نتایج جستجو برای: physical layer security
تعداد نتایج: 1083740 فیلتر نتایج به سال:
abstract—in this paper, the problem of secure transmission in two-hop amplify-and-forward (af) systems with an untrusted relay is investigated. to prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (dbcj) technique is used. in this method the destination sends an intended jamming signal to the relay. t...
This chapter provides a survey of physical layer security and key generation methods. This includes mainly an overview of ongoing research in physical layer security in the present and next generation communication networks. Although higher layer security mechanisms and protocols address wireless security challenges in large extent, more security vulnerabilities arise due to the increasingly pe...
This chapter provides a comprehensive review of the domain of game theory based physical layer security in wireless communications. By exploiting the wireless channel characteristic and secure cooperation of nodes, physical layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, without relying on higher-layer encry...
Today, military and commercial Spread Spectrum and CDMA transmission systems argue with security on the physical layer based on the secrecy of the seed values of static secure (and insecure) pseudorandom noise generators (PRNG). This should prevent eavesdropping and jamming [1, 2]. Confidentiality, data integrity and authenticity are usually realized in higher protocol layers [3]. Nevertheless,...
In this work, we propose a novel MIMO-aided security scheme. By exploiting an extra dimension provided by MIMO systems for adding artificial noise to the transmission process, the physical-layer security is enhanced as a result. In the proposed scheme the physical-layer may rely on upper-layer encryption techniques for security, which results in a cross-layer security scheme.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید