A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Joint Physical Layer Encryption and PAPR Reduction Scheme Based on Polar Codes and Chaotic Sequences in OFDM System
2019
IEEE Access
Channel coding and security are important in a communication system. ...
The encryption algorithms at a higher layer have high computational complexity. The traditional secure communication 73036 2169-3536 ...
His research interests include wireless communications, wireless network resource allocation, and physical-layer security. ...
doi:10.1109/access.2019.2919598
fatcat:ovlcvilzlnbnjokq4swrh3u2r4
A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems
2021
Wireless Communications and Mobile Computing
Cooperative jamming-based physical layer security is explored to be a complement of conventional cryptographic schemes to protect private information. ...
Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for ...
for physical layer security The survey is organized as follows. ...
doi:10.1155/2021/6638405
fatcat:tm3i6b25krcgna33kweipus5ge
Directional modulation techniques for secure wireless communication: a comprehensive survey
2022
EURASIP Journal on Wireless Communications and Networking
AbstractDirectional Modulation (DM) techniques provide wireless communication security against passive eavesdropping by means of specific physical layer characteristics. ...
Further sub-categorization is based on the under-lying physical layer parameters exploited to achieve security, i.e. space, time, frequency, phase and polarization. ...
In [95] , a directional polarization modulation architecture is presented for secure dual polarized satellite communication. ...
doi:10.1186/s13638-022-02175-7
fatcat:qz3m2ggv6fg6dkdaqngcdd5faq
Session 4 Overview: mm-Wave Wireless for Communication & Radar: Wireless Subcommittee
2020
2020 IEEE International Solid- State Circuits Conference - (ISSCC)
Subcommittee Chair: Stefano Pellerano, Intel, Hillsboro, OR Mm-wave wireless communication and radar systems are key drivers for cutting-edge integrated circuit design advancements. ...
In Paper 4.3, Oregon State University and Columbia University demonstrate a novel harmonic-mixing-based beamspace RX architecture that achieves both spatial filtering and frequency-domain multiplexing ...
Lu, Princeton University, Princeton, NJ
In Paper 4.6, Princeton University describes a scalable spatio-temporal modulated mm-wave TX array for physically
secure directional wireless links across 71 to ...
doi:10.1109/isscc19947.2020.9062912
fatcat:sbao5e5hifeibilkeimi4yrydm
A Secure Constellation Design for Polarized Modulation in Wireless Communications
2020
IEEE Access
This paper presents a modulation constellation design technique for polarization modulation communication in wireless communication. ...
INDEX TERMS Constellation design, polarization modulation, depolarization effects, secure capacity, physical layer security. ...
. modulation and proposes a physical layer security scheme based on polarization direction modulation. ...
doi:10.1109/access.2020.3006833
fatcat:ee3ytd6plnajrhc6u43qgmmokq
Physical Layer Security Design for Polar Code Construction
2022
Cryptography
In contrast to the network security that relies on upper-layer encryption for the confidentiality and authenticity of communications, physical layer security (PLS) exploits the uniqueness and randomness ...
In this paper, we study the PLS of a polar-coded wireless communication system. ...
A spatial modulation scheme for channel-quality indicator (CQI) mapping was proposed in [4] , which changes the spatial modulation mapping pattern for generating physical layer keys based on the instantaneous ...
doi:10.3390/cryptography6030035
fatcat:hlshdgxxendj3kedsyf5nrhggm
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
2018
IEEE Journal on Selected Areas in Communications
The evolution towards 5G wireless communications poses new challenges for physical layer security research. ...
Wu is with Considering the potential of physical layer security for 5G wireless communications, the opportunities and challenges on how the innovative 5G technologies achieve a high security level at the ...
environments for physical layer secure communication. ...
doi:10.1109/jsac.2018.2825560
fatcat:nanjj67ilvdcfbmfpmo7zppqvy
Cooperative Wireless Communications and Physical Layer Security: State-of-the-Art
2012
Journal of Cyber Security and Mobility
Physical layer security (PLS) is the imminent security guarantee for the cooperative communication. ...
This analog from everyday realistic life simply depicts the spirit of cooperative wireless communication which utilizes the information overheard by neighbouring nodes to offer reliable communication between ...
for the researchers working
on cooperative wireless communication and physical layer security. ...
doi:10.13052/jcsm2245-1439.1235
fatcat:tb7kdqbyrfdaxghm24ytvb6vza
Information Security of PHY Layer in Wireless Networks
2016
Journal of Sensors
As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. ...
Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. ...
Zhang et al. proposed a concatenated coding scheme based on polar codes and LDPC codes for the AWGN wiretap channel. ...
doi:10.1155/2016/1230387
fatcat:lqudc242pvgepggbkzuzbuk2y4
2020 Index IEEE Communications Surveys&Tutorials Vol. 22
2020
IEEE Communications Surveys and Tutorials
Li, A., +, COMST Secondquarter 2020 796-839 Physical Layer Security for Visible Light Communication Systems: A Survey. ...
Li, A., +, COMST Secondquarter 2020 796-839 Physical Layer Security for Visible Light Communication Systems: A Survey. ...
doi:10.1109/comst.2020.3040097
fatcat:pyg6ap7huvaw7a72khurr4oh7y
Polarization distortion as a means for securing wireless communication
2014
The 8th European Conference on Antennas and Propagation (EuCAP 2014)
Unlike all previously reported physical layer wireless solutions the approach developed in this paper transfers the security property to the receive side resulting in very simple transmit and receive side ...
In addition the scheme permits, for the first time, multiple spatially separated secured receive sites to operate in parallel. ...
INTRODUCTION Recently the Directional Modulation (DM) scheme has received attention as a potential means for physical layer wireless security. ...
doi:10.1109/eucap.2014.6901990
fatcat:sk6ib654lvgsjewdnkk6aytnki
Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT
2018
Cryptography
The quantum immunity can be implemented in the cryptographic layer, e.g., by using recent lattice-based key exchange algorithms NewHope or Frodo, or in the physical layer of wireless communication, by ...
In particular, we consider NewHope and Frodo key exchange algorithms as well as novel physical layer secrecy coding approach that is based on polar codes. ...
He was also the main contributor for the introduction, discussion and conclusions sections. Adrian Kotelba analysed physical-layer security solutions and provided the secrecy coding implementation. ...
doi:10.3390/cryptography2010005
fatcat:dngahpmopbgtxonuawmwiiiuky
A Spectrum Efficient Secure Transmission Scheme Based on Directional Polarization Modulation for Wireless Communication Systems
2018
Mathematical Problems in Engineering
In this paper, a spectrum efficient secure transmission scheme based on directional polarization modulation (DPM) is proposed. ...
Finally, theoretical analysis and simulation results demonstrate that the proposed scheme can improve the transmission efficiency and provide a security transmission method for wireless communication systems ...
Conclusion In this letter, a spectrum efficient secure transmission scheme based on PM is proposed for the wireless communication system. ...
doi:10.1155/2018/2179617
fatcat:zqicxfe3ibda7n2rcilxxqjzcu
Table of contents
2019
IEEE Transactions on Communications
Rekaya-Ben Othman 3470 Physical Layer Security Secrecy Outage Probability Analysis of Friendly Jammer Selection Aided Multiuser Scheduling for Wireless Networks ........................................ ...
Tang 3351 User-Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance .............................. ........................................................................... ...
doi:10.1109/tcomm.2019.2913580
fatcat:3gszl3hpsvb2nb6ie3t4uglcbu
An Overview of Physical Layer Security With Finite-Alphabet Signaling
2019
IEEE Communications Surveys and Tutorials
Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade. ...
Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical ...
Concatenation of polar and LDPC codes are proposed in [133] . Coset codes based on convolutional and turbo codes are constructed in [132] and [134] for physical layer security. ...
doi:10.1109/comst.2018.2880421
fatcat:y4kxllk6jrbhjoztuq4hxynzrm
« Previous
Showing results 1 — 15 out of 3,685 results