نتایج جستجو برای: physical security

تعداد نتایج: 830792  

Journal: :CoRR 2016
Shiqi Gong Chengwen Xing Zesong Fei Sheng Chen

In this paper we propose a comprehensive framework exploiting the polarization sensitive array (PLA) to improve the physical layer security of wireless communications. More specifically, the polarization difference among signals are utilized to improve the secrecy rate of wireless communications, especially when these signals are spatially indistinguishable. We firstly investigate the PLA based...

Journal: :Security and Communication Networks 2009
Yingbin Liang H. Vincent Poor Shlomo Shamai

This paper reviews the information theoretic characterization of security in broadcast channels, in which a transmitter has both public and confidential messages intended for multiple receivers. All messages must be successfully received by their intended receivers, and the confidential messages must be kept as secret as possible from non-intended recipients. Various scenarios are considered in...

2016
Özge Cepheli

Physical layer (PHY) security has become an emerging area of research recently. Wireless networks use unguided medium as communication channels, so gathering wireless data transmission is easier when compared to traditional cable systems. With the rise of new security challenges, many different solutions have been offered and are being developed. However, maintaining security in wireless networ...

2018
Moslem Forouzesh Paeiz Azmi Nader Mokari Kai Kit Wong

This letter studies and compares the physical-layer security approach and the covert communication approach for a wiretap channel with a transmitter, an intended receiver and an eavesdropper. In order to make the comparison, we investigate the power allocation problems for maximizing the secrecy/covert rate subject to the transmit power constraint. Simulation results illustrate that if the eave...

2017
Walid Saad Xiangyun Zhou Mérouane Debbah H. Vincent Poor Vincent Poor

HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau...

2011
Ulrich Rührmair Srinivas Devadas Farinaz Koushanfar

Identification, authentication, and integrity checking are important tasks for ensuring the security and protection of valuable objects, devices, programs, and data. The utilization of the microscopic, random and unclonable disorder of physical media for such security tasks has recently gained increasing attention. Wherever applicable, the harnessing of disorder can lead to intriguing advantage...

Journal: :IEEE Wireless Commun. 2010
Suhas Mathur Alex Reznik Chunxuan Ye R. Mukherjee A. Rahman Yogendra Shah Wade Trappe Narayan B. Mandayam

While conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, they do not directly leverage the unique properties of the wireless domain to address security threats. The wireless medium is a powerful source of domain-specific information that can complement and enhance traditional security mechanisms. In this article, we argue that new ...

2009
Gordon W. Skelton

Cyber-Physical Security is an important topic that needs to properly address. Of particular concern is the field of wireless sensor networks which possess special characteristics that make them especially vulnerable to attacks and natural disasters. This position paper focuses on the critical issues and calls for directed research for finding solutions to these issues.

Journal: :IEEE Security & Privacy 2014
Sean Peisert Jonathan Margulies David M. Nicol Himanshu Khurana Chris Sawall

T here are at least two types of security vulnerabilities: flawed or insufficient software behavior specifications that allow compromise—for example, authentication that is lacking or that can be spoofed—and incorrect implementation of specifications— buffer overflows being a classic example and Heartbleed being a notable recent one. The sad truth is that the state of the art in specification d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید