Results 21 to 30 of about 455,839 (311)

Physical layer security techniques for data transmission for future wireless networks

open access: yesSecurity and Safety, 2022
The broadcast nature of wireless communication systems makes wireless transmission extremely susceptible to eavesdropping and even malicious interference.
Shi Weiping   +9 more
doaj   +1 more source

Physical Layer Authentication and Security Design in the Machine Learning Era [PDF]

open access: greenIEEE Communications Surveys and Tutorials
Tiep M Hoang   +2 more
exaly   +2 more sources

Review of Physical Layer Security in 5G Wireless Networks

open access: yesApplied Sciences, 2023
Fifth generation (5G) wireless networks promise to revolutionize the way we communicate and connect to the internet. However, as with any new technology, 5G networks also bring new security challenges that need to be addressed.
Jawhara Boodai   +2 more
doaj   +1 more source

Physical Layer Security Design for Polar Code Construction

open access: yesCryptography, 2022
In contrast to the network security that relies on upper-layer encryption for the confidentiality and authenticity of communications, physical layer security (PLS) exploits the uniqueness and randomness of the physical channel to encrypt information and ...
Yao Zeng, Yuxi Tang, Luping Xiang
doaj   +1 more source

Physical-layer security

open access: yesJournal of Communications and Networks, 2011
This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures, it provides essential practical tools that enable graduate students ...
Matthieu R. Bloch, João Barros
openaire   +2 more sources

Wireless secure communication involving UAV: an overview of physical layer security [PDF]

open access: yesMATEC Web of Conferences, 2021
Unmanned aerial vehicle (UAV) is a flight device with power and energy based on computer program control, which has the characteristics of small size, light weight, high maneuverability and low cost.
Li Jiawei   +4 more
doaj   +1 more source

Secure Physical Layer Voting

open access: yesIEEE Transactions on Mobile Computing, 2018
Distributed wireless networks often employ voting to perform critical network functions such as fault-tolerant data fusion, cooperative sensing, and reaching consensus. Voting is implemented by sending messages to a fusion center or via direct message exchange between participants.
Nirnimesh Ghose   +3 more
openaire   +1 more source

Physical Layer Security in N-Pair NOMA-PLNC Wireless Networks

open access: yesIEEE Access, 2022
In this paper, the effective end-to-end secure communication of N-pair cellular network is studied. Promising multiple access scheme known as non-orthogonal multiple access (NOMA) and physical layer network coding (PLNC) scheme are employed to improve ...
Samikkannu Rajkumar   +3 more
doaj   +1 more source

Physical Layer Security of Dual-Hop Hybrid FSO-mmWave Systems

open access: yesIEEE Access, 2023
Hybrid free-space optical (FSO) and millimeter wave (mmWave) systems have been proposed as an efficient solution to improve spectral efficiency and maintain link reliability.
Saud Althunibat   +4 more
doaj   +1 more source

Physical Layer Security in the Presence of Interference [PDF]

open access: yesIEEE Wireless Communications Letters, 2017
We evaluate and quantify the joint effect of fading and multiple interferers on the physical-layer (PHY) security of a system consisted of a base-station (BS), a legitimate user, and an eavesdropper. To this end, we present a novel closed-form expression for the secrecy outage probability, which takes into account the fading characteristics of the ...
Dimitrios S. Karas   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy