Filters








351 Hits in 5.5 sec

A Pseudo-Random Beamforming Technique for Improving Physical-Layer Security of MIMO Cellular Networks

Woong Son, Han Seung Jang, Bang Chul Jung
2019 Entropy  
In this paper, we propose a pseudo-random beamforming (PRBF) technique for improving physical-layer security (PLS) in multiple input multiple output (MIMO) downlink cellular networks consisting of a legitimate  ...  Based on extensive computer simulations, the proposed PRBF with the proposed CO-FB significantly outperforms the conventional random beamforming (RBF) with the conventional opportunistic feedback (O-FB  ...  Pseudo-Random Beamforming for Improving Physical-Layer Security In this section, we explain the proposed technique for PLS enhancement in downlink cellular networks in detail.  ... 
doi:10.3390/e21111038 fatcat:3wf4pvox4rgy3gjylvg6vt7tpe

Information Security of PHY Layer in Wireless Networks

Weidong Fang, Fengrong Li, Yanzan Sun, Lianhai Shan, Shanji Chen, Chao Chen, Meiju Li
2016 Journal of Sensors  
As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention.  ...  Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based.  ...  Chen et al. proposed multiantenna secure relaying technologies to aid wireless physical-layer security [26] .  ... 
doi:10.1155/2016/1230387 fatcat:lqudc242pvgepggbkzuzbuk2y4

Physical-Layer Security Improvement with Reconfigurable Intelligent Surfaces for 6G Wireless Communication Systems

Janghyuk Youn, Woong Son, Bang Chul Jung
2021 Sensors  
In this paper, we propose a novel RIS-based channel randomization (RCR) technique for improving physical-layer security (PLS) for a time-division duplex (TDD) downlink cellular wire-tap network which consists  ...  Then, the BS estimates wireless channels of UE with reflection matrices of all RISs and selects the UE that has the best secrecy rate for each reflection matrix generated.  ...  Conclusions In this paper, we proposed a reconfigurable intelligent surface (RIS)-based channel randomization (RCR) technique for improving physical-layer security (PLS) for a time-division duplex (TDD  ... 
doi:10.3390/s21041439 pmid:33669520 fatcat:5bh33q2hyfhn5dpb7cphfp7z7m

MAC Protocols for Wireless Mesh Networks with Multi-beam Antennas: A Survey [chapter]

Gang Wang, Yanyuan Qin
2019 Food Tourism in Asia  
This paper surveys the MAC protocols for wireless mesh networks with multi-beam antennas.  ...  with the traditional MAC protocols.  ...  There exist some unique characteristics for the relevant physical layer.  ... 
doi:10.1007/978-3-030-12388-8_9 fatcat:5fz5yw7lxjakjcv6wx624cmrsu

An Overview of Key Technologies in Physical Layer Security

Abraham Sanenga, Galefang Allycan Mapunda, Tshepiso Merapelo Ludo Jacob, Leatile Marata, Bokamoso Basutli, Joseph Monamati Chuma
2020 Entropy  
The aforesaid nature makes it possible for confidential and authentic signal transmission between the sender and the receiver in the physical layer.  ...  Physical layer security (PLS) has been identified as one of the promising security approaches to safeguard the transmission from eavesdroppers in a wireless network.  ...  Acknowledgments: We would like to acknowledge the Botswana International University of Science and Technology (BIUST) for research funding.  ... 
doi:10.3390/e22111261 pmid:33287029 fatcat:ngkceebvprbbbkrwamjzqtwaci

Physical Layer Security Enhancement for Satellite Communication among Similar Channels: Relay Selection and Power Allocation [article]

Shuai Han, Xiangxue Tai, Weixiao Meng, Cheng Li
2018 arXiv   pre-print
To implement secure communication in similar channels for satellite communications, a secure communication mod-el based on collaboration of the interference relay of the satellite physical layer is proposed  ...  The physical layer security technology of traditional terrestrial wireless communication mainly takes advantage of the difference be-tween the legitimate channel and the eaves-dropping channel; thus, it  ...  In addition, the AN technique is often combined with beamforming to achieve physical layer security.  ... 
arXiv:1808.04955v1 fatcat:idgrmeg6mjckzocvqcf7rcihxy

A Survey on Millimeter-Wave Beamforming Enabled UAV Communications and Networking [article]

Zhenyu Xiao, Lipeng Zhu, Yanming Liu, Pengfei Yi, Rui Zhang, Xiang-Gen Xia, Robert Schober
2021 arXiv   pre-print
(3D) beamforming.  ...  Finally, we present open issues and promising directions for future research in mmWave beamforming enabled UAV communications and networking.  ...  The authors of [32] explored the challenges and opportunities for UAV communication systems from the perspective of physical layer security.  ... 
arXiv:2104.09204v2 fatcat:rbywt5p7uzhhzg3hbc7tnln45q

2018 IndexIEEE Wireless Communications LettersVol. 7

2018 IEEE Wireless Communications Letters  
Ji, S., +, LWC Dec. 2018 1034-1037 Physical layer Filter Hopping Based Faster-Than-Nyquist Signaling for Physical Layer Security.  ...  ., +, LWC Feb. 2018 74-77 Physical Layer Security in Visible Light Communication Systems With Randomly Located Colluding Eavesdroppers.  ... 
doi:10.1109/lwc.2018.2888676 fatcat:olfvetmkt5bt3c572e5y76b5pm

