نتایج جستجو برای: physical security

تعداد نتایج: 830792  

2004
Frank Hermanns

Today, military and commercial Spread Spectrum and CDMA transmission systems argue with security on the physical layer based on the secrecy of the seed values of static secure (and insecure) pseudorandom noise generators (PRNG). This should prevent eavesdropping and jamming [1, 2]. Confidentiality, data integrity and authenticity are usually realized in higher protocol layers [3]. Nevertheless,...

2016
Juha Puttonen Samuel Olaiya Afolaranmi Luis Gonzalez Moctezuma Andrei Lobov Jose L. Martinez

Cyber-physical systems combine traditional data-processing systems with physical actuation capabilities. The physical aspect introduces new physical risks beyond the typical cyber risks related to information security. Cyber physical systems have an additional physical interface that must be protected from attacks. Furthermore, the physical actuation capabilities increase the potential amount o...

2015
Kaizhi Huang Mingliang Li

This chapter provides a comprehensive review of the domain of game theory based physical layer security in wireless communications. By exploiting the wireless channel characteristic and secure cooperation of nodes, physical layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, without relying on higher-layer encry...

Journal: :IEEE Transactions on Cognitive Communications and Networking 2022

This paper considers a communication system whose source can learn from channel-related data, thereby making suitable choice of parameters for security improvement. The the is optimized using deep neural networks (DNNs). More explicitly, associated vs reliability trade-off problem characterized in terms symbol error probabilities and discrete-input continuous-output memoryless channel (DCMC) ca...

Journal: :iranian economic review 0
ali hussein samadi associate professor of economics, shiraz university, shiraz, iran ali hussein ostadzad ph.d. candidate in dept. of economics, shiraz university, shiraz, iran

there are many indices for measuring property rights (pr) security. they may be classified into two groups: subjective proxies and objective proxies. most of the proxies are subjective. one contribution of this paper is introducing a new approach for measuring government expenditures devoted to pr protection. calculating physical capital within the introduced new approach is another contributio...

Journal: :IEEE communications standards magazine 2022

Sixth generation systems are expected to face new security challenges, while opening up frontiers toward context awareness in the wireless edge. The workhorse behind this projected technological leap will be a whole set of sensing capabilities predicted for 6G devices, addition edge and device embedded intelligence. combination these enhanced traits can give rise breed adaptive context-aware pr...

Journal: :international journal of electrical and electronics engineering 0
ali kuhestani amirkabir university of technology abbas mohammadi amirkabir university of technology mohammad javad emadi amirkabir university of technology

abstract—in this paper, the problem of secure transmission in two-hop amplify-and-forward (af) systems with an untrusted relay is investigated. to prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (dbcj) technique is used. in this method the destination sends an intended jamming signal to the relay. t...

Journal: :Journal of Software: Evolution and Process 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید