نتایج جستجو برای: physical layer security
تعداد نتایج: 1083740 فیلتر نتایج به سال:
Visible Light Communication (VLC) systems have relatively higher security compared with traditional Radio Frequency (RF) channels due to line-of-sight (LOS) propagation. However, they still are susceptible eavesdropping. The proposed solution of the papers been built on existing work hyperchaos-based measure increase physical layer from eavesdroppers. A fourth-order Henon map is used scramble c...
As the Internet of Things (IoT) is emerging as an attractive paradigm, a typical IoT architecture that U2IoT (Unit IoT and Ubiquitous IoT) model has been presented for the future IoT. Based on the U2IoT model, this paper proposes a cyber-physical-social based security architecture (IPM) to deal with Information, Physical, and Management security perspectives, and presents how the architectural ...
Advances in wireless technologies provide both benefits and challenges when it comes to security. Communications over wireless channels are, by nature, insecure and easily susceptible to various kinds of threats. Despite the current efforts from academia and industry, the security paradigms protecting the confidentiality of wireless communications remain open issue. This paper seeks to provide ...
In the last decade or so, physical layer security had been an active research area drawing substantial attentions and collaborative efforts across different societies. Complementary to the conventional application layer security approach dominantly based on cryptography that is potentially vulnerable to quantum computationally capable eavesdropper, physical layer security was envisioned of prov...
Security breaches in large socio-technical systems cost billions. Many breaches can be attributed to the piecemeal security design, leaving parts of the system vulnerable while others are over-protected. We advocate holistic security design, and have introduced techniques to support security analysis across multiple layers. This paper presents MUSER, a prototype that assists security requiremen...
Providing secure communications over the physical layer has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as...
Optical networks form the backbone of the Internet and are an integral constituent of the physical layer of these networks. Since the physical layer forms the bottom layer in the open systems interconnection (OSI) model [1], the performance and security of the physical layer and especially optical networks have a critical influence on the six layers above it. For example, the channel capacity o...
Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper&rsqu...
In this paper, we discuss the applications of physicallayer security in LTE cellular networks. In particular, we consider three application areas of physical-layer security: authentication, key generation, and confidentiality. We present a few physicallayer security extensions targeting aforementioned application areas and demonstrate how they can be implemented in LTE systems. We also present ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید