducing the outage probability and interception ...
Jianye Li, Yunquan Dong, Chengsheng Pan
doaj +2 more sources
Quantum Security for the Physical Layer [PDF]
The physical layer describes how communication signals are encoded and transmitted across a channel. Physical security often requires either restricting access to the channel or performing periodic manual inspections.
Humble, Travis S.
core +4 more sources
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [PDF]
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently.
Yongpeng Wu +2 more
exaly +4 more sources
Physical Layer Security Using Two-Path Successive Relaying [PDF]
Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this ...
Qian Yu Liau, Chee Yen Leow, Zhiguo Ding
doaj +2 more sources
UAV Swarm-Enabled Aerial CoMP: A Physical Layer Security Perspective [PDF]
Unlike aerial base station enabled by a single unmanned aerial vehicle (UAV), aerial coordinated multiple points (CoMP) can be enabled by a UAV swarm. In this case, the management of multiple UAVs is important.
Xuanxuan Wang +3 more
doaj +4 more sources
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence
Amitav Mukherjee +2 more
exaly +3 more sources
Techniques for Enhanced Physical-Layer Security [PDF]
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems.
Barros, Joao +2 more
core +3 more sources
Survey on 5G Physical Layer Security Threats and Countermeasures [PDF]
With the expansion of wireless mobile networks into both the daily lives of individuals as well as into the widely developing market of connected devices, communication is an increasingly attractive target for attackers.
Michal Harvanek +5 more
doaj +2 more sources

