Results 11 to 20 of about 11,528 (153)
Secrecy outage probability of a NOMA scheme and impact imperfect channel state information in underlay cooperative cognitive networks [PDF]
Security performance and the impact of imperfect channel state information (CSI) in underlay cooperative cognitive networks (UCCN) is investigated in this paper.
Fazio, Peppino +4 more
core +1 more source
An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay [PDF]
Physical layer security (PLS) is considered one of the most promising solutions to solve the security problems of massive Internet of Things (IoTs) devices because of its lightweight and high efficiency.
Xiaowen Wang +4 more
doaj +2 more sources
An Overview of Key Technologies in Physical Layer Security
The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users.
Abraham Sanenga +5 more
doaj +1 more source
Key less physical layer security for wireless networks: A survey
Physical layer security (PLS) has become the kernel concept for ensuring wireless network security. The main goal of this treatise is to provide a systematic classification of key less schemes.
Megha. S. Kumar +2 more
doaj +1 more source
The expanding scale and growing connectivity of Internet of Things (IoT) devices coincide with the emergence of next-generation communication technologies.
Alperen Yasar, Rabia Tugce Yazicigil
doaj +1 more source
Physical Layer Data Analysis for Abnormal User Detecting: A Random Matrix Theory Perspective
Physical layer security (PLS) is a promising technology to enhance security performance of wireless communication systems, while the analyzing of PLS abnormal user detection is an important aspect of PLS research.
Hui Chen +4 more
doaj +1 more source
Physical Layer Security Design for Polar Code Construction
In contrast to the network security that relies on upper-layer encryption for the confidentiality and authenticity of communications, physical layer security (PLS) exploits the uniqueness and randomness of the physical channel to encrypt information and ...
Yao Zeng, Yuxi Tang, Luping Xiang
doaj +1 more source
Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security ...
Long Kong +5 more
doaj +1 more source
Towards a Unified Framework for Physical Layer Security in 5G and Beyond Networks
Wireless systems have become an increasingly pivotal part of our lives. Various critical applications and use cases such as healthcare, financial transactions, e-commerce, transportation, industrial automation, etc.
Muhammad Sohaib J. Solaija +2 more
doaj +1 more source
Effect of Radio Channel and Antennas on Physical-Layer-Security Key Exchange
The wireless channel is inherently an open medium which exposes wireless communication users to the risk of interception. The vulnerabilities of the wireless channel have led to the search for innovative and efficient security solutions at different ...
Alessandro Santorsola +4 more
doaj +1 more source

