نتایج جستجو برای: physical security
تعداد نتایج: 830792 فیلتر نتایج به سال:
Today, military and commercial Spread Spectrum and CDMA transmission systems argue with security on the physical layer based on the secrecy of the seed values of static secure (and insecure) pseudorandom noise generators (PRNG). This should prevent eavesdropping and jamming [1, 2]. Confidentiality, data integrity and authenticity are usually realized in higher protocol layers [3]. Nevertheless,...
Cyber-physical systems combine traditional data-processing systems with physical actuation capabilities. The physical aspect introduces new physical risks beyond the typical cyber risks related to information security. Cyber physical systems have an additional physical interface that must be protected from attacks. Furthermore, the physical actuation capabilities increase the potential amount o...
This chapter provides a comprehensive review of the domain of game theory based physical layer security in wireless communications. By exploiting the wireless channel characteristic and secure cooperation of nodes, physical layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, without relying on higher-layer encry...
This paper considers a communication system whose source can learn from channel-related data, thereby making suitable choice of parameters for security improvement. The the is optimized using deep neural networks (DNNs). More explicitly, associated vs reliability trade-off problem characterized in terms symbol error probabilities and discrete-input continuous-output memoryless channel (DCMC) ca...
there are many indices for measuring property rights (pr) security. they may be classified into two groups: subjective proxies and objective proxies. most of the proxies are subjective. one contribution of this paper is introducing a new approach for measuring government expenditures devoted to pr protection. calculating physical capital within the introduced new approach is another contributio...
Sixth generation systems are expected to face new security challenges, while opening up frontiers toward context awareness in the wireless edge. The workhorse behind this projected technological leap will be a whole set of sensing capabilities predicted for 6G devices, addition edge and device embedded intelligence. combination these enhanced traits can give rise breed adaptive context-aware pr...
abstract—in this paper, the problem of secure transmission in two-hop amplify-and-forward (af) systems with an untrusted relay is investigated. to prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (dbcj) technique is used. in this method the destination sends an intended jamming signal to the relay. t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید