Molecular communications: channel model and physical layer techniques
نویسندگان
چکیده
منابع مشابه
Covert Communications Versus Physical Layer Security
This letter studies and compares the physical-layer security approach and the covert communication approach for a wiretap channel with a transmitter, an intended receiver and an eavesdropper. In order to make the comparison, we investigate the power allocation problems for maximizing the secrecy/covert rate subject to the transmit power constraint. Simulation results illustrate that if the eave...
متن کاملLattice Codes for Physical Layer Communications
Lattices are deceptively simple mathematical structures that have become indispensable for code design for physical layer communications. While lattice-related problems are interesting in their own right, the usefulness of these discrete structures in wireless communications provides additional motivation for their study and enables a multidisciplinary line of research. This thesis is devoted t...
متن کاملPhysical Layer Security for Multiuser MIMO Communications
Wireless multi-user MIMO communications are used more and more often to exchange sensitive data. Because of the broadcast nature of the physical medium, unauthorized receivers located within the transmission range can observe the signals sent by the transmitter to a legitimate receiver and eavesdrop them. Therefore, security has become an extremely important issue to deal with. Multiuser MIMO c...
متن کاملCooperative Wireless Communications: the Impact of Channel Uncertainty and Physical-layer Security Considerations
متن کامل
Generation of Secret Key for Physical Layer to Evaluate Channel Characteristics in Wireless Communications
This manuscript aims to generate a secret key for a PHY layer to evaluate the channel characteristics in wireless communications. An algorithmic approach is adopted for multimedia encryption to generate a secret key between two entities communicating with each other in a real time simulation environment such as MATLAB. Two classes of PHY key generation schemes are analyzed for designing the alg...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Wireless Communications
سال: 2016
ISSN: 1536-1284
DOI: 10.1109/mwc.2016.7553035