Results 11 to 20 of about 11,528 (153)

Secrecy outage probability of a NOMA scheme and impact imperfect channel state information in underlay cooperative cognitive networks [PDF]

open access: yes, 2020
Security performance and the impact of imperfect channel state information (CSI) in underlay cooperative cognitive networks (UCCN) is investigated in this paper.
Fazio, Peppino   +4 more
core   +1 more source

An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay [PDF]

open access: yesPeerJ Computer Science, 2023
Physical layer security (PLS) is considered one of the most promising solutions to solve the security problems of massive Internet of Things (IoTs) devices because of its lightweight and high efficiency.
Xiaowen Wang   +4 more
doaj   +2 more sources

An Overview of Key Technologies in Physical Layer Security

open access: yesEntropy, 2020
The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users.
Abraham Sanenga   +5 more
doaj   +1 more source

Key less physical layer security for wireless networks: A survey

open access: yesEngineering Science and Technology, an International Journal, 2022
Physical layer security (PLS) has become the kernel concept for ensuring wireless network security. The main goal of this treatise is to provide a systematic classification of key less schemes.
Megha. S. Kumar   +2 more
doaj   +1 more source

Physical-Layer Security for Energy-Constrained Integrated Systems: Challenges and Design Perspectives

open access: yesIEEE Open Journal of the Solid-State Circuits Society, 2023
The expanding scale and growing connectivity of Internet of Things (IoT) devices coincide with the emergence of next-generation communication technologies.
Alperen Yasar, Rabia Tugce Yazicigil
doaj   +1 more source

Physical Layer Data Analysis for Abnormal User Detecting: A Random Matrix Theory Perspective

open access: yesIEEE Access, 2019
Physical layer security (PLS) is a promising technology to enhance security performance of wireless communication systems, while the analyzing of PLS abnormal user detection is an important aspect of PLS research.
Hui Chen   +4 more
doaj   +1 more source

Physical Layer Security Design for Polar Code Construction

open access: yesCryptography, 2022
In contrast to the network security that relies on upper-layer encryption for the confidentiality and authenticity of communications, physical layer security (PLS) exploits the uniqueness and randomness of the physical channel to encrypt information and ...
Yao Zeng, Yuxi Tang, Luping Xiang
doaj   +1 more source

An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security ...
Long Kong   +5 more
doaj   +1 more source

Towards a Unified Framework for Physical Layer Security in 5G and Beyond Networks

open access: yesIEEE Open Journal of Vehicular Technology, 2022
Wireless systems have become an increasingly pivotal part of our lives. Various critical applications and use cases such as healthcare, financial transactions, e-commerce, transportation, industrial automation, etc.
Muhammad Sohaib J. Solaija   +2 more
doaj   +1 more source

Effect of Radio Channel and Antennas on Physical-Layer-Security Key Exchange

open access: yesIEEE Access, 2021
The wireless channel is inherently an open medium which exposes wireless communication users to the risk of interception. The vulnerabilities of the wireless channel have led to the search for innovative and efficient security solutions at different ...
Alessandro Santorsola   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy