Code-Hopping Based Transmission Scheme for Wireless Physical-Layer Security
نویسندگان
چکیده
منابع مشابه
Wireless Physical Layer Security
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical...
متن کاملMultilevel modulated chaos MIMO transmission scheme with physical layer security
Ensuring security at the physical layer in wireless communications is important and effective because it can omit upper-layer secure protocols in ad hoc or multi-hop relay transmissions, or it can enhance security together with upper-layer protocols. To realize this system, we have proposed a chaos-based multiple-input multiple-output (MIMO) transmission scheme that enables both physical-layer ...
متن کاملPhysical Layer Security in Wireless Communication Networks
Physical layer (PHY) security has become an emerging area of research recently. Wireless networks use unguided medium as communication channels, so gathering wireless data transmission is easier when compared to traditional cable systems. With the rise of new security challenges, many different solutions have been offered and are being developed. However, maintaining security in wireless networ...
متن کاملGuest Editorial : Wireless Physical Layer Security
HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau...
متن کاملA Chaos MIMO Transmission Scheme for Channel Coding and Physical-Layer Security
In recent wireless communication systems, security is ensured mainly in the upper-layer techniques such as a password or a cryptography processing. However, security needs not be restricted to the upperlayer and the addition of physical-layer security also would yield a much more robust system. Therefore, in this paper, we exploit chaos communication and propose a chaos multiple-input multiple-...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Communications and Mobile Computing
سال: 2018
ISSN: 1530-8669,1530-8677
DOI: 10.1155/2018/7063758