Strong Security Approach with Compromised Nodes Detection in Cognitive Radio Sensor Networks

Liang Hong, Wei Chen, Sachin Shetty, Dan Lo, Reginald Cooper
2017 International Journal of Networking and Computing  
The approach combines efficient cryptographic technique implemented in upper layer with a novel information theory based compromised nodes detection algorithm in physical layer.  ...  Cooperative MIMO communication is a promising technology which enables realistic solution for improving communication performance with MIMO technique in wireless networks that are composed of size and  ...  Mao and Wu proposed a cross-layer scheme that uses pseudo-random tracing symbols at the physical layer and direct sequence spread spectrum symbols at the application layer for tracing and identifying the  ... 
doi:10.15803/ijnc.7.1_50 fatcat:eimsjsg7infvtftv2zlgxnhto4

Security and Privacy vulnerabilities of 5G/6G and WiFi 6: Survey and Research Directions from a Coexistence Perspective [article]

Keyvan Ramezanpour, Jithin Jagannath, Anu Jagannath
2022 arXiv   pre-print
We study potential vulnerabilities in the perspective of physical layer authentication, network access security, and cross-layer authentication mechanisms.  ...  Spectrum scarcity has been a major concern for achieving the desired quality of experience (QoE) in next-generation (5G/6G and beyond) networks supporting a massive volume of mobile and IoT devices with  ...  However, a body of research has also made claims on enhancing physical layer security using beamforming.  ... 
arXiv:2206.14997v1 fatcat:iew3uclwufcxpfi77i3sv4zuje

Spatial Modulation and MP-WFRFT-Aided Multi-Beam Wireless Communication Scheme Based On Random Frequency Diverse Array

Jianbang Gao, Bin Qiu, Jing Zhou
2020 Sensors  
Unlike conventional zero-forcing (ZF) beamforming for multi-beam DM, we design a FDA beamforming vector for each LU based on the minimum transmit power method.  ...  A security-enhanced, spectral-efficient, and power-efficient multi-beam wireless communication scheme based on random frequency diverse array (RFDA) is proposed in this paper.  ...  Related Works DM PHY DM is a secure transmission technology without encryption for physical layer security.  ... 
doi:10.3390/s20185289 pmid:32947836 fatcat:yuogl36xe5dulpivjcosdi7vwa

Securing Wireless Data Networks against Eavesdropping using Smart Antennas

Sriram Lakshmanan, Cheng-Lin Tsao, Raghupathy Sivakumar, Karthikeyan Sundaresan
2008 2008 The 28th International Conference on Distributed Computing Systems  
We then present three strategies within the context of an approach called virtual arrays of physical arrays to significantly improve the exposure region performance of a wireless LAN environment.  ...  In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas.  ...  Assuming a secure pseudo-random number generator PRNG, which uses a key K of length bits to generate a pseudo-random sequence PRNG(K).  ... 
doi:10.1109/icdcs.2008.87 dblp:conf/icdcs/LakshmananTSS08 fatcat:zc3jzztlqvfw7npx7tvmmwggoi

Table of Contents

2020 IEEE Transactions on Vehicular Technology  
Chen 7596 On the Physical Layer Security of Underlay Relay-Aided Device-to-Device Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Tian 7981 Optimal Beam Pattern Design for Hybrid Beamforming in Millimeter Wave Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/tvt.2020.3002465 fatcat:ecfvx4jl2zauxoaytvuhquduiu

On Deploying the Internet of Energy with 5G Open RAN Technology including Beamforming Mechanism

Jordi Mongay Batalla, Mustafa Moshin, Constandinos X. Mavromoustakis, Krzysztof Wesołowski, George Mastorakis, Karolina Krzykowska-Piotrowska
2022 Energies  
In our simulations, we model and validate beamforming mechanism in Open RAN 5G and show that beamforming may achieve high-efficiency parameters that the Internet of Energy requires.  ...  Due to criticality and the extension of the Internet of Energy, it needs an underlying network with vast coverage and high-efficiency parameters.  ...  random access; and (3) physical layer, which converts the information in electrical signal modulated by the sub-carrier [21, [23] [24] [25] .  ... 
doi:10.3390/en15072429 fatcat:dyog24y25ngmnbm7vos53phacy

2021 Index IEEE Transactions on Wireless Communications Vol. 20

2021 IEEE Transactions on Wireless Communications  
The Author Index contains the primary entry for each item, listed under the first author's name.  ...  ., +, TWC July 2021 4631-4645 Joint Power Allocation and Passive Beamforming Design for IRS-Assisted Physical-Layer Service Integration.  ...  ., +, TWC Feb. 2021 771-784 Physical-Layer Security for Frequency Diverse Array-Based Directional Modulation in Fluctuating Two-Ray Fading Channels.  ... 
doi:10.1109/twc.2021.3135649 fatcat:bgd3vzb7pbee7jp75dnbucihmq
« Previous Showing results 1 — 15 out of 351 results