نتایج جستجو برای: physical layer security
تعداد نتایج: 1083740 فیلتر نتایج به سال:
We consider a single-cell downlink massive MIMO communication in the presence of an adversary capable of jamming and eavesdropping simultaneously. We show that massive MIMO communication is naturally resilient to no training-phase jamming attack in which the adversary jams only the data communication and eavesdrops both the data communication and the training. Specifically, we show that the sec...
Physical layer (PHY) security has become an emerging area of research recently. Wireless networks use unguided medium as communication channels, so gathering wireless data transmission is easier when compared to traditional cable systems. With the rise of new security challenges, many different solutions have been offered and are being developed. However, maintaining security in wireless networ...
This letter studies and compares the physical-layer security approach and the covert communication approach for a wiretap channel with a transmitter, an intended receiver and an eavesdropper. In order to make the comparison, we investigate the power allocation problems for maximizing the secrecy/covert rate subject to the transmit power constraint. Simulation results illustrate that if the eave...
Served as one of the most widely used wireless airlink interface, CDMA has been identified as a major technique for 3G wireless communications. The current IS-95 CDMA provides a near-satisfactory security solution to voice centric wireless communications, since generally each voice conversation only lasts a very short period of time. However, the security features provided by IS-95 CDMA are far...
This paper presents a coding scheme for the Gaussian wiretap channel based on low-density parity-check (LDPC) codes. The messages are transmitted over punctured bits to hide data from eavesdroppers. It is shown that this method is asymptotically effective in the sense that it yields a BER very close to 0.5 for an eavesdropper whose SNR is lower than the threshold SNRE , even if the eavesdropper...
Wireless multi-user MIMO communications are used more and more often to exchange sensitive data. Because of the broadcast nature of the physical medium, unauthorized receivers located within the transmission range can observe the signals sent by the transmitter to a legitimate receiver and eavesdrop them. Therefore, security has become an extremely important issue to deal with. Multiuser MIMO c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید