Secure Wireless Communication via Intelligent Reflecting Surface

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Analysis of cooperative SWIPT System: Intelligent Reflecting Surface versus Decode-and-Forward

In this paper, we explore the impacts of utilizing intelligent reflecting surfaces (IRS) in a power-splitting based simultaneous wireless information and power transfer (PS-SWIPT) system and compare its performance with the traditional decode and forward relaying system. To analyze a more practical system, it is also assumed that the receiving nodes are subject to decoding cost, and they are on...

متن کامل

Secure communication via quantum illumination

In the quantum illumination (QI) protocol for secure communication, Alice prepares entangled signal and idler beams via spontaneous parametric downconversion. She sends the signal beam to Bob, while retaining the idler. Bob imposes message modulation on the beam he receives from Alice, amplifies it, and sends it back to her. Alice then decodes Bob’s information by making a joint quantum measure...

متن کامل

Secure Spaces: Location-based Secure Wireless Group Communication

We define ”Secure Space” as an enclosed area within which wireless devices can participate in secure group communication. A device is able to join a secure space group by the virtue of its location within the enclosure. The devices communicate with each other using IEEE 802.11 wireless LAN or other similar wireless access technologies. There are two important aspects of this problem — (a) deter...

متن کامل

Forward Secure Communication in Wireless Sensor Networks

We propose a set of security provisions for node to base station communication in wireless sensor networks. It supports standard security requirements, viz. authentication of the origin of data and confidentiality of data. Additionally we use key evolution to achieve forward security which is of particular importance in the face of node capture attacks. As a bonus we obtain implicit weak freshn...

متن کامل

Secure Communication Schemes in Wireless Sensor Network

Wireless sensor networks have many potential applications for both civil and military tasks. However, sensor networks are susceptible to many types of attacks because they are deployed in open and unprotected environment. It is necessary to use effective mechanisms to protect sensor nodes against many types of attacks because sensor node requires communicating among each other or with base stat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Wireless Communications Letters

سال: 2019

ISSN: 2162-2337,2162-2345

DOI: 10.1109/lwc.2019.2919685