Results 31 to 40 of about 448,852 (275)
Physical-Layer Security over Correlated Erasure Channels
We explore the additional security obtained by noise at the physical layer in a wiretap channel model setting. Security enhancements at the physical layer have been proposed recently using a secrecy metric based on the degrees of freedom that an attacker
Almeida, J. +3 more
core +1 more source
Efficient Wireless Security Through Jamming, Coding and Routing
There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming.
Dehghan, Mostafa +3 more
core +1 more source
Physical Layer Security Performance Analysis of TASP/MRC System in Multi-eavesdropper Scene [PDF]
In order to evaluate the physical layer security performance of Transmit Antenna Selection with channel Prediction(TASP)/receive Maximum Ratio Combining(MRC) wireless communication system over Rayleigh block fading channel in multi-eavesdropper scene,the
WANG Zhanwan, LI Guangqiu, QIAN Hui
doaj +1 more source
Physical Layer Authentication in Wireless Networks-Based Machine Learning Approaches
The physical layer security of wireless networks is becoming increasingly important because of the rapid development of wireless communications and the increasing security threats.
Lamia Alhoraibi +3 more
doaj +1 more source
Physical Layer Security: Coalitional Games for Distributed Cooperation
Cooperation between wireless network nodes is a promising technique for improving the physical layer security of wireless transmission, in terms of secrecy capacity, in the presence of multiple eavesdroppers.
Basar, Tamer +4 more
core +2 more sources
Due to personal privacy, information security is a particularly important issue in wireless body area networks. Although current communication protocol has considered the security, there is still a risk that lapses in physical layer security may be a ...
Ning Wang, Weiwei Li, Ting Jiang
doaj +1 more source
Distributed wireless networks often employ voting to perform critical network functions such as fault-tolerant data fusion, cooperative sensing, and reaching consensus. Voting is implemented by sending messages to a fusion center or via direct message exchange between participants.
Nirnimesh Ghose +3 more
openaire +1 more source
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg +43 more
wiley +1 more source
Physical Layer Security for 6G: Toward Achieving Intelligent Native Security at Layer-1
This paper lays the foundations for Physical Layer Security (PLS) as a native 6G communication operation mode. 6G mobile network will enable intelligent applications, automated services, and low-latency connectivity to data networks. Security performance
Israt Ara, Brian Kelley
doaj +1 more source
A novel approach to security enhancement of chaotic DSSS systems [PDF]
In this paper, we propose a novel approach to the enhancement of physical layer security for chaotic direct-sequence spread-spectrum (DSSS) communication systems. The main idea behind our proposal is to vary the symbol period according to the behavior of
Barlet Ros, Pere +3 more
core +1 more source

