Academic literature on the topic 'Physical-layer security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Physical-layer security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Physical-layer security"

1

Poor, H. Vincent, and Rafael F. Schaefer. "Wireless physical layer security." Proceedings of the National Academy of Sciences 114, no. 1 (December 27, 2016): 19–26. http://dx.doi.org/10.1073/pnas.1618130114.

Full text
Abstract:
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.
APA, Harvard, Vancouver, ISO, and other styles
2

Mucchi, Lorenzo, Sara Jayousi, Stefano Caputo, Erdal Panayirci, Shahriar Shahabuddin, Jonathan Bechtold, Ivan Morales, Razvan-Andrei Stoica, Giuseppe Abreu, and Harald Haas. "Physical-Layer Security in 6G Networks." IEEE Open Journal of the Communications Society 2 (2021): 1901–14. http://dx.doi.org/10.1109/ojcoms.2021.3103735.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pfeiffer, Johannes, and Robert F. H. Fischer. "Multilevel Coding for Physical-Layer Security." IEEE Transactions on Communications 70, no. 3 (March 2022): 1999–2009. http://dx.doi.org/10.1109/tcomm.2022.3145578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bloch, Matthieu, Merouane Debbah, Yingbin Liang, Yasutada Oohama, and Andrew Thangaraj. "Special issue on physical-layer security." Journal of Communications and Networks 14, no. 4 (August 2012): 349–51. http://dx.doi.org/10.1109/jcn.2012.6292260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Huo, Yan, Yuqi Tian, Liran Ma, Xiuzhen Cheng, and Tao Jing. "Jamming Strategies for Physical Layer Security." IEEE Wireless Communications 25, no. 1 (February 2018): 148–53. http://dx.doi.org/10.1109/mwc.2017.1700015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Humble, Travis. "Quantum security for the physical layer." IEEE Communications Magazine 51, no. 8 (August 2013): 56–62. http://dx.doi.org/10.1109/mcom.2013.6576339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Trappe, Wade. "The challenges facing physical layer security." IEEE Communications Magazine 53, no. 6 (June 2015): 16–20. http://dx.doi.org/10.1109/mcom.2015.7120011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Saad, Walid, Xiangyun Zhou, Mérouane Debbah, and H. Vincent Poor. "Wireless physical layer security [Guest Editorial]." IEEE Communications Magazine 53, no. 12 (December 2015): 18. http://dx.doi.org/10.1109/mcom.2015.7355560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kuljanski-Marić, Sonja. "LDPC codes for physical layer security." Vojnotehnicki glasnik 66, no. 4 (2018): 900–919. http://dx.doi.org/10.5937/vojtehg66-14776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Efstathiou, Dimitrios. "A collaborative physical layer security scheme." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (June 1, 2019): 1924. http://dx.doi.org/10.11591/ijece.v9i3.pp1924-1934.

Full text
Abstract:
<p>High level of security is essential in wireless 5G communications. The last few years there has been an increase in research interest in the potential of the radio channel’s physical properties to provide communications security. These research efforts investigate fading, interference, and path diversity to develop security techniques for implementation in 5G New Radio (NR). In this paper, we propose a collaborative scheme to existing physical layer security schemes, taking advantage of the characteristics of the OFDM technique. An OFDM symbol includes the pilot subcarriers, typically essential for the pilot channel estimation process performed at the legitimate receiver. In this work we propose the positions of the subcarriers to change on every OFDM symbol following a probability distribution known only to the legitimate transmitter and legitimate receiver. An eavesdropper, does not have access to the information of the pilot subcarriers positions so, it performs blind channel estimation. The theoretical analysis is based on the information theoretic problem formulation and is confirmed by simulations. The performance metrics used are the secrecy capacity and the outage probability. The proposed scheme is very simple and robust, strengthening security in multimedia applications.</p>
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Physical-layer security"

1

Bloch, Matthieu. "Physical-layer security." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24658.

Full text
Abstract:
Thesis (Ph.D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2008.
Committee Chair: McLaughlin, Steven; Committee Member: Barros, Joao; Committee Member: Bellissard, Jean; Committee Member: Fekri, Faramarz; Committee Member: Lanterman, Aaron
APA, Harvard, Vancouver, ISO, and other styles
2

Zhu, Jun. "Physical layer security in massive MIMO systems." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/58281.

Full text
Abstract:
Massive multiple-input multiple-output (MIMO) is one of the key technologies for the emerging fifth generation (5G) wireless networks, and has the potential to tremendously improve spectral and energy efficiency with low-cost implementations. While massive MIMO systems have drawn great attention from both academia and industry, few efforts have been made on how the richness of the spatial dimensions offered by massive MIMO affects wireless security. As security is crucial in all wireless systems due to the broadcast nature of the wireless medium, in this thesis, we study how massive MIMO technology can be used to guarantee communication security in the presence of a passive multi-antenna eavesdropper. Our proposed massive MIMO system model incorporates relevant design choices and constraints such as time-division duplex (TDD), uplink training, pilot contamination, low-complexity signal processing, and low-cost hardware components. The thesis consists of three main parts. We first consider physical layer security for a massive MIMO system employing simple artificial noise (AN)-aided matched-filter (MF) precoding at the base station (BS). For both cases of perfect training and pilot contamination, we derive a tight analytical lower bound for the achievable ergodic secrecy rate, and an upper bound for the secrecy outage probability. Both bounds are expressed in closed form, providing an explicit relationship between all system parameters, offering significant insights for system design. We then generalize the work by comparing different types of linear data and AN precoders in a secure massive MIMO network. The system performance, in terms of the achievable ergodic secrecy rate is obtained in closed form. In addition, we propose a novel low-complexity data and AN precoding strategy based on a matrix polynomial expansion. Finally, we consider a more realistic system model by taking into account non-ideal hardware components. Based on a general hardware impairment model, we derive a lower bound for the ergodic secrecy rate achieved by each user when AN-aided MF precoding is employed at the BS. By exploiting the derived analytical bound, we investigate the impact of various system parameters on the secrecy rate and optimize both the uplink training pilots and AN precoder to maximize the secrecy rate.
Applied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
3

Alotaibi, Esa. "Physical layer security in cooperative wireless communications." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-security-in-cooperative-wireless-communications(6a0c261e-c4c4-4796-a08b-95d015d7528a).html.

Full text
Abstract:
Due to the open nature of the medium, wireless communications systems are highly vulnerable to security attacks. In recent years, security within the physical layer has gained attention, since the underlying techniques can add to those found in traditional cryptographic approaches. In this thesis, new mathematical models were developed for the analysis of secrecy capacity and outage probability in different scenarios, following which new optimisation problems were formulated and new algorithms devised to solve those problems. The process began by analysing secrecy performance for various cooperative communication scenarios in the presence of single and multiple eavesdropper(s). A multicast cooperative system was also analysed, based on distributed Alamouti space-time coding. Furthermore, the secrecy performance of a relay selection scheme was analysed in an independent but non-identically distributed (i.n.i.d) Rayleigh fading scenario. The second part of the thesis concentrated on optimisation methods for cooperative relaying and jamming techniques. For a dual-hop system, a joint cooperative beamforming and jamming scheme was created, considering both a perfect and an imperfect eavesdropper's channel state information (CSI). Optimal solutions to degrade the eavesdropper's interception by minimising its received signal to interference and noise ratio (SINR) were also presented whilst ensuring the legitimate receiver's SINR requirement. For the multi-hop scenario, the secrecy rate, with and without transmitting artificial noise, was considered for maximisation, and an optimal power splitting solution under limited power constraints at the transmitters was also proposed. In addition, an iterative solution for the joint optimisation of transmit power and power splitting coefficient at each transmitter was posited. The analyses and optimisation algorithms developed provide new insights into secrecy performance and optimal transmission schemes in various practical scenarios.
APA, Harvard, Vancouver, ISO, and other styles
4

Chu, Zheng. "Transmit optimization techniques for physical layer security." Thesis, University of Newcastle upon Tyne, 2016. http://hdl.handle.net/10443/3377.

Full text
Abstract:
Over the last several decades, reliable communication has received considerable attention in the area of dynamic network con gurations and distributed processing techniques. Traditional secure communications mainly considered transmission cryptography, which has been developed in the network layer. However, the nature of wireless transmission introduces various challenges of key distribution and management in establishing secure communication links. Physical layer security has been recently recognized as a promising new design paradigm to provide security in wireless networks in addition to existing conventional cryptographic methods, where the physical layer dynamics of fading channels are exploited to establish secure wireless links. On the other hand, with the ever-increasing demand of wireless access users, multi-antenna transmission has been considered as one of e ective approaches to improve the capacity of wireless networks. Multi-antenna transmission applied in physical layer security has extracted more and more attentions by exploiting additional degrees of freedom and diversity gains. In this thesis, di erent multi-antenna transmit optimization techniques are developed for physical layer secure transmission. The secrecy rate optimization problems (i.e., power minimization and secrecy rate maximization) are formulated to guarantee the optimal power allocation. First, transmit optimization for multiple-input single-output (MISO) secrecy channels are developed to design secure transmit beamformer that minimize the transmit power to achieve a target secrecy rate. Besides, the associated robust scheme with the secrecy rate outage probability constraint are presented with statistical channel uncertainty, where the outage probability constraint requires that the achieved secrecy rate exceeds certain thresholds with a speci c probability. Second, multiantenna cooperative jammer (CJ) is presented to provide jamming services that introduces extra interference to assist a multiple-input multipleoutput (MIMO) secure transmission. Transmit optimization for this CJaided MIMO secrecy channel is designed to achieve an optimal power allocation. Moreover, secure transmission is achieved when the CJ introduces charges for its jamming service based on the amount of the interference caused to the eavesdropper, where the Stackelberg game is proposed to handle, and the Stackelberg equilibrium is analytically derived. Finally, transmit optimization for MISO secure simultaneous wireless information and power transfer (SWIPT) is investigated, where secure transmit beamformer is designed with/without the help of arti - cial noise (AN) to maximize the achieved secrecy rate such that satisfy the transmit power budget and the energy harvesting (EH) constraint. The performance of all proposed schemes are validated by MATLAB simulation results.
APA, Harvard, Vancouver, ISO, and other styles
5

Jo, Youngho. "Physical layer techniques for wireless communication security." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0041108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mostafa, Ayman. "Physical-layer security for visible-light communication systems." Thesis, University of British Columbia, 2017. http://hdl.handle.net/2429/61328.

Full text
Abstract:
Visible-light communication (VLC) is an enabling technology that exploits the lighting infrastructure to provide ubiquitous indoor broadband coverage via high-speed short-range wireless communication links. On the other hand, physical-layer security has the potential to supplement conventional encryption methods with an additional secrecy measure that is provably unbreakable regardless of the computational power of the eavesdropper. The lack of wave-guiding transmission media in VLC channels makes the communication link inherently susceptible to eavesdropping by unauthorized users existing in areas illuminated by the data transmitters. In this thesis, we study transmission techniques that enhance the secrecy of VLC links within the framework of physical-layer security. Due to linearity limitations of typical light-emitting diodes (LEDs), the VLC channel is more accurately modelled with amplitude constraints on the channel input, rather than the conventional average power constraint. Such amplitude constraints render the prevalent Gaussian input distribution infeasible for VLC channels, making it difficult to obtain closed-form secrecy capacity expressions. Thus, we begin with deriving lower bounds on the secrecy capacity of the Gaussian wiretap channel subject to amplitude constraints. We then consider the design of optimal beamformers for secrecy rate maximization in the multiple-input single-output (MISO) wiretap channel under amplitude constraints. We show that the design problem is nonconvex and difficult to solve, however it can be recast as a solvable quasiconvex line search problem. We also consider the design of robust beamformers for worst-case secrecy rate maximization when channel uncertainty is taken into account. Finally, we study the design of linear precoders for the two-user MISO broadcast channel with confidential messages. We consider not only amplitude constraints, but also total and per-antenna average power constraints. We formulate the design problem as a nonconvex weighted secrecy sum rate maximization problem, and provide an efficient search algorithm to obtain a solution for such a nonconvex problem. We extend our approach to handle uncertainty in channel information. The design techniques developed throughout the thesis provide valuable tools for tackling real-world problems in which channel uncertainty is almost always inevitable and amplitude constraints are often necessary to accurately model hardware limitations.
Applied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
7

Al-Talabani, Ali Mohammed Noori Hasan. "Enhancing physical layer security in cognitive radio networks." Thesis, King's College London (University of London), 2016. https://kclpure.kcl.ac.uk/portal/en/theses/enhancing-physical-layer-security-in-cognitive-radio-networks(d9036158-5310-4292-b93d-f542354269a7).html.

