Secure Wireless Communication via Intelligent Reflecting Surface
نویسندگان
چکیده
منابع مشابه
Performance Analysis of cooperative SWIPT System: Intelligent Reflecting Surface versus Decode-and-Forward
In this paper, we explore the impacts of utilizing intelligent reflecting surfaces (IRS) in a power-splitting based simultaneous wireless information and power transfer (PS-SWIPT) system and compare its performance with the traditional decode and forward relaying system. To analyze a more practical system, it is also assumed that the receiving nodes are subject to decoding cost, and they are on...
متن کاملSecure communication via quantum illumination
In the quantum illumination (QI) protocol for secure communication, Alice prepares entangled signal and idler beams via spontaneous parametric downconversion. She sends the signal beam to Bob, while retaining the idler. Bob imposes message modulation on the beam he receives from Alice, amplifies it, and sends it back to her. Alice then decodes Bob’s information by making a joint quantum measure...
متن کاملSecure Spaces: Location-based Secure Wireless Group Communication
We define ”Secure Space” as an enclosed area within which wireless devices can participate in secure group communication. A device is able to join a secure space group by the virtue of its location within the enclosure. The devices communicate with each other using IEEE 802.11 wireless LAN or other similar wireless access technologies. There are two important aspects of this problem — (a) deter...
متن کاملForward Secure Communication in Wireless Sensor Networks
We propose a set of security provisions for node to base station communication in wireless sensor networks. It supports standard security requirements, viz. authentication of the origin of data and confidentiality of data. Additionally we use key evolution to achieve forward security which is of particular importance in the face of node capture attacks. As a bonus we obtain implicit weak freshn...
متن کاملSecure Communication Schemes in Wireless Sensor Network
Wireless sensor networks have many potential applications for both civil and military tasks. However, sensor networks are susceptible to many types of attacks because they are deployed in open and unprotected environment. It is necessary to use effective mechanisms to protect sensor nodes against many types of attacks because sensor node requires communicating among each other or with base stat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Wireless Communications Letters
سال: 2019
ISSN: 2162-2337,2162-2345
DOI: 10.1109/lwc.2019.2919685