A collaborative physical layer security scheme
نویسندگان
چکیده
منابع مشابه
Joint Scheme for Physical Layer Error Correction and Security
We present a joint scheme that combines both error correction and security at the physical layer. In conventional communication systems, error correction is carried out at the physical layer while data security is performed at an upper layer. As a result, these steps are done as separate steps. However there has been a lot of interest in providing security at the physical layer. As a result, as...
متن کاملMultilevel modulated chaos MIMO transmission scheme with physical layer security
Ensuring security at the physical layer in wireless communications is important and effective because it can omit upper-layer secure protocols in ad hoc or multi-hop relay transmissions, or it can enhance security together with upper-layer protocols. To realize this system, we have proposed a chaos-based multiple-input multiple-output (MIMO) transmission scheme that enables both physical-layer ...
متن کاملPhysical Layer Security Issues
Conventional wired networks are subject to being tapped by a variety of means, whether copper or fiber connections are used. In addition, methods of network snooping exist that make such eavesdropping minimally invasive, but no less significant. Wireless networking has additional characteristics that also decrease physical network security. As new technologies emerge, the potential for loss of ...
متن کاملWireless Physical Layer Security
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical...
متن کاملA Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security
Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper&rsqu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Electrical and Computer Engineering (IJECE)
سال: 2019
ISSN: 2088-8708,2088-8708
DOI: 10.11591/ijece.v9i3.pp1924-1934