Results 231 to 240 of about 448,853 (274)
Some of the next articles are maybe not open access.
2021
This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-LoS correlated fading environments. The authors theoretically and practically provide physical layer security analyses for several technologies and networks such as Fifth-Generation (5G) networks, Internet of Things (IoT) applications, and Non-orthogonal ...
openaire +2 more sources
This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-LoS correlated fading environments. The authors theoretically and practically provide physical layer security analyses for several technologies and networks such as Fifth-Generation (5G) networks, Internet of Things (IoT) applications, and Non-orthogonal ...
openaire +2 more sources
Physical Layer Security Assisted 5G Network Security
2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 2017After 4G network becomes a global commercial success, the researchers are now looking at the future 5G technologies, both in standardization bodies and in research projects. Researchers find that the security architecture used in 4G can not satisfy the needs of 5G.
Fei Pan +4 more
openaire +1 more source
Wireless Physical Layer Security
2016In this chapter, the context and the fundamental concepts of physical layer security are well introduced. It starts at Shannon’s definition of information-theoretic security, Wyner’s wiretap model, and secrecy conditions. Then the secrecy metrics are described, including secrecy capacity/rate, ergodic secrecy capacity/rate, secrecy outage, and secrecy ...
Hui-Ming Wang, Tong-Xing Zheng
openaire +1 more source
Channel independent physical layer security
2016 IEEE 17th Annual Wireless and Microwave Technology Conference (WAMICON), 2016Security is one of the key requirements of wireless communication systems. By exploiting the broadcast nature of wireless medium, a malicious user might attempt to mislead the legitimate nodes, intercept the communication and overhear the private information.
Ankaralı, Zekeriyya Esat +3 more
openaire +1 more source
Optical physical layer security
IEEE Photonic Society 24th Annual Meeting, 2011We provide an overview of optical techniques that have been developed specifically to provide communications security at the physical layer and discuss recent advances in the field. We also highlight open areas of research.
openaire +1 more source
Quantization for Physical Layer Security
2016 IEEE Globecom Workshops (GC Wkshps), 2016We propose a multi-level CSI quantization and key reconciliation scheme for physical layer security. The noisy wireless channel estimates obtained by the users first run through a transformation, prior to the quantization step. This enables the definition of guard bands around the quantization boundaries, tailored for a specific efficiency and not ...
Oana Graur, Nazia Islam, Werner Henkel
openaire +1 more source
2019
This chapter is devoted to the physical-layer security. The chapter starts with discussion on security issues, followed by the introduction of information-theoretic security, and comparison against the computational security. In the same section, various information-theoretic security measures are introduced, including strong secrecy and weak secrecy ...
openaire +1 more source
This chapter is devoted to the physical-layer security. The chapter starts with discussion on security issues, followed by the introduction of information-theoretic security, and comparison against the computational security. In the same section, various information-theoretic security measures are introduced, including strong secrecy and weak secrecy ...
openaire +1 more source
Wireless physical-layer security: The challenges ahead
2009 International Conference on Advanced Technologies for Communications, 2009The issues of privacy and security in wireless communication networks have taken on an increasingly important role as these networks continue to flourish worldwide. Traditionally, security is viewed as an independent feature addressed above the physical-layer and all widely used cryptographic protocols are designed and implemented assuming the physical-
Di Renzo, M., Debbah, Merouane
openaire +2 more sources
Security embedding on UWB-IR physical layer
2012 IEEE Global Communications Conference (GLOBECOM), 2012Abstract--The main goal of this work is to incorporate security in an existing ultra wideband (UWB) network. We present an embedding method where a tag is added at the physical layer and superimposed to the UWB-impulse radio signal. The tag should be added in a transparent way so that guaranteeing compatibility with existing receivers ignoring the ...
Gorce, Jean-Marie +2 more
openaire +2 more sources
IoT Physical Layer Security Enhancement
2018 Global Information Infrastructure and Networking Symposium (GIIS), 2018Excellent quality of security is very important in Internet of Things (IoT). The last few years there has been an increased research interest to deploy security techniques that fit to the low power constraints and complexity features of state-of-the art IoT devices.
openaire +1 more source