Full text
Abstract:
A cognitive radio is an intelligent wireless communication system that improves spectrum utilisation by allowing secondary users to use the idle radio spectrum from primary licensed networks or to share the spectrum with primary users. Due to several significant challenges for cryptographic approaches of upper layers in protocol stacks | for example, private key management complexity and key transmission security issues | physical layer (PHY) security has drawn significant attention as an alternative for cryptographic approaches at the upper layers of the protocol stack. Security threats may arise from passive eavesdropping node(s), which try to intercept communications between authenticated nodes. Most recent studies consider information theoretic secrecy to be a promising approach. The idea of information theoretic secrecy lies in exploiting the randomness of communication channels to ensure the secrecy of the transmitted messages. Due to the constraints imposed on cognitive radio networks by secondary networks, allocating their resources in an optimal way is a key to maximising their achievable secrecy rates. Therefore, in this thesis, optimal resource allocation and secrecy rate maximisation of cognitive radio networks (CRNs) are proposed. Cooperative jamming is proposed to enhance the primary secrecy rate, and a new chaos-based cost function is introduced in order to design a power control algorithm and analyse the dynamic spectrum-sharing issue in the uplink of cellular CRNs. For secondary users as the game players in underlay scenarios, utility/cost functions are defined, taking into account the interference from and interference tolerance of the primary users. The existence of the Nash equilibrium is proved in this power control game, which leads to significantly lower power consumption and a relatively fast convergence rate when compared to existing game algorithms. The simulation results indicate that the primary secrecy rate is significantly improved by cooperative jamming, and the proposed power control algorithm achieves low power consumption. In addition, an integrated scheme with chaotic scrambling (CS), chaotic artificial noise, and a chaotic shift keying (CSK) scheme are proposed in an orthogonal frequency division multiplexing (OFDM)-based CR system to enhance its physical layer security. By employing the chaos-based third-order Chebyshev map to achieve the optimum bit error rate (BER) performance of CSK modulation, the proposed three-layer integrated scheme outperforms the traditional OFDM system in an overlay scenario with a Rayleigh fading channel. Importantly, under three layers of encryption that are based on chaotic scrambling, chaotic artificial noise, and CSK modulation, a large key size can be generated to resist brute-force attacks and eavesdropping, leading to a significantly improved security rate. Furthermore, a game theory-based cooperation scheme is investigated to enhance physical layer (PHY) security in both the primary and secondary transmissions of a cognitive radio network (CRN). In CRNs, the primary network may decide to lease its own spectrum for a fraction of time to the secondary nodes in exchange for appropriate remuneration. The secondary transmitter (ST) is considered to be a trusted relay for primary transmission in the presence of the ED. The ST forwards a message from the primary transmitter (PT) in a decode-and-forward (DF) fashion and, at the same time, allows part of its available power to be used to transmit an artificial noise (i.e., jamming signal) to enhance secrecy rates. In order to allocate power between the message and jamming signals, the optimisation problem is formulated and solved for maximising the primary secrecy rate (PSR) and secondary secrecy rate (SSR) with malicious attempts from a single eavesdropper or multiple eavesdroppers. Cooperation between the primary and secondary transmitters is also analysed from a game-theoretic perspective, and their interaction modelled as a Stackelberg game. This study proves theoretically and computes the Stackelberg equilibrium. Numerical examples are provided to illustrate the impact of the Stackelberg game-based optimisation on the achievable PSR and SSR. The numerical results indicate that spectrum leasing, based on trading secondary access for cooperation by means of relay and a jammer, is a promising framework for enhancing primary and secondary secrecy rates in cognitive radio networks when the ED can intercept both the primary and secondary transmission. Finally, this thesis focuses on physical-layer security in cognitive radio networks where multiple secondary nodes assist multiple primary nodes in combating unwanted eavesdropping from malicious eavesdroppers. Two scenarios are considered: a single eavesdropper (scenario I) and multiple eavesdroppers (scenario II). The secondary users act as a relay and jammer in scenario I, whereas they act only as a jammer in scenario II. Furthermore, the multiple eavesdroppers are distributed according to a homogenous Poison Point Process (PPP) in scenario II. Closed forms are derived for the outage probability and mean secrecy rate for both the primary and secondary transmissions. Furthermore, the scalability and convergence of the matching theory are proved. Both the analytical and numerical results show that the proposed matching model is a promising approach for exploiting the utility functions of both primary and secondary users.
APA, Harvard, Vancouver, ISO, and other styles
8

Pierrot, Alexandre Jean Louis J. "Coding techniques for multi-user physical layer security." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53836.

Full text
Abstract:
The fast development of wireless networks, which are intrinsically exposed to eavesdropping, has created a growing concern for confidentiality. While classical cryptographic schemes require a key provided by the end-user, physical-layer security leverages the randomness of the physical communication medium as a source of secrecy. The main benefit of physical-layer security techniques is their relatively low cost and their ability to combine with any existing security mechanisms. This dissertation provides an analysis including the theoretical study of the two-way wiretap channel to obtain a better insight into how to design coding mechanisms, practical tests with experimental systems, and the design of actual codes. From a theoretical standpoint, the study confirms the benefits of combining several multi-user coding techniques including cooperative jamming, coded cooperative jamming and secret key generation. For these different mechanisms, the trade-off between reliability, secrecy and communication rate is clarified under a stringent strong secrecy metric. Regarding the design of practical codes, spatially coupled LDPC codes, which were originally designed for reliability, are modified to develop a coded cooperative jamming code. Finally, a proof-of-principle practical wireless system is provided to show how to implement a secret key generation system on experimental programmable radios. This testbed is then used to assess the realistic performance of such systems in terms of reliability, secrecy and rate.
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Ting. "Wireless Network Physical Layer Security with Smart Antenna." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/23243.

Full text
Abstract:
Smart antenna technique has emerged as one of the leading technologies for enhancing the quality of service in wireless networks. Because of its ability to concentrate transmit power in desired directions, it has been widely adopted by academia and industry to achieve better coverage, improved capacity and spectrum efficiency of wireless communication systems. In spite of its popularity in applications of performance enhancement, the smart antenna\'s capability of improving wireless network security is relatively less explored. This dissertation focuses on exploiting the smart antenna technology to develop physical layer solutions to anti-eavesdropping and location security problems.

We first investigate the problem of enhancing wireless communication privacy. A novel scheme named "artificial fading" is proposed, which leverages the beam switching capability of smart antennas to prevent eavesdropping attacks. We introduce the optimization strategy to design a pair of switched beam patterns that both have high directional gain to the intended receiver. Meanwhile, in all the other directions, the overlap between these two patterns is minimized. The transmitter switches between the two patterns at a high frequency. In this way, the signal to unintended directions experiences severe fading and the eavesdropper cannot decode it. We use simulation experiments to show that the artificial fading outperforms single pattern beamforming in reducing the unnecessary coverage area of the wireless transmitter.

We then study the impact of beamforming technique on wireless localization systems from the perspectives of both location privacy protection and location spoofing attack.

For the location privacy preservation scheme, we assume that the adversary uses received signal strength (RSS) based localization systems to localize network users in Wireless LAN (WLAN). The purpose of the scheme is to make the adversary unable to uniquely localize the user when possible, and otherwise, maximize error of the adversary\'s localization results. To this end, we design a two-step scheme to optimize the beamforming pattern of the wireless user\'s smart antenna. First, the user moves around to estimate the locations of surrounding access points (APs). Then based on the locations of the APs, pattern synthesis is optimized to minimize the number of APs in the coverage area and degenerate the localization precision. Simulation results show that our scheme can significantly lower the chance of being localized by adversaries and also degrade the location estimation precision to as low as the coverage range of the AP that the wireless user is connected to.

