Results 41 to 50 of about 37,182 (154)

Quantum security for the physical layer [PDF]

open access: yesIEEE Communications Magazine, 2013
The physical layer describes how communication signals are encoded and transmitted across a channel. Physical security often requires either restricting access to the channel or performing periodic manual inspections. In this tutorial, we describe how the field of quantum communication offers new techniques for securing the physical layer.
openaire   +2 more sources

Physical Layer Security Schemes in Space-Integrated-Ground Information Network

open access: yes天地一体化信息网络, 2020
Firstly, the current mainstream technologies of physical layer security were summarized and the relevant technical indicators were introduced; Then, the research on physical layer security in three typical scenarios of the space-integrated-ground ...
Fangshu MA   +3 more
doaj   +2 more sources

Secure physical layer network coding versus secure network coding [PDF]

open access: yes2018 IEEE Information Theory Workshop (ITW), 2018
When a network has relay nodes, there is a risk that a part of the information is leaked to an untrusted relay. Secure network coding (secure NC) is known as a method to resolve this problem, which enables the secrecy of the message when the message is transmitted over a noiseless network and a part of the edges or a part of the intermediate (untrusted)
openaire   +5 more sources

Physical Layer Security in Cognitive Millimeter Wave Networks

open access: yesIEEE Access, 2019
Millimeter wave (mmWave) communications and cognitive radio networks are two key technologies to improve the spectral efficiency. For a cognitive mmWave wiretap network in which randomly located eavesdroppers may reside in the signal beam of the ...
Yi Song   +4 more
doaj   +1 more source

Physical Layer Security: Authentication, Integrity, and Confidentiality [PDF]

open access: yes, 2021
The goal of physical layer security (PLS) is to make use of the properties of the physical layer, including the wireless communication medium and the transceiver hardware, to enable critical aspects of secure communications. In particular, PLS can be employed to provide i) node authentication, ii) message authentication, and, iii) message ...
Shakiba-Herfeh, Mahdi   +2 more
openaire   +3 more sources

Physical layer security of NOMA-D2D cooperative wireless system

open access: yesDianxin kexue, 2022
Aiming at the physical layer security (PLS) application requirement of massive user equipments access in the future, the PLS model combining with non-orthogonal multiple access (NOMA), device-to-device (D2D) and relay cooperation was proposed.The model ...
Yifan DING, Guangqiu LI, Hui LI
doaj   +2 more sources

Physical Layer Security in Cognitive Untrusted Relay Networks

open access: yesIEEE Access, 2018
In this paper, we consider the secure communications in a cognitive untrusted relay network, where the secondary source intends to communicate with a secondary destination through an untrusted relay in the presence of the direct source-destination link ...
Dechuan Chen   +4 more
doaj   +1 more source

Physical Layer Security through Secure Channel Estimation

open access: yes2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 2018
The random nature of wireless channel can be utilized to achieve secure communications. Recently, there have been some contributions towards finding practical approaches to provide physical layer security, but robust and secure channel estimates are critical in achieving secrecy.
Fawad Ud Din, Fabrice Labeau
openaire   +2 more sources

Achievable Physical-Layer Security Over Composite Fading Channels

open access: yesIEEE Access, 2020
We investigate the physical layer security limits of Wyner's wiretap model over Fisher-Snedecor .T composite fading channels. .T fading conditions have been recently shown to provide an accurate characterization of multipath fading and shadowing effects ...
Osamah S. Badarneh   +5 more
doaj   +1 more source

Cooperative jamming for wireless physical layer security [PDF]

open access: yes2009 IEEE/SP 15th Workshop on Statistical Signal Processing, 2009
Cooperative jamming is an approach that has been recently proposed for improving physical layer based security for wireless networks in the presence of an eavesdropper. While the source transmits its message to its destination, a relay node transmits a jamming signal to create interference at the eavesdropper.
Dong, Lun   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy