Results 221 to 230 of about 448,852 (275)
Enhancing virtual physically unclonable function security through neuron-criticality analysis and lightweight encryption. [PDF]
Khan R +4 more
europepmc +1 more source
Connected, digitalized wire arc additive manufacturing: utilizing data in the internet of production to enable industrie 4.0. [PDF]
Mann S +10 more
europepmc +1 more source
Autonomous cyber-physical security middleware for IoT: anomaly detection and adaptive response in hybrid environments. [PDF]
Ortiz-Garcés I +2 more
europepmc +1 more source
Secure TPMS Data Transmission in Real-Time IoV Environments: A Study on 5G and LoRa Networks. [PDF]
Niranjan DK, Supriya M, Tiberti W.
europepmc +1 more source
A Systematic Review and Energy-Centric Taxonomy of Jamming Attacks and Countermeasures in Wireless Sensor Networks. [PDF]
Herrera-Loera C +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2020
Wireless communications’ infrastructures are frequently selected as a cable replacement in many applications, giving an immediate advantage on the wireless investment. However, the worldwide proliferation of wireless local area network (WLAN) imposed large investments on the network security.
Iinatti Jari Henrik Juhani +1 more
+4 more sources
Wireless communications’ infrastructures are frequently selected as a cable replacement in many applications, giving an immediate advantage on the wireless investment. However, the worldwide proliferation of wireless local area network (WLAN) imposed large investments on the network security.
Iinatti Jari Henrik Juhani +1 more
+4 more sources
2021
This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-LoS correlated fading environments. The authors theoretically and practically provide physical layer security analyses for several technologies and networks such as Fifth-Generation (5G) networks, Internet of Things (IoT) applications, and Non-orthogonal ...
openaire +2 more sources
This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-LoS correlated fading environments. The authors theoretically and practically provide physical layer security analyses for several technologies and networks such as Fifth-Generation (5G) networks, Internet of Things (IoT) applications, and Non-orthogonal ...
openaire +2 more sources
Wireless Physical Layer Security
2016In this chapter, the context and the fundamental concepts of physical layer security are well introduced. It starts at Shannon’s definition of information-theoretic security, Wyner’s wiretap model, and secrecy conditions. Then the secrecy metrics are described, including secrecy capacity/rate, ergodic secrecy capacity/rate, secrecy outage, and secrecy ...
Hui-Ming Wang, Tong-Xing Zheng
openaire +1 more source
Physical Layer Security Assisted 5G Network Security
2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 2017After 4G network becomes a global commercial success, the researchers are now looking at the future 5G technologies, both in standardization bodies and in research projects. Researchers find that the security architecture used in 4G can not satisfy the needs of 5G.
Fei Pan +4 more
openaire +1 more source

