Results 1 to 10 of about 11,528 (153)

A prototype of secure telephone communication [PDF]

open access: yesScientific Reports
This paper investigates a secure wireline telephone communication system that implements physical layer security (PLS) through artificial noise (AN) injection.
Lifeng Lin   +5 more
doaj   +2 more sources

Secure channel estimation model for cognitive radio network physical layer security using two-level shared key authentication [PDF]

open access: yesScientific Reports
Physical Layer Security (PLS) in Cognitive Radio Networks (CRN) improves the confidentiality, availability, and integrity of the external communication between the devices/ users.
K. Saravanan   +3 more
doaj   +2 more sources

Secrecy Performance Enhancement Using Self-Interference Cancellation in Wireless Mutual Broadcast Networks for Proximity-Based Services [PDF]

open access: yesSensors
With the increasing demand for data exchange between nearby devices in proximity-based services, enhancing the security of wireless mutual broadcast (WMB) networks is crucial.
Taesoo Kwon, HyeonWoo LEE
doaj   +2 more sources

A Physical Layer Security (PLS) approach through Address Fed Mapping Crest Factor Reduction applicable for 5G/6G signals [PDF]

open access: yes2022 9th International Conference on Future Internet of Things and Cloud (FiCloud), 2022
The privacy and security of 5G/6G infrastructures are receiving great attention together with power consumption and efficiency. Here, Physical Layer Security (PLS) is considered and a technique named Address Fed Mapping (AFM) is proposed which not only enhances the physical layer security, but also reduces the effect of high Peak to Average Power Ratio
Mohammady, Somayeh, Malone, David, Prof.
openaire   +1 more source

Physical Layer Security for Beyond 5G: Ultra Secure Low Latency Communications

open access: yesIEEE Open Journal of the Communications Society, 2021
If Beyond-5G(B5G)/6G is to support critical infrastructure worldwide, there must be an effort to jointly integrate low latency and privacy into wireless protocols.
Anil Kumar Yerrapragada   +2 more
doaj   +1 more source

Directional modulation techniques for secure wireless communication: a comprehensive survey

open access: yesEURASIP Journal on Wireless Communications and Networking, 2022
Directional Modulation (DM) techniques provide wireless communication security against passive eavesdropping by means of specific physical layer characteristics.
Omar Ansari, Muhammad Amin
doaj   +1 more source

A Review of Fundamental Optimization Approaches and the Role of AI Enabling Technologies in Physical Layer Security

open access: yesSensors, 2022
With the proliferation of 5G mobile networks within next-generation wireless communication, the design and optimization of 5G networks are progressing in the direction of improving the physical layer security (PLS) paradigm. This phenomenon is due to the
Mulugeta Kassaw Tefera   +2 more
doaj   +1 more source

Physical-Layer Security in 6G Networks

open access: yesIEEE Open Journal of the Communications Society, 2021
The sixth generation (6G) of mobile network will be composed by different nodes, from macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full connectivity fabric all around us.
Lorenzo Mucchi   +9 more
doaj   +1 more source

Physical-Layer-Security Box: a concept for time-frequency channel-reciprocity key generation

open access: yesEURASIP Journal on Wireless Communications and Networking, 2020
The motivation for this study about Physical Layer Security comes from bridging the gap between the vast theory and a feasible implementation. We propose a Physical-Layer-Security Box as a system-level Box is a system-level solution, named PLS-Box, to ...
Marco Zoli   +4 more
doaj   +1 more source

Enhancing Physical Layer Security in MIMO Systems through Beamforming and Artificial Noise Techniques

open access: yesJISR on Computing, 2023
Physical layer security (PLS) has grown in popularity as it guarantees secure and reliable communication between wireless devices without restricting the ability of data analysts to eavesdrop.
Farah Nizam   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy