Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








3,685 Hits in 4.9 sec

A Joint Physical Layer Encryption and PAPR Reduction Scheme Based on Polar Codes and Chaotic Sequences in OFDM System

Xinjin Lu, Yuxin Shi, Wei Li, Jing Lei, Zhipeng Pan
2019 IEEE Access  
Channel coding and security are important in a communication system.  ...  The encryption algorithms at a higher layer have high computational complexity. The traditional secure communication 73036 2169-3536  ...  His research interests include wireless communications, wireless network resource allocation, and physical-layer security.  ... 
doi:10.1109/access.2019.2919598 fatcat:ovlcvilzlnbnjokq4swrh3u2r4

A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems

Yuandong Wu, Yan Huo, Zhuojun Duan
2021 Wireless Communications and Mobile Computing  
Cooperative jamming-based physical layer security is explored to be a complement of conventional cryptographic schemes to protect private information.  ...  Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for  ...  for physical layer security The survey is organized as follows.  ... 
doi:10.1155/2021/6638405 fatcat:tm3i6b25krcgna33kweipus5ge

Directional modulation techniques for secure wireless communication: a comprehensive survey

Omar Ansari, Muhammad Amin
2022 EURASIP Journal on Wireless Communications and Networking  
AbstractDirectional Modulation (DM) techniques provide wireless communication security against passive eavesdropping by means of specific physical layer characteristics.  ...  Further sub-categorization is based on the under-lying physical layer parameters exploited to achieve security, i.e. space, time, frequency, phase and polarization.  ...  In [95] , a directional polarization modulation architecture is presented for secure dual polarized satellite communication.  ... 
doi:10.1186/s13638-022-02175-7 fatcat:qz3m2ggv6fg6dkdaqngcdd5faq

Session 4 Overview: mm-Wave Wireless for Communication & Radar: Wireless Subcommittee

2020 2020 IEEE International Solid- State Circuits Conference - (ISSCC)  
Subcommittee Chair: Stefano Pellerano, Intel, Hillsboro, OR Mm-wave wireless communication and radar systems are key drivers for cutting-edge integrated circuit design advancements.  ...  In Paper 4.3, Oregon State University and Columbia University demonstrate a novel harmonic-mixing-based beamspace RX architecture that achieves both spatial filtering and frequency-domain multiplexing  ...  Lu, Princeton University, Princeton, NJ In Paper 4.6, Princeton University describes a scalable spatio-temporal modulated mm-wave TX array for physically secure directional wireless links across 71 to  ... 
doi:10.1109/isscc19947.2020.9062912 fatcat:sbao5e5hifeibilkeimi4yrydm

A Secure Constellation Design for Polarized Modulation in Wireless Communications

Degang Sun, Qiaoyu Zhang, Dong Wei, Meng Zhang
2020 IEEE Access  
This paper presents a modulation constellation design technique for polarization modulation communication in wireless communication.  ...  INDEX TERMS Constellation design, polarization modulation, depolarization effects, secure capacity, physical layer security.  ...  . modulation and proposes a physical layer security scheme based on polarization direction modulation.  ... 
doi:10.1109/access.2020.3006833 fatcat:ee3ytd6plnajrhc6u43qgmmokq

Physical Layer Security Design for Polar Code Construction

Yao Zeng, Yuxi Tang, Luping Xiang
2022 Cryptography  
In contrast to the network security that relies on upper-layer encryption for the confidentiality and authenticity of communications, physical layer security (PLS) exploits the uniqueness and randomness  ...  In this paper, we study the PLS of a polar-coded wireless communication system.  ...  A spatial modulation scheme for channel-quality indicator (CQI) mapping was proposed in [4] , which changes the spatial modulation mapping pattern for generating physical layer keys based on the instantaneous  ... 
doi:10.3390/cryptography6030035 fatcat:hlshdgxxendj3kedsyf5nrhggm

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 IEEE Journal on Selected Areas in Communications  
The evolution towards 5G wireless communications poses new challenges for physical layer security research.  ...  Wu is with Considering the potential of physical layer security for 5G wireless communications, the opportunities and challenges on how the innovative 5G technologies achieve a high security level at the  ...  environments for physical layer secure communication.  ... 
doi:10.1109/jsac.2018.2825560 fatcat:nanjj67ilvdcfbmfpmo7zppqvy

Cooperative Wireless Communications and Physical Layer Security: State-of-the-Art

