To see the other types of publications on this topic, follow the link: Physical layer of communication system.

Journal articles on the topic 'Physical layer of communication system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Physical layer of communication system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dhanya, T. "An Impact of ZigBee Technology in Data Communication System." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (2018): 64–67. https://doi.org/10.11591/ijeecs.v9.i1.pp64-67.

Full text
Abstract:
ZigBee is an IEEE 802.15.4 standard for information interchanges with business and purchaser gadgets. It is composed around low-control utilization permitting batteries to keep going forever. The ZigBee standard gives system, security, and application bolster administrations working on top of the IEEE 802.15.4 Medium Access Control (MAC) and Physical Layer (PHY) remote standard. It utilizes a suite of innovations to empower adaptable, self-arranging, self-mending systems that can oversee different information movement designs. ZigBee is an ease, low-control, remote lattice organizing standard.
APA, Harvard, Vancouver, ISO, and other styles
2

Susilawati Susilawati, Marcel Ade Satria, Khaila Mardina, Juniwan Juniwan, and Didik Aribowo. "Implementasi Teknologi Komunikasi Data Menggunakan Open System Interconnection (OSI) Untuk Berkirim Pesan Antar Perangkat." Venus: Jurnal Publikasi Rumpun Ilmu Teknik 2, no. 3 (2024): 124–29. http://dx.doi.org/10.61132/venus.v2i3.307.

Full text
Abstract:
Currently, the development of communication networks has influenced how humans communicate and exchange information. Data communications technology reflects the rapid evolution in the way humans communicate and exchange information. Data communication is the process of exchanging information between two or more devices via a transmission medium, such as cables, radio waves, or other network infrastructure. The goal of data communications is to transfer data from one location to another quickly, efficiently, and accurately. The method used is to look for references from several internet sources
APA, Harvard, Vancouver, ISO, and other styles
3

Shi, Zhi Yuan, Chang Zheng Zhang, Cai Dan Zhao, Lian Fen Huang, and Yi Feng Zhao. "One Solution to Physical-Layer Authentication in Wireless Communication System." Advanced Materials Research 791-793 (September 2013): 2071–75. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.2071.

Full text
Abstract:
Authentication is the process where claims of identity are verified. Most mechanisms of authentication exist above the physical layer, though some exist at the physical layer often with an additional cost in bandwidth. This paper introduces a general analysis and design framework for authentication at the physical layer where the authentication information is transmitted synchronously with the data. By superimposing a carefully designed secret modulation (wavelet transform) on the waveforms, authentication is added to the signal without requiring additional bandwidth. Simulation results are gi
APA, Harvard, Vancouver, ISO, and other styles
4

Wei Yixin, Yang Changgang, Wei Amin, et al. "Physical-layer security of underwater wireless optical communication." Acta Physica Sinica 74, no. 6 (2025): 0. https://doi.org/10.7498/aps.74.20241547.

Full text
Abstract:
Underwater wireless optical communication (UWOC) provides significant advantages, including high bandwidth, low latency, and low power consumption, establishing it as a crucial technology for building information networks in marine environments. However, due to the scattering effect of seawater, some photons carrying information are inevitably scattered out of their predetermined paths, resulting in the potential for information leakage. Therefore, we propose a physical-layer security analysis model for UWOC systems based on the wiretap channel model. The model evaluates the security of the co
APA, Harvard, Vancouver, ISO, and other styles
5

Luo, Shuai, Hongwei Liu, and Ershi Qi. "Big data analytics – enabled cyber-physical system: model and applications." Industrial Management & Data Systems 119, no. 5 (2019): 1072–88. http://dx.doi.org/10.1108/imds-10-2018-0445.

Full text
Abstract:
Purpose The purpose of this paper is to propose a comprehensive framework for integrating big data analytics (BDA) into cyber-physical system (CPS) solutions. This framework provides a wide range of functions, including data collection, smart data preprocessing, smart data mining and smart data visualization. Design/methodology/approach The architecture of CPS was designed with cyber layer, physical layer and communication layer from the perspective of big data processing. The BDA model was integrated into a CPS that enables managers to make sound decisions. Findings The effectiveness of the p
APA, Harvard, Vancouver, ISO, and other styles
6

Rusins, Artis, Deniss Tiscenko, Eriks Dobelis, Eduards Blumbergs, Krisjanis Nesenbergs, and Peteris Paikens. "Wearable Device Bluetooth/BLE Physical Layer Dataset." Data 9, no. 4 (2024): 53. http://dx.doi.org/10.3390/data9040053.

Full text
Abstract:
Wearable devices, such as headsets and activity trackers, rely heavily on the Bluetooth and/or the Bluetooth Low Energy wireless communication standard to exchange data with smartphones or other peripherals. Since these devices collect personal health and activity data, ensuring the privacy and security of the transmitted data is crucial. Therefore, we present a dataset that captures complete Bluetooth communications—including advertising, connection, data exchange, and disconnection—in an RF isolated environment using software-defined radio. We were able to successfully decode the captured Bl
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Jiawei, Ruixia Cheng, Junwen Zhu, Yu Tian, and Yiwen Zhang. "Wireless secure communication involving UAV: an overview of physical layer security." MATEC Web of Conferences 336 (2021): 04005. http://dx.doi.org/10.1051/matecconf/202133604005.

Full text
Abstract:
Unmanned aerial vehicle (UAV) is a flight device with power and energy based on computer program control, which has the characteristics of small size, light weight, high maneuverability and low cost. With its characteristics, UAV can play an important role in military and civil fields. However, due to the broadcast nature of wireless communication and inherent air-to-ground line-of-sight channel, UAV wireless communication system is more vulnerable to security threats. On the basis of traditional encryption technology, the secrecy capacity of the UAV communication system can be improved by int
APA, Harvard, Vancouver, ISO, and other styles
8

Katariya, Jitendra Kumar, Honganur Raju Manjunath, Ashwini Malviya, and Ritesh Kumar. "Securing the IoT wireless communication system: A multi-access physical layer approach." Multidisciplinary Science Journal 6 (July 12, 2024): 2024ss0320. http://dx.doi.org/10.31893/multiscience.2024ss0320.

Full text
Abstract:
Wireless systems play an important role in the automation process in the industrial scene. An authentication technique with minimal complexity, small weight, and excellent security is urgently needed for this kind of system. These needs are satisfied by the development of physical layer authentication. However, the security of these devices has become a major concern due to the proliferation of Wireless Communication Systems (WCSs) in the Internet of Things (IoT) ecosystem. To address this issue, a Multi-Access Physical Layer (M-APL) can be used to secure IoT wireless communication systems. Th
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Xiaolong, and Wei Wu. "Wireless Communication Physical Layer Sensing Antenna Array Construction and Information Security Analysis." Journal of Sensors 2021 (October 25, 2021): 1–11. http://dx.doi.org/10.1155/2021/9007071.

Full text
Abstract:
Due to the complexity of wireless communication networks and the open nature of wireless links, complex upper layer network encryption cryptographic algorithms are also difficult to implement effectively in complex mobile wireless communication and interconnection networks, and traditional cryptography-based security policies are gradually not well able to meet the security management needs of today’s mobile Internet information era. In this paper, the physical characteristics of the channel in the wireless channel are extracted and used to generate keys, and then, the keys are negotiated so t
APA, Harvard, Vancouver, ISO, and other styles
10

Yuan, Quan Sheng, Yong Jiang Hu, Chang Long Wang, and Zhi Min Yang. "Application of Coded Modulation for Physical-Layer Network Coding." Applied Mechanics and Materials 713-715 (January 2015): 1068–72. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.1068.

Full text
Abstract:
It has been proved that Physical-layer Network Coding (PNC) can boost the system throughput obviously and decrease the error rate by reducing the time slots of inter-communication,which makes signal processing efficient and reliable.Coded Modulation (CM) considers coding and modulation as a whole,which makes coding and modulation effective without decreasing system transmission rate ,to guarantee bandwith efficiency.In this paper,the basic idea of the CM and its implementation are introduced.We analyze the effect of the combination of CM and PNC for communication system performance,which provi
APA, Harvard, Vancouver, ISO, and other styles
11

P, Satyanarayana, Charishma Devi. V, Sowjanya P, Satish Babu, N. Syam Kumar, and M. N. V. S. "Implementation of conventional communication system in deep learning." International Journal of Engineering & Technology 7, no. 1.1 (2017): 696. http://dx.doi.org/10.14419/ijet.v7i1.1.10835.

Full text
Abstract:
Machine learning (ML) has been broadly connected to the upper layers of communication systems for different purposes, for example, arrangement of cognitive radio and communication network. Nevertheless, its application to the physical layer is hindered by complex channel conditions and constrained learning capacity of regular ML algorithms. Deep learning (DL) has been as of late connected for some fields, for example, computer vision and normal dialect preparing, given its expressive limit and advantageous enhancement ability. This paper describes about a novel use of DL for the physical layer
APA, Harvard, Vancouver, ISO, and other styles
12

MD.Asif. "POTENTIAL CAPABILITY OF LTE-ADVANCED PHYSICAL LAYER." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 5, no. 6 (2018): 129–42. https://doi.org/10.5281/zenodo.1290457.

Full text
Abstract:
LTE-Advanced (LTE-A) is usually referred as 4G Communication is the evolved version of LTE that is being developed by 3GPP. LTE-A will meet or exceed the requirements of the International Telecommunication Union (ITU) for the Fourth Generation (4G) radio communication standard known as IMT-Advanced. LTE-A is being specified initially as part of Release 10 of the 3GPP specifications. In this paper, we present an in-depth analysis of the LTE-A downlink physical layer characteristics and its performance. The  work analyzes  a detailed potential ability study of Physical layer in LTE-Adv
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Ying, Guoan Zhang, Siyu Chen, Jaeho Choi, and Pin-Han Ho. "Optimal Element Allocation for RIS-Aided Physical Layer Security." Wireless Communications and Mobile Computing 2022 (September 21, 2022): 1–7. http://dx.doi.org/10.1155/2022/4617366.

Full text
Abstract:
In this paper, we investigate an innovative physical layer security (PLS) scheme for an uncertain reconfigurable intelligent surface- (RIS-) assisted communication system under eavesdropping attack. Specifically, in our proposed system, we consider that the uncertain RIS is known to the legitimate user while not to the eavesdropper (Eve). In this manner, the reflective elements of the uncertain RIS are adjusted to strengthen the keen signals for the legitimate user while suppressing the signals for Eve via jamming. We analyze the system by assuming legitimate and wiretap channels, respectively
APA, Harvard, Vancouver, ISO, and other styles
14

Jacovic, Marko, Kyle Juretus, Nagarajan Kandasamy, Ioannis Savidis, and Kapil R. Dandekar. "Physical Layer Encryption for Wireless OFDM Communication Systems." Journal of Hardware and Systems Security 4, no. 3 (2020): 230–45. http://dx.doi.org/10.1007/s41635-020-00097-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Gu, Jinyuan, Zhao Zhang, Wei Duan, Feifei Song, and Huaiping Zhang. "Physical Layer Security in RIS-NOMA-Assisted IoV Systems with Uncertain RIS Deployment." Electronics 13, no. 22 (2024): 4437. http://dx.doi.org/10.3390/electronics13224437.

Full text
Abstract:
Reconfigurable intelligent surfaces (RISs), as an emerging radio technology, are widely used to expand the transmission distance and structure cascade channels to improve the performance of communication systems. However, based on the continuous development of wireless communication technology, as Internet of Vehicles (IoV) communication systems assisted with RIS and non-orthogonal multiple access (NOMA) can improve the overall transmission rate and system performance, the physical layer security (PLS) issue has gradually attracted attention and has become more and more important in the applic
APA, Harvard, Vancouver, ISO, and other styles
16

Wei, Qingmei, Buhong Wang, and Kunrui Cao. "Physical Layer Security Technology Based on Nonorthogonal Multiple Access Communication." Mobile Information Systems 2022 (June 29, 2022): 1–11. http://dx.doi.org/10.1155/2022/6303210.

Full text
Abstract:
NOMA (nonorthogonal multiple access) technology is an effective technical means to improve spectral efficiency and system capacity. At present, due to the proliferation of access devices and other reasons, the network security communication is facing very serious challenges. This research combines TAS (antenna selection) technology and AN (artificial noise) technology, applies them to NOMA system, and proposes a physical layer optimized security transmission scheme in which AN signals are superimposed at the base station. In this scheme, a part of the total power is divided into the AN signal,
APA, Harvard, Vancouver, ISO, and other styles
17

Chen, Jinsong, Kai Wu, Jinping Niu, and Yanyan Li. "Joint Active and Passive Beamforming in RIS-Assisted Secure ISAC Systems." Sensors 24, no. 1 (2024): 289. http://dx.doi.org/10.3390/s24010289.

Full text
Abstract:
This paper investigates joint beamforming in a secure integrated sensing and communications (ISAC) system assisted by reconfigurable intelligent surfaces (RIS). The system communicates with legitimate downlink users, detecting a potential target, which is a potential eavesdropper attempting to intercept the downlink communication information from the base station (BS) to legitimate users. To enhance the physical-layer secrecy of the system, we design and introduce interference signals at the BS to disrupt eavesdroppers’ attempts to intercept legitimate communication information. The BS simulta
APA, Harvard, Vancouver, ISO, and other styles
18

Zhang, Zhenyu, Anas Chaaban, and Lutz Lampe. "Physical layer security in light-fidelity systems." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 378, no. 2169 (2020): 20190193. http://dx.doi.org/10.1098/rsta.2019.0193.

Full text
Abstract:
Light-fidelity (LiFi) is a light-based wireless communication technology which can complement radio-frequency (RF) communication technologies for indoor applications. Although LiFi signals are spatially more contained than RF signals, the broadcasting nature of LiFi also makes it susceptible to eavesdropping. Therefore, it is important to secure the transmitted data against potential eavesdroppers. In this paper, an overview of the recent developments pertaining to LiFi physical layer security (PLS) is provided, and the main differences between LiFi PLS and RF PLS are explained. LiFi achievabl
APA, Harvard, Vancouver, ISO, and other styles
19

Hong, Tao, Cong Liu, and Michel Kadoch. "Machine Learning Based Antenna Design for Physical Layer Security in Ambient Backscatter Communications." Wireless Communications and Mobile Computing 2019 (January 1, 2019): 1–10. http://dx.doi.org/10.1155/2019/4870656.

Full text
Abstract:
Ambient backscatter employs existing radio frequency (RF) signals in the environment to support sustainable and independent communications, thereby providing a new set of applications that promote the Internet of Things (IoT). However, nondirectional forms of communication are prone to information leakage. In order to ensure the security of the IoT communication system, in this paper, we propose a machine learning based antenna design scheme, which achieves directional communication from the relay tag to the receiving reader by combining patch antenna with log-periodic dual-dipole antenna (LPD
APA, Harvard, Vancouver, ISO, and other styles
20

Pokamestov, D. A., Ya V. Kryukov, R. R. Abenov, et al. "6G communication systems: concept, trends, physical level technologies." Radiotehnika i èlektronika 69, no. 1 (2024): 3–33. http://dx.doi.org/10.31857/s0033849424010016.

Full text
Abstract:
A review and analysis of scientific papers published to date on various aspects of 6G is presented. The emphasis is on physical layer technologies, since they are the ones that largely form the basis and determine the potential of the future system. These include multiple access, multi-user multi-antenna systems, reconfigurable reflective surfaces, and modulation and channel coding techniques. In addition, promising application scenarios, new services and services, predicted requirements, concepts of 6G network architecture, the role of artificial intelligence and machine learning, as well as
APA, Harvard, Vancouver, ISO, and other styles
21

Sun, Jingyu, Zhimin Yi, Ziyi Zhuang, and Shengming Jiang. "Securing Automatic Identification System Communications Using Physical-Layer Key Generation Protocol." Journal of Marine Science and Engineering 13, no. 2 (2025): 386. https://doi.org/10.3390/jmse13020386.

Full text
Abstract:
The automatic identification system (AIS) is an essential tool for modern ships, enabling the broadcast of identification and location information. However, the current AIS standard lacks security features, meaning that messages exchanged via AISs are transmitted in plaintext, which leads to security issues such as privacy leakage. Most existing solutions rely on public key cryptography. This paper proposes a physical-layer key generation protocol based on the current AIS standard (ITU-R M.1371-5). In the case of unicast AIS communication, the protocol utilizes channel randomness to generate s
APA, Harvard, Vancouver, ISO, and other styles
22

Md. Ariful Islam, Md. Tofail Ahmed, Md. Imran Hossain, Md. Humaun Kabir, and Sujit Roy. "Face recognition based physical layer security system for next-generation wireless communication." World Journal of Advanced Research and Reviews 18, no. 3 (2023): 524–32. http://dx.doi.org/10.30574/wjarr.2023.18.3.1099.

Full text
Abstract:
Security system in every sector all over the world is a most demandable and crucial issue to protect the fake user especially in wireless communication system. The most common feature in current wireless communication system is only transmitted users’ information; consequently, it is difficult to identify the actual sender to attain the desired security. Face recognition is one of the most popular security systems in biometric authentication, which can detect intruders to restricted or high-security areas in wireless communication sector, and help in minimizing the face user. In this paper, we
APA, Harvard, Vancouver, ISO, and other styles
23

Md., Ariful Islam, Tofail Ahmed Md., Imran Hossain Md., Humaun Kabir Md., and Roy Sujit. "Face recognition based physical layer security system for next-generation wireless communication." World Journal of Advanced Research and Reviews 18, no. 3 (2023): 524–32. https://doi.org/10.5281/zenodo.8430901.

Full text
Abstract:
Security system in every sector all over the world is a most demandable and crucial issue to protect the fake user especially in wireless communication system. The most common feature in current wireless communication system is only transmitted users’ information; consequently, it is difficult to identify the actual sender to attain the desired security. Face recognition is one of the most popular security systems in biometric authentication, which can detect intruders to restricted or high-security areas in wireless communication sector, and help in minimizing the face user. In this pap
APA, Harvard, Vancouver, ISO, and other styles
24

Qian, Lei, Henghao Xu, Lei Wang, Di Wang, Xin Liu, and Boya Shi. "Physical Layer Security for L-Band Digital Aeronautical Communication System with Interference Mitigation." Electronics 12, no. 22 (2023): 4591. http://dx.doi.org/10.3390/electronics12224591.

Full text
Abstract:
As one of the main candidates for future civil aviation communications systems, the L-band digital aeronautical communication system (L-DACS) is expected to achieve secure and reliable transmission. Due to the broadcasting nature of air–ground wireless links, the L-DACS has the risk of being intercepted by malicious eavesdroppers, which negatively affects aviation communication security. In addition, because the spectrum of the L-DACS overlaps with the aviation distance measuring equipment (DME), the pulse interference caused by the DME signal may lead to the wireless link being more fragile a
APA, Harvard, Vancouver, ISO, and other styles
25

Rasekar, Shriansh, and Dinesh Rojatkar. "Communication Based Train Control System." International Journal of Advance Research and Innovation 5, no. 1 (2017): 97–100. http://dx.doi.org/10.51976/ijari.511716.

Full text
Abstract:
Railway telemetric applications are presently attracting interest and are under intense study. Suitable railway telemetric applications increasingly set to require a subsidiary means to help existent control system make train operation safe and better. Since 2006, train-to-train communication has been studied to respond to such necessity. A main characteristic of train-to-train communication is that operation control to stop possible accidents is conducted among trains without help of a base station. This paper suggests a train-to-train communication in a physical layer depending on multihop a
APA, Harvard, Vancouver, ISO, and other styles
26

Lv, Yan, Hui Hui Wang, and Xue Heng Tao. "Research of the Control Method for the Uniformity of Insulation Layer on Communication Cable." Advanced Materials Research 706-708 (June 2013): 932–36. http://dx.doi.org/10.4028/www.scientific.net/amr.706-708.932.

Full text
Abstract:
The uniformity of thickness of insulation layer on communication cable is an important technique index to guarantee the communication cable has good mechanical and physical properties. Therefore the control method for uniformity of insulation layer on communication cable is desiderated to be researched. In this paper, a control system which took two laser displacement sensors as a detection unit, a CS1G-H PLC of OMRON as a central control unit, two servo drivers and two servo motors of the SMARTSTEP-A series of OMRON as a servo system, a touch screen as a man-machine interface and applied PID
APA, Harvard, Vancouver, ISO, and other styles
27

Rogozhnikov, Evgeniy V., Edgar M. Dmitriev, Danila A. Kondrashov, Yakov V. Kryukov, Artem V. Konovalchikov, and Semyon M. Mukhamadiev. "Application of the 5G NR Physical Layer in Space Communications, Performance Evaluation." Radioelectronics. Nanosystems. Information Technologies. 16, no. 1 (2024): 143–56. http://dx.doi.org/10.17725/j.rensit.2023.16.143.

Full text
Abstract:
The propagation channel is significantly modified in the case of 5th Generation New Radio radio access technology (5G NR) in space communication systems. In particular, large delays occur with respect to the terrestrial propagation channel, and signal attenuation increases, resulting in a lower signal-to-noise ratio (SNR). The Doppler shift of the carrier frequency is also significantly increased due to the high velocity of the spacecraft (SC) relative to the user equipment (UE). The aim of the work is to investigate the decoding capability of the physical channels and signals of the 5G NR sys
APA, Harvard, Vancouver, ISO, and other styles
28

Zeng, Yao, Yuxi Tang, and Luping Xiang. "Physical Layer Security Design for Polar Code Construction." Cryptography 6, no. 3 (2022): 35. http://dx.doi.org/10.3390/cryptography6030035.

Full text
Abstract:
In contrast to the network security that relies on upper-layer encryption for the confidentiality and authenticity of communications, physical layer security (PLS) exploits the uniqueness and randomness of the physical channel to encrypt information and enhance the security of the system. In this paper, we study the PLS of a polar-coded wireless communication system. To be more specific, we leverage the unique properties in polar code construction and propose a channel quality indicator (CQI)-based frozen-bit pattern generation scheme. The transmitter employs the Gaussian approximation algorit
APA, Harvard, Vancouver, ISO, and other styles
29

Guo, Liping, and Jason Kors. "Design of a Laboratory Scale Solar Microgrid Cyber-Physical System for Education." Electronics 10, no. 13 (2021): 1562. http://dx.doi.org/10.3390/electronics10131562.

Full text
Abstract:
Renewable energy sources such as solar and wind provide an effective solution for reducing dependency on conventional power generation and increasing the reliability and quality of power systems. Presented in this paper are design and implementation of a laboratory scale solar microgrid cyber-physical system (CPS) with wireless data monitoring as a teaching tool in the engineering technology curriculum. In the system, the solar panel, battery, charge controller, and loads form the physical layer, while the sensors, communication networks, supervisory control and data acquisition systems (SCADA
APA, Harvard, Vancouver, ISO, and other styles
30

Chen, Jing, Yi Miao Hu, and Le Nan Wu. "Physical Layer Technology for Extremely Low Speed Communication System in the Computer Network." Applied Mechanics and Materials 644-650 (September 2014): 4005–8. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.4005.

Full text
Abstract:
The problem of extremely low speed communication (ELSC) system in the computer network based on multi-position phase shift keying (MPPSK) is considered in this paper. The realization of extremely low speed system is described, and preliminary simulation results of this system are conducted. The BER performance of the MPPSK-based ELSC system is compared with that of MSK modulation, which is commonly used in the ELSC system. Furthermore, the simulation results show that MPPSK-based ELSC system with higher spectrum efficiency has better BER performance than that of MSK modulation, which confirms
APA, Harvard, Vancouver, ISO, and other styles
31

Han, Biao, Sirui Peng, Celimuge Wu, Xiaoyan Wang, and Baosheng Wang. "LoRa-Based Physical Layer Key Generation for Secure V2V/V2I Communications." Sensors 20, no. 3 (2020): 682. http://dx.doi.org/10.3390/s20030682.

Full text
Abstract:
In recent years, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication brings more and more attention from industry (e.g., Google and Uber) and government (e.g., United States Department of Transportation). These Vehicle-to-Everything (V2X) technologies are widely adopted in future autonomous vehicles. However, security issues have not been fully addressed in V2V and V2I systems, especially in key distribution and key management. The physical layer key generation, which exploits wireless channel reciprocity and randomness to generate secure keys, provides a feasible soluti
APA, Harvard, Vancouver, ISO, and other styles
32

Chen, Zhixiong, Tianshu Cao, Pengjiao Wang, and Junhao Feng. "Research on Hybrid Relay Protocol Design and Cross-Layer Performance Based on NOMA." Applied Sciences 14, no. 7 (2024): 3044. http://dx.doi.org/10.3390/app14073044.

Full text
Abstract:
Wireless and power line communication hybrid relay technology can realize complementary advantages and comprehensively improve the communication coverage and performance of power Internet of Things. In order to study the mechanism of the physical layer and Media Access Control (MAC) layer algorithm that affects the performance of hybrid relay systems, the cross-layer performance modeling, optimization, and simulation analysis are carried out for the non-orthogonal multiple access (NOMA) technology. Firstly, a two-hop NOMA media access control protocol is designed based on the CSMA algorithm. C
APA, Harvard, Vancouver, ISO, and other styles
33

Nusenu, Shaddrack Yaw. "Secure Wireless Communications Based On Antenna Array Elements." International Journal of Technology and Management Research 2, no. 2 (2020): 18–24. http://dx.doi.org/10.47127/ijtmr.v2i2.53.

Full text
Abstract:
Configuration of antenna array system to offer directional dependent modulation has the capability of enhancing the security level of data transmission against eavesdroppers’ attacks. In this paper, Frequency diverse array (FDA) antenna for physical–layer security in wireless communications has been proposed. The proposed method provide a range and angle dependent directional modulation scheme using FDA with frequency increments to improve physical-layer security point-to-point communications. It maintains the objective of changing the progressive phase shifts at each symbol transmission. Thus
APA, Harvard, Vancouver, ISO, and other styles
34

González-Plaza, Ana, Rafael Gutiérrez Cantarero, Rafael B. Arancibia Banda, and César Briso Rodríguez. "5G Based on MNOs for Critical Railway Signalling Services: Future Railway Mobile Communication System." Applied Sciences 12, no. 18 (2022): 9003. http://dx.doi.org/10.3390/app12189003.

Full text
Abstract:
This paper describes the prototype and tests carried out to demonstrate the feasibility of implementing 4G/5G systems based on mobile network operators (MNOs) to transmit signalling critical data for railway systems as part of a possible solution for the Future Railway Mobile Communication System (FRMCS). This communication system design is performed from a protocol-stack perspective, introducing the KPIs for the physical layer (RSRP, RSRQ and SINR), network layer (latency and jitter) and application layer (signalling communication timeout). The analysis focuses on the characterisation of sign
APA, Harvard, Vancouver, ISO, and other styles
35

Mohammed, Saifuldeen A. "Securing Physical Layer for FHSS Communication System Using Code andPhase Hopping Techniques in CDMA, System Design and Implementation." Journal of Engineering 26, no. 7 (2020): 190–205. http://dx.doi.org/10.31026/j.eng.2020.07.13.

Full text
Abstract:
The Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of t
APA, Harvard, Vancouver, ISO, and other styles
36

Liu, Xiao Wu, Zhong He Gao, and Ji Guo Yu. "A Novel Cyber Physical Systems Model." Applied Mechanics and Materials 44-47 (December 2010): 4058–62. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.4058.

Full text
Abstract:
Cyber Physical Systems (CPS) is a new science to joint physical and computation together and it can be used in information technology, industry process control and other fields. But its model remains a new research field that needs to be explored. In this paper, we put forward a novel CPS model based on Cognitive Network (CN) and accomplished the combination of CPS and CN. The model was composed of four layers included physical layer, network layer, user layer and cross layer. We discussed every layer in our model in which the functions such as control, communication and so on were described.
APA, Harvard, Vancouver, ISO, and other styles
37

Ramos, Andrea, Saúl Inca, Mireia Ferrer, Daniel Calabuig, Sandra Roger, and Jose F. Monserrat. "Simulation Framework for Detection and Localization in Integrated Sensing and Communication Systems." Telecom 6, no. 1 (2025): 4. https://doi.org/10.3390/telecom6010004.

Full text
Abstract:
Integrated Sensing and Communication (ISAC) systems have emerged as a key component for Sixth Generation (6G) networks, enhancing resource efficiency and enabling diverse applications. Currently, ISAC systems have been recognized as a leading trend for future standardization, i.e., International Mobile Telecommunications (IMT)-2030. As in the previous IMT-2020 standardization, the emphasis has been on developing a methodology for assessing network conditions, with one of the crucial approaches incorporating system-level simulations. However, within this framework, there has been a notable abse
APA, Harvard, Vancouver, ISO, and other styles
38

Shin, Soo Young, and Isnan Arif Wicaksono. "Physical Layer Intrusion Detection System Based on Channel Prediction for Wireless Networks." Applied Mechanics and Materials 556-562 (May 2014): 2711–14. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.2711.

Full text
Abstract:
Wireless Networks suffer from many constraints including wireless communication channel, internal and external attacks, security becomes the main concern to deal with such kind of networks. Therefore, an intrusion detection system (IDS) is required that monitors the network, detects misbehavior or anomalies and notifies other nodes in the network to avoid or punish the misbehaving nodes. This paper describes the simple method to detect the intruder in wireless communication system based on physical layer characteristics. Channel prediction method is used in receiver part to predict the transmi
APA, Harvard, Vancouver, ISO, and other styles
39

Tin, Phu Tran, Tan N. Nguyen, Van-Duc Phan, and Minh Tran. "Physical layer security in DF full-duplex relaying network: performance analysis." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (2021): 865–73. https://doi.org/10.11591/ijeecs.v21.i2.pp865-873.

Full text
Abstract:
In this letter, the system performance of the DF full-duplex (FD) relaying communication network is investigated with physical layer security (PLS). In this system model, the source (S) and the destination (D) communicate via a helping relay (R) in the presence of the eavesdropper (E). From the system model, we derive the closed-form expressions for intercept probability (IP) and secrecy outage probability (SOP). For verifying the correctness of the analytical analysis, the Monte Carlo simulation is conducted. In addition, the influence of the main system parameter on the system performance is
APA, Harvard, Vancouver, ISO, and other styles
40

Su, Yishan, Guangyao Han, Xiaomei Fu, Naishen Xu, and Zhigang Jin. "The Physical Layer Security Experiments of Cooperative Communication System with Different Relay Behaviors." Sensors 17, no. 4 (2017): 781. http://dx.doi.org/10.3390/s17040781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Du, Ruizhong, and Lin Zhen. "Multiuser physical layer security mechanism in the wireless communication system of the IIOT." Computers & Security 113 (February 2022): 102559. http://dx.doi.org/10.1016/j.cose.2021.102559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Qing Chang, Xin Liu, and Yaoli Wang. "Implementation of Physical Layer Communication Protocol for Cloud Storage System Based on FPGA." Journal of Convergence Information Technology 8, no. 11 (2013): 303–9. http://dx.doi.org/10.4156/jcit.vol8.issue11.34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Yang, Guangyu, Hongbing Qiu, and P. Christakos. "Security performance analysis of physical layer transmission link for millimeter wave communication system." Journal of Intelligent & Fuzzy Systems 35, no. 4 (2018): 4049–58. http://dx.doi.org/10.3233/jifs-169727.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Zhong, Ruijing, Jianhua Ji, Zhenhong Wang, Ke Wang, and Yufeng Song. "Physical layer security of FSO communication system based on G-G correlation channel." Optoelectronics Letters 20, no. 11 (2024): 658–62. http://dx.doi.org/10.1007/s11801-024-4016-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Huang, Binhong, Hao Chen, Cheng Guo, Xiaodong Xu, Nan Ma, and Ping Zhang. "Semantic Communication on Digital Wireless Communication Systems." Electronics 14, no. 5 (2025): 956. https://doi.org/10.3390/electronics14050956.

Full text
Abstract:
Semantic communication is an effective technological approach for the integration of intelligence and communication, enabling more efficient and context-aware data transmission. In this paper, we propose a bit-conversion-based semantic communication transmission framework to ensure compatibility with existing wireless systems. Specifically, a series of physical layer processing modules in end-to-end transmission are designed. Additionally, we develop a semantic communication simulator to implement and evaluate this framework. To optimize the performance of this framework, we introduce a novel
APA, Harvard, Vancouver, ISO, and other styles
46

Yılmaz, Mustafa Harun, Ertuğrul Güvenkaya, Haji M. Furqan, Selçuk Köse, and Hüseyin Arslan. "Cognitive Security of Wireless Communication Systems in the Physical Layer." Wireless Communications and Mobile Computing 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/3592792.

Full text
Abstract:
While the wireless communication systems provide the means of connectivity nearly everywhere and all the time, communication security requires more attention. Even though current efforts provide solutions to specific problems under given circumstances, these methods are neither adaptive nor flexible enough to provide security under the dynamic conditions which make the security breaches an important concern. In this paper, a cognitive security (CS) concept for wireless communication systems in the physical layer is proposed with the aim of providing a comprehensive solution to wireless securit
APA, Harvard, Vancouver, ISO, and other styles
47

Choi, Junsung, Dongryul Park, Suil Kim, and Seungyoung Ahn. "Implementation of a Noise-Shaped Signaling System through Software-Defined Radio." Applied Sciences 12, no. 2 (2022): 641. http://dx.doi.org/10.3390/app12020641.

Full text
Abstract:
Along with the development of electromagnetic weapons, Electronic Warfare (EW) has been rising as the future form of war. Especially in the area of wireless communications, high security defense systems such as Low Probability of Detection (LPD), Low Probability of Interception (LPI), and Low Probability of Exploitation (LPE) communication algorithms are being studied to prevent military force loss. One LPD, LPI, and LPE communication algorithm, physical-layer security, has been discussed and studied. We propose a noise signaling system, a type of physical-layer security, which modifies conven
APA, Harvard, Vancouver, ISO, and other styles
48

Zhang, Yu, Shuangrui Zhao, Ji He, Yuanyu Zhang, Yulong Shen, and Xiaohong Jiang. "A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security." IET Information Security 2023 (October 26, 2023): 1–15. http://dx.doi.org/10.1049/2023/5604802.

Full text
Abstract:
Satellite internet serves as an indispensable component of the upcoming sixth-generation networks for providing global broadband internet access service. Due to the open nature of satellite-ground communication, security issue in satellite internet has always been an important concern for both industry and academia. Although many researchers focus on secure communications in satellite internet, the literature is surprisingly sparse, with no comprehensive overview of the state-of-the-art security techniques. This paper provides an in-depth survey of secure communications for various satellite i
APA, Harvard, Vancouver, ISO, and other styles
49

Shi, Yun Xu. "Software Design of Restaurant Service Mobile Robot’s Control System." Advanced Materials Research 462 (February 2012): 743–47. http://dx.doi.org/10.4028/www.scientific.net/amr.462.743.

Full text
Abstract:
The modular design of restaurant service autonomous mobile robot control system has been done, and the system adopted distributed control, the control system of the host (such as computer module) through the unity of the bus and protocols for coordination of each module. The control system distributed in the three modules of the power and driver module (including power management unit, motion control unit, and drive unit), the sensor module (various sensors, etc.), and control computer modules. Then, using VC++ 6.0 developed the software of the control system, and the software is divided into
APA, Harvard, Vancouver, ISO, and other styles
50

Wang, Hao, Junjie Jiang, Gaojian Huang, et al. "Physical Layer Security of Two-Way Ambient Backscatter Communication Systems." Wireless Communications and Mobile Computing 2022 (March 29, 2022): 1–10. http://dx.doi.org/10.1155/2022/5445676.

Full text
Abstract:
Achieving high network traffic demand in limited spectrum resources is a technical challenge for the beyond 5G and 6G communication systems. To this end, ambient backscatter communication (AmBC) is proposed for Internet-of-Things (IoT), because the backscatter device (BD) can realize communication without occupying extra spectrum resources. Moreover, the spectral efficiency can be further improved by using two-way (TW) communication. However, secure communication is a great challenge for accessing massive IoT devices due to the broadcasting nature of wireless propagation environments. In light
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!