Results 41 to 50 of about 451,706 (170)

Physical Layer Security - from Theory to Practice

open access: yesIEEE BITS the Information Theory Magazine, 2022
<p>A large spectrum of technologies are collectively dubbed as physical layer security (PLS), ranging from wiretap coding, secret key generation (SKG), authentication using physical unclonable functions (PUFs), localization / RF fingerprinting, anomaly detection monitoring the physical layer (PHY) and hardware.
Miroslav Mitev   +4 more
openaire   +3 more sources

Physical Layer Security Performance Analysis of TASP/MRC System in Multi-eavesdropper Scene [PDF]

open access: yesJisuanji gongcheng, 2019
In order to evaluate the physical layer security performance of Transmit Antenna Selection with channel Prediction(TASP)/receive Maximum Ratio Combining(MRC) wireless communication system over Rayleigh block fading channel in multi-eavesdropper scene,the
WANG Zhanwan, LI Guangqiu, QIAN Hui
doaj   +1 more source

Physical Layer Authentication in Wireless Networks-Based Machine Learning Approaches

open access: yesSensors, 2023
The physical layer security of wireless networks is becoming increasingly important because of the rapid development of wireless communications and the increasing security threats.
Lamia Alhoraibi   +3 more
doaj   +1 more source

Efficient Wireless Security Through Jamming, Coding and Routing

open access: yes, 2013
There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming.
Dehghan, Mostafa   +3 more
core   +1 more source

A novel approach to security enhancement of chaotic DSSS systems [PDF]

open access: yes, 2016
In this paper, we propose a novel approach to the enhancement of physical layer security for chaotic direct-sequence spread-spectrum (DSSS) communication systems. The main idea behind our proposal is to vary the symbol period according to the behavior of
Barlet Ros, Pere   +3 more
core   +1 more source

A cross-layer approach to message authentication based on sparse representation for wireless body area networks

open access: yesInternational Journal of Distributed Sensor Networks, 2017
Due to personal privacy, information security is a particularly important issue in wireless body area networks. Although current communication protocol has considered the security, there is still a risk that lapses in physical layer security may be a ...
Ning Wang, Weiwei Li, Ting Jiang
doaj   +1 more source

A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

open access: yes, 2016
This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security.
Hanzo, Lajos   +3 more
core   +1 more source

Physical layer security in broadcast networks [PDF]

open access: yesSecurity and Communication Networks, 2009
AbstractThis paper reviews the information theoretic characterization of security in broadcast channels, in which a transmitter has both public and confidential messages intended for multiple receivers. All messages must be successfully received by their intended receivers, and the confidential messages must be kept as secret as possible from non ...
Yingbin Liang   +2 more
openaire   +1 more source

Physical Layer Security for 6G: Toward Achieving Intelligent Native Security at Layer-1

open access: yesIEEE Access
This paper lays the foundations for Physical Layer Security (PLS) as a native 6G communication operation mode. 6G mobile network will enable intelligent applications, automated services, and low-latency connectivity to data networks. Security performance
Israt Ara, Brian Kelley
doaj   +1 more source

Physical Layer Security in Millimeter Wave Cellular Networks

open access: yes, 2016
Recent researches show that millimeter wave (mmWave) communications can offer orders of magnitude increases in the cellular capacity. However, the secrecy performance of a mmWave cellular network has not been investigated so far.
Wang, Chao, Wang, Hui-Ming
core   +1 more source

Home - About - Disclaimer - Privacy