نتایج جستجو برای: physical layer security

تعداد نتایج: 1083740  

Journal: :SN computer science 2023

Visible Light Communication (VLC) systems have relatively higher security compared with traditional Radio Frequency (RF) channels due to line-of-sight (LOS) propagation. However, they still are susceptible eavesdropping. The proposed solution of the papers been built on existing work hyperchaos-based measure increase physical layer from eavesdroppers. A fourth-order Henon map is used scramble c...

2013
Huansheng Ning Hong Liu

As the Internet of Things (IoT) is emerging as an attractive paradigm, a typical IoT architecture that U2IoT (Unit IoT and Ubiquitous IoT) model has been presented for the future IoT. Based on the U2IoT model, this paper proposes a cyber-physical-social based security architecture (IPM) to deal with Information, Physical, and Management security perspectives, and presents how the architectural ...

2016
ZORAN BOJKOVIC

Advances in wireless technologies provide both benefits and challenges when it comes to security. Communications over wireless channels are, by nature, insecure and easily susceptible to various kinds of threats. Despite the current efforts from academia and industry, the security paradigms protecting the confidentiality of wireless communications remain open issue. This paper seeks to provide ...

Journal: :CoRR 2017
Rong Zhang Lie-Liang Yang Lajos Hanzo

In the last decade or so, physical layer security had been an active research area drawing substantial attentions and collaborative efforts across different societies. Complementary to the conventional application layer security approach dominantly based on cryptography that is potentially vulnerable to quantum computationally capable eavesdropper, physical layer security was envisioned of prov...

2014
Tong Li Jennifer Horkoff John Mylopoulos

Security breaches in large socio-technical systems cost billions. Many breaches can be attributed to the piecemeal security design, leaving parts of the system vulnerable while others are over-protected. We advocate holistic security design, and have introduced techniques to support security analysis across multiple layers. This paper presents MUSER, a prototype that assists security requiremen...

Journal: :CoRR 2018
Sina Rezaei Aghdam Alireza Nooraiepour Tolga M. Duman

Providing secure communications over the physical layer has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as...

2013
Ben Wu Bhavin J. Shastri Paul R. Prucnal

Optical networks form the backbone of the Internet and are an integral constituent of the physical layer of these networks. Since the physical layer forms the bottom layer in the open systems interconnection (OSI) model [1], the performance and security of the physical layer and especially optical networks have a critical influence on the six layers above it. For example, the channel capacity o...

Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper&rsqu...

2016
Adrian Kotelba Sandrine Boumard Jani Suomalainen

In this paper, we discuss the applications of physicallayer security in LTE cellular networks. In particular, we consider three application areas of physical-layer security: authentication, key generation, and confidentiality. We present a few physicallayer security extensions targeting aforementioned application areas and demonstrate how they can be implemented in LTE systems. We also present ...

Journal: :IEEE Journal of Selected Topics in Signal Processing 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید