A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Pseudo-Random Beamforming Technique for Improving Physical-Layer Security of MIMO Cellular Networks
2019
Entropy
In this paper, we propose a pseudo-random beamforming (PRBF) technique for improving physical-layer security (PLS) in multiple input multiple output (MIMO) downlink cellular networks consisting of a legitimate ...
Based on extensive computer simulations, the proposed PRBF with the proposed CO-FB significantly outperforms the conventional random beamforming (RBF) with the conventional opportunistic feedback (O-FB ...
Pseudo-Random Beamforming for Improving Physical-Layer Security In this section, we explain the proposed technique for PLS enhancement in downlink cellular networks in detail. ...
doi:10.3390/e21111038
fatcat:3wf4pvox4rgy3gjylvg6vt7tpe
Information Security of PHY Layer in Wireless Networks
2016
Journal of Sensors
As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. ...
Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. ...
Chen et al. proposed multiantenna secure relaying technologies to aid wireless physical-layer security [26] . ...
doi:10.1155/2016/1230387
fatcat:lqudc242pvgepggbkzuzbuk2y4
Physical-Layer Security Improvement with Reconfigurable Intelligent Surfaces for 6G Wireless Communication Systems
2021
Sensors
In this paper, we propose a novel RIS-based channel randomization (RCR) technique for improving physical-layer security (PLS) for a time-division duplex (TDD) downlink cellular wire-tap network which consists ...
Then, the BS estimates wireless channels of UE with reflection matrices of all RISs and selects the UE that has the best secrecy rate for each reflection matrix generated. ...
Conclusions In this paper, we proposed a reconfigurable intelligent surface (RIS)-based channel randomization (RCR) technique for improving physical-layer security (PLS) for a time-division duplex (TDD ...
doi:10.3390/s21041439
pmid:33669520
fatcat:5bh33q2hyfhn5dpb7cphfp7z7m
MAC Protocols for Wireless Mesh Networks with Multi-beam Antennas: A Survey
[chapter]
2019
Food Tourism in Asia
This paper surveys the MAC protocols for wireless mesh networks with multi-beam antennas. ...
with the traditional MAC protocols. ...
There exist some unique characteristics for the relevant physical layer. ...
doi:10.1007/978-3-030-12388-8_9
fatcat:5fz5yw7lxjakjcv6wx624cmrsu
An Overview of Key Technologies in Physical Layer Security
2020
Entropy
The aforesaid nature makes it possible for confidential and authentic signal transmission between the sender and the receiver in the physical layer. ...
Physical layer security (PLS) has been identified as one of the promising security approaches to safeguard the transmission from eavesdroppers in a wireless network. ...
Acknowledgments: We would like to acknowledge the Botswana International University of Science and Technology (BIUST) for research funding. ...
doi:10.3390/e22111261
pmid:33287029
fatcat:ngkceebvprbbbkrwamjzqtwaci
Physical Layer Security Enhancement for Satellite Communication among Similar Channels: Relay Selection and Power Allocation
[article]
2018
arXiv
pre-print
To implement secure communication in similar channels for satellite communications, a secure communication mod-el based on collaboration of the interference relay of the satellite physical layer is proposed ...
The physical layer security technology of traditional terrestrial wireless communication mainly takes advantage of the difference be-tween the legitimate channel and the eaves-dropping channel; thus, it ...
In addition, the AN technique is often combined with beamforming to achieve physical layer security. ...
arXiv:1808.04955v1
fatcat:idgrmeg6mjckzocvqcf7rcihxy
A Survey on Millimeter-Wave Beamforming Enabled UAV Communications and Networking
[article]
2021
arXiv
pre-print
(3D) beamforming. ...
Finally, we present open issues and promising directions for future research in mmWave beamforming enabled UAV communications and networking. ...
The authors of [32] explored the challenges and opportunities for UAV communication systems from the perspective of physical layer security. ...
arXiv:2104.09204v2
fatcat:rbywt5p7uzhhzg3hbc7tnln45q
2018 IndexIEEE Wireless Communications LettersVol. 7
2018
IEEE Wireless Communications Letters
Ji, S., +, LWC Dec. 2018 1034-1037 Physical layer Filter Hopping Based Faster-Than-Nyquist Signaling for Physical Layer Security. ...
