Results 231 to 240 of about 448,852 (275)
Some of the next articles are maybe not open access.
Transmit Beamforming for Layered Physical Layer Security
IEEE Transactions on Vehicular Technology, 2019In this paper, we propose a novel layered physical layer security model, which is the extension of the traditional physical layer security to the domain of multiple-layer information security. It has a hierarchical information security structure that every transmitted message has a security level, while every user has a security clearance.
Wei Zhang +3 more
openaire +1 more source
Cross-layer security framework for smart grid: Physical security layer
IEEE PES Innovative Smart Grid Technologies, Europe, 2014Security is a major challenge preventing wide deployment of the smart grid technology. Typically, the classical power grid is protected with a set of isolated security tools applied to individual grid components and layers ignoring their cross-layer interaction.
Mohammed M. Farag +2 more
openaire +1 more source
Optical physical layer security
IEEE Photonic Society 24th Annual Meeting, 2011We provide an overview of optical techniques that have been developed specifically to provide communications security at the physical layer and discuss recent advances in the field. We also highlight open areas of research.
openaire +1 more source
Channel independent physical layer security
2016 IEEE 17th Annual Wireless and Microwave Technology Conference (WAMICON), 2016Security is one of the key requirements of wireless communication systems. By exploiting the broadcast nature of wireless medium, a malicious user might attempt to mislead the legitimate nodes, intercept the communication and overhear the private information.
Ankaralı, Zekeriyya Esat +3 more
openaire +1 more source
Quantization for Physical Layer Security
2016 IEEE Globecom Workshops (GC Wkshps), 2016We propose a multi-level CSI quantization and key reconciliation scheme for physical layer security. The noisy wireless channel estimates obtained by the users first run through a transformation, prior to the quantization step. This enables the definition of guard bands around the quantization boundaries, tailored for a specific efficiency and not ...
Oana Graur, Nazia Islam, Werner Henkel
openaire +1 more source
2019
This chapter is devoted to the physical-layer security. The chapter starts with discussion on security issues, followed by the introduction of information-theoretic security, and comparison against the computational security. In the same section, various information-theoretic security measures are introduced, including strong secrecy and weak secrecy ...
openaire +1 more source
This chapter is devoted to the physical-layer security. The chapter starts with discussion on security issues, followed by the introduction of information-theoretic security, and comparison against the computational security. In the same section, various information-theoretic security measures are introduced, including strong secrecy and weak secrecy ...
openaire +1 more source
IoT Physical Layer Security Enhancement
2018 Global Information Infrastructure and Networking Symposium (GIIS), 2018Excellent quality of security is very important in Internet of Things (IoT). The last few years there has been an increased research interest to deploy security techniques that fit to the low power constraints and complexity features of state-of-the art IoT devices.
openaire +1 more source
Wireless physical-layer security: The challenges ahead
2009 International Conference on Advanced Technologies for Communications, 2009The issues of privacy and security in wireless communication networks have taken on an increasingly important role as these networks continue to flourish worldwide. Traditionally, security is viewed as an independent feature addressed above the physical-layer and all widely used cryptographic protocols are designed and implemented assuming the physical-
Di Renzo, M., Debbah, Merouane
openaire +2 more sources
Security embedding on UWB-IR physical layer
2012 IEEE Global Communications Conference (GLOBECOM), 2012Abstract--The main goal of this work is to incorporate security in an existing ultra wideband (UWB) network. We present an embedding method where a tag is added at the physical layer and superimposed to the UWB-impulse radio signal. The tag should be added in a transparent way so that guaranteeing compatibility with existing receivers ignoring the ...
Gorce, Jean-Marie +2 more
openaire +2 more sources
Relaying and physical layer security
2016In this chapter, we investigate the problem of physical-layer security in wireless networks with cooperative relays. In Sections 11.2 and 11.3, we study the notion of deaf cooperation to reinforce security of transmission in wireless relay networks.
Raef Bassily, Sennur Ulukus
openaire +1 more source

