نتایج جستجو برای: physical layer security

تعداد نتایج: 1083740  

2015
Eiji Okamoto Yuma Inaba

Ensuring security at the physical layer in wireless communications is important and effective because it can omit upper-layer secure protocols in ad hoc or multi-hop relay transmissions, or it can enhance security together with upper-layer protocols. To realize this system, we have proposed a chaos-based multiple-input multiple-output (MIMO) transmission scheme that enables both physical-layer ...

2010
Weichao Wang

In wireless networks, the bandwidth is considered one of the most scarce and valuable resources. The physical layer network coding (PNC) technique encourages strategically picked senders to interfere so that the destination nodes can leverage the network level information to recover the signals. PNC can yield higher capacity than network layer network coding when applied to wireless networks. H...

Journal: :CoRR 2017
Fengchao Zhu Feifei Gao Hai Lin Shi Jin Junhui Zhao

In this paper, we design robust beamforming to guarantee the physical layer security for a multiuser beam division multiple access (BDMA) massive multiple-input multiple-output (MIMO) system, when the channel estimation errors are taken into consideration. With the aid of artificial noise (AN), the proposed design are formulated as minimizing the transmit power of the base station (BS), while p...

Journal: :JNW 2014
Jikang Xia Lan Chen Ying Li Endong Tong

The rapid technological developments in computing technology and the proliferation of wireless network nodes with light infrastructure, have emerged large quantities of security requirements of informational privacy in cyberspace. Due to the inherent nature of open medium, diversity and variability of network topology, wireless networks are greatly difficult to secure by traditional methods. A ...

Journal: :CoRR 2018
Yi Zhong Xiaohu Ge Tao Han Qiang Li Jing Zhang

Exchange of crucial and confidential information leads to the unprecedented attention on the security problem in wireless networks. Though the security has been studied in a number of works, the joint optimization of the physical layer security and the end-to-end delay management, which requires a meticulous cross-layer design, has seldom been evaluated. In this work, by combining the tools fro...

2010
Ninoslav Marina Mérouane Debbah Are Hjørungnes Hesham El-Gamal

Physical layer security is an emerging security area that achieves perfect secrecy data transmission between intended network nodes, while malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdroppers. We investigate the interaction between the source that tra...

Journal: :CoRR 2016
Yang Xu Jia Liu Yulong Shen Xiaohong Jiang Tarik Taleb

Yang Xu, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori State Key Laboratory of Integrated Services Network, Xidian University, Xian 710071, China Cyber Security Research Center, National Institute of Informatics, Tokyo 101-8430, Japan School of Systems Information Science, Future University Hakodate, Hakodate 041-8655, Japan Research and Development Initiative, Chuo University, Tokyo 11...

2015
S.Niranjani R.Nirmalan

Secure communication is a critical and challenging issue in wireless networks. To achieve the information theoretic secrecy the leading approach is artificial noisy symbol. The basic idea in this paper is enhancing the security in wireless communication. Multiple Inter-symbol Obfuscation(MIO) method will be deployed in the physical layer. MIO is a method for transferring the data and it provide...

2007
João Barros

Quantum information theory is widely recognized as an arguably powerful paradigm for physically secure communications. In general, any attack that an eavesdropper, say Eve, perpetrates in order to gain access to messages or keys exchanged by the legitimate parties, say Alice and Bob, will result in disturbances to quantum states that can be detected with overwhelming probability — security is g...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید