Results 31 to 40 of about 448,853 (274)

Physical Layer Security With Near-Field Beamforming

open access: yesIEEE Access
Extremely large antenna arrays (ELAAs) are being proposed for sixth-generation (6G) systems as an evolution of massive multiple-input, multiple-output (mMIMO).
Joao Ferreira, Joao Guerreiro, Rui Dinis
doaj   +1 more source

Physical-Layer Security over Correlated Erasure Channels

open access: yes, 2011
We explore the additional security obtained by noise at the physical layer in a wiretap channel model setting. Security enhancements at the physical layer have been proposed recently using a secrecy metric based on the degrees of freedom that an attacker
Almeida, J.   +3 more
core   +1 more source

Efficient Wireless Security Through Jamming, Coding and Routing

open access: yes, 2013
There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming.
Dehghan, Mostafa   +3 more
core   +1 more source

Physical Layer Security Performance Analysis of TASP/MRC System in Multi-eavesdropper Scene [PDF]

open access: yesJisuanji gongcheng, 2019
In order to evaluate the physical layer security performance of Transmit Antenna Selection with channel Prediction(TASP)/receive Maximum Ratio Combining(MRC) wireless communication system over Rayleigh block fading channel in multi-eavesdropper scene,the
WANG Zhanwan, LI Guangqiu, QIAN Hui
doaj   +1 more source

Physical Layer Authentication in Wireless Networks-Based Machine Learning Approaches

open access: yesSensors, 2023
The physical layer security of wireless networks is becoming increasingly important because of the rapid development of wireless communications and the increasing security threats.
Lamia Alhoraibi   +3 more
doaj   +1 more source

Physical Layer Security: Coalitional Games for Distributed Cooperation

open access: yes, 2009
Cooperation between wireless network nodes is a promising technique for improving the physical layer security of wireless transmission, in terms of secrecy capacity, in the presence of multiple eavesdroppers.
Basar, Tamer   +4 more
core   +2 more sources

A cross-layer approach to message authentication based on sparse representation for wireless body area networks

open access: yesInternational Journal of Distributed Sensor Networks, 2017
Due to personal privacy, information security is a particularly important issue in wireless body area networks. Although current communication protocol has considered the security, there is still a risk that lapses in physical layer security may be a ...
Ning Wang, Weiwei Li, Ting Jiang
doaj   +1 more source

Secure Physical Layer Voting

open access: yesIEEE Transactions on Mobile Computing, 2018
Distributed wireless networks often employ voting to perform critical network functions such as fault-tolerant data fusion, cooperative sensing, and reaching consensus. Voting is implemented by sending messages to a fusion center or via direct message exchange between participants.
Nirnimesh Ghose   +3 more
openaire   +1 more source

Developing evidence‐based, cost‐effective P4 cancer medicine for driving innovation in prevention, therapeutics, patient care and reducing healthcare inequalities

open access: yesMolecular Oncology, EarlyView.
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg   +43 more
wiley   +1 more source

Physical Layer Security for 6G: Toward Achieving Intelligent Native Security at Layer-1

open access: yesIEEE Access
This paper lays the foundations for Physical Layer Security (PLS) as a native 6G communication operation mode. 6G mobile network will enable intelligent applications, automated services, and low-latency connectivity to data networks. Security performance
Israt Ara, Brian Kelley
doaj   +1 more source

Home - About - Disclaimer - Privacy