نتایج جستجو برای: physical layer security
تعداد نتایج: 1083740 فیلتر نتایج به سال:
Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consid...
Conventional wired networks are subject to being tapped by a variety of means, whether copper or fiber connections are used. In addition, methods of network snooping exist that make such eavesdropping minimally invasive, but no less significant. Wireless networking has additional characteristics that also decrease physical network security. As new technologies emerge, the potential for loss of ...
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical...
a semi-empirical mathematical model for predicting physical part of ignition delay period in the combustion of direct - injection diesel engines with swirl is developed . this model based on a single droplet evaporation model . the governing equations , namely , equations of droplet motion , heat and mass transfer were solved simultaneously using a rung-kutta step by step unmerical method . the...
The sixth generation (6G) of mobile network will be composed by different nodes, from macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full connectivity fabric all around us. These heterogeneous nodes constitute an ultra dense managing tons information, often very sensitive. To trust services provided such network, security is mandatory feature design. In t...
While existing security protocols were designed with a focus on the core network, enhancement of B5G access network becomes critical importance. Despite strengthening 5G respect to LTE, there are still open issues that have not been fully addressed. This work is articulated around premise rethinking design bottom up, starting at physical layer, only viable in 6G but importantly, arises as an ef...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید