Results 271 to 280 of about 455,839 (311)
Secure Cooperative Communications in 6G Networks: A Constrained Hierarchical Reinforcement Learning Framework with Hybrid Action Space. [PDF]
Tian X, Wang Z, Ni Y.
europepmc +1 more source
QRBT: Quantum Driven Reinforcement Learning for Scalable Blockchain Transaction Processing. [PDF]
Lella KK, Mallu SRK.
europepmc +1 more source
On the Security of Cell-Free Massive MIMO Networks. [PDF]
Mohammed H +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Quantization for Physical Layer Security
2016 IEEE Globecom Workshops (GC Wkshps), 2016We propose a multi-level CSI quantization and key reconciliation scheme for physical layer security. The noisy wireless channel estimates obtained by the users first run through a transformation, prior to the quantization step. This enables the definition of guard bands around the quantization boundaries, tailored for a specific efficiency and not ...
Oana Graur, Nazia Islam, Werner Henkel
openaire +1 more source
2021
This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-LoS correlated fading environments. The authors theoretically and practically provide physical layer security analyses for several technologies and networks such as Fifth-Generation (5G) networks, Internet of Things (IoT) applications, and Non-orthogonal ...
openaire +2 more sources
This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-LoS correlated fading environments. The authors theoretically and practically provide physical layer security analyses for several technologies and networks such as Fifth-Generation (5G) networks, Internet of Things (IoT) applications, and Non-orthogonal ...
openaire +2 more sources
Securing massive MIMO at the physical layer
2015 IEEE Conference on Communications and Network Security (CNS), 2015We consider a single-cell downlink massive MIMO system in the presence of an adversary capable of jamming and eavesdropping. We show that, classical attacks of eavesdropping and data jamming can be simultaneously rendered useless. Specifically, we show that, the secure degrees of freedom (DoF) attained in the presence of classical attacks is as same as
Yuksel Ozan Basciftci +2 more
openaire +2 more sources
Jamming Strategies for Physical Layer Security
IEEE Wireless Communications, 2018This article provides a comprehensive overview on jamming strategies in the physical layer for securing wireless communications. As a complement to traditional cryptography-based approaches, physical layer based security provisioning techniques offer a number of promising features that have not been previously available.
Yan Huo, Liran Ma, Tao Jing
exaly +2 more sources
Transmit Beamforming for Layered Physical Layer Security
IEEE Transactions on Vehicular Technology, 2019In this paper, we propose a novel layered physical layer security model, which is the extension of the traditional physical layer security to the domain of multiple-layer information security. It has a hierarchical information security structure that every transmitted message has a security level, while every user has a security clearance.
Wei Zhang 0105 +3 more
openaire +1 more source
A Rateless Approach to Physical-Layer Security
2018 IEEE International Conference on Communications (ICC), 2018A majority of coding constructions for physical-layer security are based on linear block codes and their cosets. One issue with these codes is that they require knowledge of channel state information (CSI) for both the friendly party and the eavesdropper in the wiretap channel prior to constructing the code.
Matthew H. Johnson, Willie K. Harrison
openaire +1 more source
2018
Wireless communications’ infrastructures are frequently selected as a cable replacement in many applications, giving an immediate advantage on the wireless investment. However, the worldwide proliferation of wireless local area network (WLAN) imposed large investments on the network security.
Soderi, Simone +4 more
openaire +2 more sources
Wireless communications’ infrastructures are frequently selected as a cable replacement in many applications, giving an immediate advantage on the wireless investment. However, the worldwide proliferation of wireless local area network (WLAN) imposed large investments on the network security.
Soderi, Simone +4 more
openaire +2 more sources

