Quantum photonic network and physical layer security
نویسندگان
چکیده
منابع مشابه
From Quantum to Wireless: A Step Towards Physical-Layer Security
Quantum information theory is widely recognized as an arguably powerful paradigm for physically secure communications. In general, any attack that an eavesdropper, say Eve, perpetrates in order to gain access to messages or keys exchanged by the legitimate parties, say Alice and Bob, will result in disturbances to quantum states that can be detected with overwhelming probability — security is g...
متن کاملPhysical Layer Security Issues
Conventional wired networks are subject to being tapped by a variety of means, whether copper or fiber connections are used. In addition, methods of network snooping exist that make such eavesdropping minimally invasive, but no less significant. Wireless networking has additional characteristics that also decrease physical network security. As new technologies emerge, the potential for loss of ...
متن کاملWireless Physical Layer Security
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical...
متن کاملExploring the Security Capabilities of Physical Layer Network Coding
In wireless networks, the bandwidth is considered one of the most scarce and valuable resources. The physical layer network coding (PNC) technique encourages strategically picked senders to interfere so that the destination nodes can leverage the network level information to recover the signals. PNC can yield higher capacity than network layer network coding when applied to wireless networks. H...
متن کاملNetwork Layer Security
INTRODUCTION Modern computer networks are characterized by layered protocol architectures, allowing network designs to accommodate unlimited applications and interconnection techniques. This layered approach allows protocols to become modularized; that is, developed independently and put together with other protocols in such a way as to create one complete protocol. The recognized basis of prot...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences
سال: 2017
ISSN: 1364-503X,1471-2962
DOI: 10.1098/rsta.2016.0243