MP-WFRFT and Chaotic Scrambling Aided Directional Modulation Technique for Physical Layer Security Enhancement

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Physical Layer Security of Generalised Pre-coded Spatial Modulation with Antenna Scrambling

In the last decade or so, physical layer security had been an active research area drawing substantial attentions and collaborative efforts across different societies. Complementary to the conventional application layer security approach dominantly based on cryptography that is potentially vulnerable to quantum computationally capable eavesdropper, physical layer security was envisioned of prov...

متن کامل

Rf Directional Modulation Technique Using a Switched Antenna Array for Physical Layer Secure Communication Applications

In this paper, we present a RF directional modulation technique using a switched antenna array for physical layer secure communication. The main idea is that a switching scheme of the switched antenna array is designed according to a spreading sequence for the purpose of spreading spectrum of the transmit signal. The transmit signal is associated with the spreading sequence and the direction of...

متن کامل

CDMA Physical Layer Built-in Security Enhancement

Served as one of the most widely used wireless airlink interface, CDMA has been identified as a major technique for 3G wireless communications. The current IS-95 CDMA provides a near-satisfactory security solution to voice centric wireless communications, since generally each voice conversation only lasts a very short period of time. However, the security features provided by IS-95 CDMA are far...

متن کامل

Physical layer security in wireless networks : design and enhancement

Security and privacy have become increasingly significant concerns in wireless communication networks, due to the open nature of the wireless medium which makes the wireless transmission vulnerable to eavesdropping and inimical attacking. The emergence and development of decentralized and ad-hoc wireless networks pose great challenges to the implementation of higher-layer key distribution and m...

متن کامل

An Efficient speech scrambling technique based on chaotic mapping and pseudorandom binary scrambling

To enhance the information security in network communications, this paper suggests a new speech scrambling algorithm based on random permutation, chaotic mapping and pseudo random binary scrambling.Firstly random permutation algorithm is used to shuffle the rows of the original speech followed by shuffling the rows using chaotic Bernoulli mapping. This produces an intermediary scrambled speech....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2019

ISSN: 2169-3536

DOI: 10.1109/access.2019.2921109