Vandana Milind Rohokale, Neeli Rashmi Prasad, Ramjee Prasad
2012 Journal of Cyber Security and Mobility  
Physical layer security (PLS) is the imminent security guarantee for the cooperative communication.  ...  This analog from everyday realistic life simply depicts the spirit of cooperative wireless communication which utilizes the information overheard by neighbouring nodes to offer reliable communication between  ...  for the researchers working on cooperative wireless communication and physical layer security.  ... 
doi:10.13052/jcsm2245-1439.1235 fatcat:tb7kdqbyrfdaxghm24ytvb6vza

Information Security of PHY Layer in Wireless Networks

Weidong Fang, Fengrong Li, Yanzan Sun, Lianhai Shan, Shanji Chen, Chao Chen, Meiju Li
2016 Journal of Sensors  
As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention.  ...  Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based.  ...  Zhang et al. proposed a concatenated coding scheme based on polar codes and LDPC codes for the AWGN wiretap channel.  ... 
doi:10.1155/2016/1230387 fatcat:lqudc242pvgepggbkzuzbuk2y4

2020 Index IEEE Communications Surveys&Tutorials Vol. 22

2020 IEEE Communications Surveys and Tutorials  
Li, A., +, COMST Secondquarter 2020 796-839 Physical Layer Security for Visible Light Communication Systems: A Survey.  ...  Li, A., +, COMST Secondquarter 2020 796-839 Physical Layer Security for Visible Light Communication Systems: A Survey.  ... 
doi:10.1109/comst.2020.3040097 fatcat:pyg6ap7huvaw7a72khurr4oh7y

Polarization distortion as a means for securing wireless communication

Yuan Ding, Vincent Fusco
2014 The 8th European Conference on Antennas and Propagation (EuCAP 2014)  
Unlike all previously reported physical layer wireless solutions the approach developed in this paper transfers the security property to the receive side resulting in very simple transmit and receive side  ...  In addition the scheme permits, for the first time, multiple spatially separated secured receive sites to operate in parallel.  ...  INTRODUCTION Recently the Directional Modulation (DM) scheme has received attention as a potential means for physical layer wireless security.  ... 
doi:10.1109/eucap.2014.6901990 fatcat:sk6ib654lvgsjewdnkk6aytnki

Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT

2018 Cryptography  
The quantum immunity can be implemented in the cryptographic layer, e.g., by using recent lattice-based key exchange algorithms NewHope or Frodo, or in the physical layer of wireless communication, by  ...  In particular, we consider NewHope and Frodo key exchange algorithms as well as novel physical layer secrecy coding approach that is based on polar codes.  ...  He was also the main contributor for the introduction, discussion and conclusions sections. Adrian Kotelba analysed physical-layer security solutions and provided the secrecy coding implementation.  ... 
doi:10.3390/cryptography2010005 fatcat:dngahpmopbgtxonuawmwiiiuky

A Spectrum Efficient Secure Transmission Scheme Based on Directional Polarization Modulation for Wireless Communication Systems

Zhongmin Pei, Zhangkai Luo, Bo Zou
2018 Mathematical Problems in Engineering  
In this paper, a spectrum efficient secure transmission scheme based on directional polarization modulation (DPM) is proposed.  ...  Finally, theoretical analysis and simulation results demonstrate that the proposed scheme can improve the transmission efficiency and provide a security transmission method for wireless communication systems  ...  Conclusion In this letter, a spectrum efficient secure transmission scheme based on PM is proposed for the wireless communication system.  ... 
doi:10.1155/2018/2179617 fatcat:zqicxfe3ibda7n2rcilxxqjzcu

Table of contents

2019 IEEE Transactions on Communications  
Rekaya-Ben Othman 3470 Physical Layer Security Secrecy Outage Probability Analysis of Friendly Jammer Selection Aided Multiuser Scheduling for Wireless Networks ........................................  ...  Tang 3351 User-Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance .............................. ...........................................................................  ... 
doi:10.1109/tcomm.2019.2913580 fatcat:3gszl3hpsvb2nb6ie3t4uglcbu

An Overview of Physical Layer Security With Finite-Alphabet Signaling

Sina Rezaei Aghdam, Alireza Nooraiepour, Tolga M. Duman
2019 IEEE Communications Surveys and Tutorials  
Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade.  ...  Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical  ...  Concatenation of polar and LDPC codes are proposed in [133] . Coset codes based on convolutional and turbo codes are constructed in [132] and [134] for physical layer security.  ... 
doi:10.1109/comst.2018.2880421 fatcat:y4kxllk6jrbhjoztuq4hxynzrm
« Previous Showing results 1 — 15 out of 3,685 results