., +, LWC Feb. 2018 74-77
Physical Layer Security in Visible Light Communication Systems With
Randomly Located Colluding Eavesdroppers. ...
doi:10.1109/lwc.2018.2888676
fatcat:olfvetmkt5bt3c572e5y76b5pm
Strong Security Approach with Compromised Nodes Detection in Cognitive Radio Sensor Networks
2017
International Journal of Networking and Computing
The approach combines efficient cryptographic technique implemented in upper layer with a novel information theory based compromised nodes detection algorithm in physical layer. ...
Cooperative MIMO communication is a promising technology which enables realistic solution for improving communication performance with MIMO technique in wireless networks that are composed of size and ...
Mao and Wu proposed a cross-layer scheme that uses pseudo-random tracing symbols at the physical layer and direct sequence spread spectrum symbols at the application layer for tracing and identifying the ...
doi:10.15803/ijnc.7.1_50
fatcat:eimsjsg7infvtftv2zlgxnhto4
Security and Privacy vulnerabilities of 5G/6G and WiFi 6: Survey and Research Directions from a Coexistence Perspective
[article]
2022
arXiv
pre-print
We study potential vulnerabilities in the perspective of physical layer authentication, network access security, and cross-layer authentication mechanisms. ...
Spectrum scarcity has been a major concern for achieving the desired quality of experience (QoE) in next-generation (5G/6G and beyond) networks supporting a massive volume of mobile and IoT devices with ...
However, a body of research has also made claims on enhancing physical layer security using beamforming. ...
arXiv:2206.14997v1
fatcat:iew3uclwufcxpfi77i3sv4zuje
Spatial Modulation and MP-WFRFT-Aided Multi-Beam Wireless Communication Scheme Based On Random Frequency Diverse Array
2020
Sensors
Unlike conventional zero-forcing (ZF) beamforming for multi-beam DM, we design a FDA beamforming vector for each LU based on the minimum transmit power method. ...
A security-enhanced, spectral-efficient, and power-efficient multi-beam wireless communication scheme based on random frequency diverse array (RFDA) is proposed in this paper. ...
Related Works
DM PHY DM is a secure transmission technology without encryption for physical layer security. ...
doi:10.3390/s20185289
pmid:32947836
fatcat:yuogl36xe5dulpivjcosdi7vwa
Securing Wireless Data Networks against Eavesdropping using Smart Antennas
2008
2008 The 28th International Conference on Distributed Computing Systems
We then present three strategies within the context of an approach called virtual arrays of physical arrays to significantly improve the exposure region performance of a wireless LAN environment. ...
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. ...
Assuming a secure pseudo-random number generator PRNG, which uses a key K of length bits to generate a pseudo-random sequence PRNG(K). ...
doi:10.1109/icdcs.2008.87
dblp:conf/icdcs/LakshmananTSS08
fatcat:zc3jzztlqvfw7npx7tvmmwggoi
Table of Contents
2020
IEEE Transactions on Vehicular Technology
Chen 7596 On the Physical Layer Security of Underlay Relay-Aided Device-to-Device Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
Tian 7981 Optimal Beam Pattern Design for Hybrid Beamforming in Millimeter Wave Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
doi:10.1109/tvt.2020.3002465
fatcat:ecfvx4jl2zauxoaytvuhquduiu
On Deploying the Internet of Energy with 5G Open RAN Technology including Beamforming Mechanism
2022
Energies
In our simulations, we model and validate beamforming mechanism in Open RAN 5G and show that beamforming may achieve high-efficiency parameters that the Internet of Energy requires. ...
Due to criticality and the extension of the Internet of Energy, it needs an underlying network with vast coverage and high-efficiency parameters. ...
random access; and (3) physical layer, which converts the information in electrical signal modulated by the sub-carrier [21, [23] [24] [25] . ...
doi:10.3390/en15072429
fatcat:dyog24y25ngmnbm7vos53phacy
2021 Index IEEE Transactions on Wireless Communications Vol. 20
2021
IEEE Transactions on Wireless Communications
The Author Index contains the primary entry for each item, listed under the first author's name. ...
., +, TWC July 2021 4631-4645 Joint Power Allocation and Passive Beamforming Design for IRS-Assisted Physical-Layer Service Integration. ...
., +, TWC Feb. 2021 771-784 Physical-Layer Security for Frequency Diverse Array-Based Directional Modulation in Fluctuating Two-Ray Fading Channels. ...
doi:10.1109/twc.2021.3135649
fatcat:bgd3vzb7pbee7jp75dnbucihmq
« Previous
Showing results 1 — 15 out of 351 results