نتایج جستجو برای: physical layer security

تعداد نتایج: 1083740  

Journal: :EURASIP Journal on Wireless Communications and Networking 2010

Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems)  are possible alternatives to provide security for such applications. In this paper, we consid...

2001
James Trulove

Conventional wired networks are subject to being tapped by a variety of means, whether copper or fiber connections are used. In addition, methods of network snooping exist that make such eavesdropping minimally invasive, but no less significant. Wireless networking has additional characteristics that also decrease physical network security. As new technologies emerge, the potential for loss of ...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2009
Mérouane Debbah Hesham El Gamal H. Vincent Poor Shlomo Shamai

Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز 0

a semi-empirical mathematical model for predicting physical part of ignition delay period in the combustion of direct - injection diesel engines with swirl is developed . this model based on a single droplet evaporation model . the governing equations , namely , equations of droplet motion , heat and mass transfer were solved simultaneously using a rung-kutta step by step unmerical method . the...

Journal: :International Journal of Electrical and Computer Engineering (IJECE) 2019

Journal: :IEEE open journal of the Communications Society 2021

The sixth generation (6G) of mobile network will be composed by different nodes, from macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full connectivity fabric all around us. These heterogeneous nodes constitute an ultra dense managing tons information, often very sensitive. To trust services provided such network, security is mandatory feature design. In t...

Journal: :IEEE Communications Magazine 2015

Journal: :IEEE Communications Magazine 2013

Journal: :IEEE open journal of vehicular technology 2023

While existing security protocols were designed with a focus on the core network, enhancement of B5G access network becomes critical importance. Despite strengthening 5G respect to LTE, there are still open issues that have not been fully addressed. This work is articulated around premise rethinking design bottom up, starting at physical layer, only viable in 6G but importantly, arises as an ef...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید