Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2,101 Hits in 8.3 sec

IEEE Access Special Section Editorial: Secure Modulations for Future Wireless Communications and Mobile Networks

Feng Shu, Shihao Yan, Dongming Wang, Xiangwei zhou, Jiangzhou Wang
2019 IEEE Access  
VOLUME 7, 2019 The article, ''Artificial noise aided precoding with imperfect CSI in full-duplex relaying secure communications,'' by Li, et al., proposed the secure artificial noise aided precoding  ...  Finally, the article, ''Secrecy performance analysis of artificial-noise-aided spatial modulation in the presence of imperfect CSI,'' by Yu et al., investigated the physical layer security based on the  ... 
doi:10.1109/access.2019.2960171 fatcat:nlanqfc3wva5hfnyalxwuk3adu

Safeguarding 5G wireless communication networks using physical layer security

Nan Yang, Lifeng Wang, Giovanni Geraci, Maged Elkashlan, Jinhong Yuan, Marco Di Renzo
2015 IEEE Communications Magazine  
Obviously, the current physical layer security technologies for the direct single-user and multi-user transmissions [3, 4] and the relay-aided communications [5] in conventional networks cannot be  ...  Beamforming with artificial noise for P I =0.8 P tot Beamforming with artificial noise for P I =0. Figure 1 . 1 Heterogeneous network.  ... 
doi:10.1109/mcom.2015.7081071 fatcat:ow3da4lejzfo3pcjp2s7dpmr6i

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [article]

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 arXiv   pre-print
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer.  ...  Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.  ...  PHYSICAL LAYER SECURITY IN MASSIVE MIMO SYSTEMS Zhu et al. study secure massive MIMO transmissions for multi-cell multi-user systems over i.i.d.  ... 
arXiv:1801.05227v1 fatcat:gktqlyt4wrfhnjdxfvl3vlmhau

Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey

José David Vega Sánchez, Luis Urquiza-Aguiar, Martha Cecilia Paredes Paredes
2019 Zenodo  
The main idea of physical layer security is to take advantage of the features of the wireless channel and its impairments in order to ensure secure communication in the physical layer.  ...  This paper provides a comprehensive review of information-theoretic measures of the secrecy performance in physical layer security.  ...  The use of artificial noise (AN)-aiding schemes to degrade the eavesdropping channel to improve the security in massive MIMO was analyzed in [53] .  ... 
doi:10.5281/zenodo.3532040 fatcat:lct4ai7lf5hzpmepwqwv6e72t4

Survey on Physical Layer Security for 5G Wireless Networks [article]

José David Vega Sánchez, Luis Urquiza-Aguiar, Martha Cecilia Paredes Paredes, Diana Pamela Moya Osorio
2020 arXiv   pre-print
The idea of physical layer security is to take advantage of the features of the propagation medium and its impairments to ensure secure communication in the physical layer.  ...  This work introduces a comprehensive review of the main information-theoretic metrics used to measure the secrecy performance in physical layer security.  ...  on higher layer cryptographic mechanisms [3] , physical layer security (PLS) uses the inherent randomness (e.g., noise and fading) of the wireless channel to ensure secure communications in the physical  ... 
arXiv:2006.08044v1 fatcat:r5l25bicwjhanidz3qu7bbi4mi

Millimeter Wave Communications with OMA and NOMA Schemes for Future Communication Systems

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Various schemes such as small cells, heterogeneous network and hybrid beamforming are used to overcome interferences and highlight the prominence of mmWave in future communications systems.  ...  This paper describes a detailed survey of mmWave communications with orthogonal multiple access (OMA), non-orthogonal multiple access (NOMA) schemes, physical design and security for future communication  ...  Two artificial-noise-aided multi-antenna transmission strategies based on antenna beamforming [31] .  ... 
doi:10.35940/ijitee.l8001.1110120 fatcat:tpamshikhbbozoejwg22vrihze

Table of contents

2018 IEEE Transactions on Wireless Communications  
Feng Wang, Lingjie Duan, and Jianwei Niu Physical-Layer Security in Cache-Enabled Cooperative Small Cell Networks Against Randomly Distributed Eavesdroppers ............................................  ...  Lipeng Zhu, Jun Zhang, Zhenyu Xiao, Xianbin Cao, Dapeng Oliver Wu, and Xiang-Gen Xia Joint PHY/MAC Layer Security Design Using ARQ With MRC and Null-Space Independent PAPR-Aware Artificial Noise in SISO  ... 
doi:10.1109/twc.2018.2865797 fatcat:u5r6wnxh65fzjktorzsgb5p5uq

Physical-Layer Security in 6G Networks

L. Mucchi, S. Jayousi, S. Caputo, E. Panayirci, S. Shahabuddin, J. Bechtold, I. Morales, A. Stoica, G. Abreu, H. Haas
2021 IEEE Open Journal of the Communications Society  
In this scenario, physical-layer security (PLS) can act as a first line of defense, providing security even to low-resourced nodes in different environments.  ...  This paper discusses challenges, solutions and visions of PLS in beyond-5G networks.  ...  In [54] , the authors investigated an IRS-aided secure wireless communication system where a multi-antenna access point (AP) sends confidential message in the presence of an eavesdropper.  ... 
doi:10.1109/ojcoms.2021.3103735 fatcat:kcntnplyqnc45bp5i5wceiwk4m

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 IEEE Journal on Selected Areas in Communications  
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer.  ...  In particular, we focus on the following typical technologies: 1) Physical layer security coding: Although the first physical layer security code appears around 1970s, to design explicit security codes  ...  Lv et al. first study the physical layer security in a downlink two-tier heterogeneous network with multiple singleantenna users and a single-antenna eavesdropper in each cell [76] .  ... 
doi:10.1109/jsac.2018.2825560 fatcat:nanjj67ilvdcfbmfpmo7zppqvy

Table of contents

2019 IEEE Transactions on Communications  
Wang, and L.Hanzo 2260 Artificial-Noise-Aided Nonlinear Secure Transmission for Multiuser Multi-Antenna Systems With Finite-Rate Feedback ...............................................................  ...  Alouini 2245 Physical Layer Security Learning-Aided Physical Layer Authentication as an Intelligent Process ............ H. Fang, X.  ... 
doi:10.1109/tcomm.2019.2897183 fatcat:lzbqxlv4srhzpdrrltonxno5oi

An Innovative Infrastructure Based on Shape-Adaptive RIS for Smart Industrial IoTs

Jiazheng Wang, Xiuhua Fu, Rongqun Peng, Michel Kadoch
2022 Electronics  
security.  ...  by scalable RIS unit sizes and macroscopically changeable physical shapes.  ...  Acknowledgments: We thank the State Key Laboratory of Networking and Switching Technology for the financial support. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics11030391 fatcat:deevslhxbzem5nis6277ktlxle

Table of Contents

2018 IEEE Transactions on Vehicular Technology  
O'Farrell 11848 Secrecy Energy Efficiency Optimization for Artificial Noise Aided Physical-Layer Security in OFDM-Based Cognitive Radio Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Chen 11833 Systems Analysis of a Pattern Reconfigurable Antenna for Capacity Improvement of Cell Edge Users in Cellular Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/tvt.2018.2879129 fatcat:kgtslgt3ujhgtf7jxu22lkvlqq

Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT with Multiple Access Mobile Edge Computing in Smart City

Dong Wang, Bo Bai, Kai Lei, Wenbo Zhao, Yanping Yang, Zhu Han
2019 IEEE Access  
Therefore, in this paper, the solutions to address the security threats are investigated from physical layer perspectives, since physical layer security technologies have the advantages of achieving perfect  ...  INDEX TERMS Physical layer security, encryption-based security, multi-access mobile edge computing (MA-MEC), heterogeneous Internet of Things (IoT), smart city. 54508 2169-3536  ...  Although the densely deployed small cells will benefit the realization of MA-MEC, the evolution towards the architecture of high-density small cells in future heterogeneous access networks also bring critical  ... 
doi:10.1109/access.2019.2913438 fatcat:bk2b4tiy4jf5pmrmtpu72w5x7a

Physical Layer Security in Heterogeneous Cellular Networks [article]

Hui-Ming Wang, Tong-Xing Zheng, Jinhong Yuan, Don Towsley, Moon Ho Lee
2016 arXiv   pre-print
This paper comprehensively studies physical layer security in a multi-tier HCN where base stations (BSs), authorized users and eavesdroppers are all randomly located.  ...  The heterogeneous cellular network (HCN) is a promising approach to the deployment of 5G cellular networks.  ...  We provide a comprehensive performance analysis of artificial-noise-aided multi-antenna secure transmission under a stochastic geometry framework.  ... 
arXiv:1601.01427v1 fatcat:6kvib7dhpjgcjhrsc5fi3fsux4

A Comprehensive Survey of 6G Wireless Communications [article]

Yang Zhao, Wenchao Zhai, Jun Zhao, Tinghao Zhang, Sumei Sun, Dusit Niyato, Kwok-Yan Lam
2021 arXiv   pre-print
Subsequently, we introduce various 6G technologies and their existing challenges in detail, e.g., artificial intelligence (AI), intelligent surfaces, THz, space-air-ground-sea integrated network, cell-free  ...  Next, we discuss security and privacy techniques that can be applied to protect data in 6G.  ...  Conventional cellular networks use multi-cell MIMO systems, in which an array of co-located antennas serve each cell [227] .  ... 
arXiv:2101.03889v2 fatcat:35sfasu4bbgttg3cnsfzp62oda
« Previous Showing results 1 — 15 out of 2,101 results