Results 21 to 30 of about 452,270 (283)

Physical Layer Security in N-Pair NOMA-PLNC Wireless Networks

open access: yesIEEE Access, 2022
In this paper, the effective end-to-end secure communication of N-pair cellular network is studied. Promising multiple access scheme known as non-orthogonal multiple access (NOMA) and physical layer network coding (PLNC) scheme are employed to improve ...
Samikkannu Rajkumar   +3 more
doaj   +1 more source

Channel-Aware Randomized Encryption and Channel Estimation Attack

open access: yesIEEE Access, 2017
In this paper, we study the channel-aware (CA) randomization for a simple physical-layer encryption scheme and show that the probability of successful attack becomes very low by CA randomization when the known plain-text attack is carried out.
Jinho Choi
doaj   +1 more source

Quantum Algorithms for the Physical Layer: Potential Applications to Physical Layer Security

open access: yesIEEE Access
The field of quantum technologies has garnered considerable interest and witnessed noteworthy progress in recent years. It is also anticipated that these technologies will continue to flourish and exert a considerable influence on society, i.e., a ...
Toshiki Matsumine   +2 more
doaj   +1 more source

Techniques for Enhanced Physical-Layer Security

open access: yes, 2010
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems.
Barros, Joao   +2 more
core   +1 more source

Physical Layer Security With Near-Field Beamforming

open access: yesIEEE Access
Extremely large antenna arrays (ELAAs) are being proposed for sixth-generation (6G) systems as an evolution of massive multiple-input, multiple-output (mMIMO).
Joao Ferreira, Joao Guerreiro, Rui Dinis
doaj   +1 more source

Physical-Layer Security over Correlated Erasure Channels

open access: yes, 2011
We explore the additional security obtained by noise at the physical layer in a wiretap channel model setting. Security enhancements at the physical layer have been proposed recently using a secrecy metric based on the degrees of freedom that an attacker
Almeida, J.   +3 more
core   +1 more source

Efficient Wireless Security Through Jamming, Coding and Routing

open access: yes, 2013
There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming.
Dehghan, Mostafa   +3 more
core   +1 more source

Physical Layer Security Performance Analysis of TASP/MRC System in Multi-eavesdropper Scene [PDF]

open access: yesJisuanji gongcheng, 2019
In order to evaluate the physical layer security performance of Transmit Antenna Selection with channel Prediction(TASP)/receive Maximum Ratio Combining(MRC) wireless communication system over Rayleigh block fading channel in multi-eavesdropper scene,the
WANG Zhanwan, LI Guangqiu, QIAN Hui
doaj   +1 more source

Physical Layer Authentication in Wireless Networks-Based Machine Learning Approaches

open access: yesSensors, 2023
The physical layer security of wireless networks is becoming increasingly important because of the rapid development of wireless communications and the increasing security threats.
Lamia Alhoraibi   +3 more
doaj   +1 more source

A cross-layer approach to message authentication based on sparse representation for wireless body area networks

open access: yesInternational Journal of Distributed Sensor Networks, 2017
Due to personal privacy, information security is a particularly important issue in wireless body area networks. Although current communication protocol has considered the security, there is still a risk that lapses in physical layer security may be a ...
Ning Wang, Weiwei Li, Ting Jiang
doaj   +1 more source

Home - About - Disclaimer - Privacy