As personal privacy preservation and security assurance at the system level are always conflictive to some extent, the capability of smart antenna to intentionally bias the RSS measurements of the localization system also potentially enables location spoofing attacks. From this aspect, we present theoretical analysis on the feasibility of beamforming-based perfect location spoofing (PLS) attacks, where the attacker spoofs to a target fake location by carefully choosing the beamforming pattern to fool the location system. The PLS problem is formulated as a nonlinear feasibility problem, and due to its intractable nature, we solve it using semidefinite relaxation (SDR) in conjunction with a heuristic local search algorithm. Simulation results show the effectiveness of our analytical approach and indicate the correlation between the geometry of anchor deployment and the feasibility of PLS attacks. Based on the simulation results, guidelines for guard against PLS attacks are provided.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
10

Polisetti, Mounika. "Physical Layer Security With Active Jamming Using NOMA." Thesis, Blekinge Tekniska Högskola, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21259.

Full text
Abstract:
This paper is persuaded to understand the physical layer security in wireless commu-nications utilizing NOMA (Non Orthogonal Multiple Access) concepts in the presence of an eavesdropper. Physical layer security maintains the confidentiality and secrecyof the system against eavesdroppers. We use the power domain in this paper, where NOMA allows many users to share resources side by side. Power allocation concern-ing channel condition is taken into consideration where user whose channel condition is weak is allocated with eminent power to directly decode the signal, whereas theuser with better channel condition applies successive interference cancellation (SIC)to decode the signal. Here, the base station communicates with the users and sends data signals while the eavesdropper secretly eavesdrops on the confidential informa-tion simultaneously. In this thesis, to improve the physical layer security, jamming method was usedwhere users are assumed to be in full duplex, send jamming signals to degrade the performance of the eavesdropper. Analytic expressions of CDF, PDF, outage proba-bility and secrecy capacity are obtained from analyzing the NOMA jamming scheme. The numerical results are evaluated with the simulations results and analysed theeffect of jamming on improving the performance of the NOMA system in presenceof an eavesdropper.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Physical-layer security"

1

Le, Khoa N., ed. Physical Layer Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bloch, Matthieu. Physical-layer security: From information theory to security engineering. Cambridge: Cambridge University Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Djordjevic, Ivan B. Physical-Layer Security and Quantum Key Distribution. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27565-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Li. Physical Layer Security in Wireless Cooperative Networks. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-61863-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zou, Yulong, and Jia Zhu. Physical-Layer Security for Cooperative Relay Networks. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31174-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Hui-Ming, and Tong-Xing Zheng. Physical Layer Security in Random Cellular Networks. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-1575-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shu, Feng, and Jiangzhou Wang. Intelligent Reflecting Surface-Aided Physical-Layer Security. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-41812-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stübing, Hagen. Multilayered Security and Privacy Protection in Car-to-X Networks: Solutions from Application down to Physical Layer. Wiesbaden: Springer Fachmedien Wiesbaden, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Institute Of Electrical and Electronics Engineers. IEEE standards for local and metropolitan area networks: Supplement to token-passing bus access methods and physical layer specifications -- enhancements for physical layer diversity (redundant media control unit). New York, NY: Institute of Electrical and Electronics Engineers, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Institute Of Electrical and Electronics Engineers. IEEE standards for local and metropolitan area networks: Supplements to distributed queue dual bus (DQDB) access method and physical layer specifications : physical layer convergence procedure (PLCP) for DS1-based systems (Clause 12) and isochronous service on a distributed queue dual bus (DQDB) subnetwork of a metropolitan area network (MAN). New York: Institute of Electrical and Electronics Engineers, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Physical-layer security"

1

Soderi, Simone, Lorenzo Mucchi, Matti Hämäläinen, Alessandro Piva, and Jari Iinatti. "Physical Layer Security." In A Comprehensive Guide to 5G Security, 117–41. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119293071.ch6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Djordjevic, Ivan B. "Physical-Layer Security." In Physical-Layer Security and Quantum Key Distribution, 93–161. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27565-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Le, Khoa N. "Conclusions." In Physical Layer Security, 181. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shakiba-Herfeh, Mahdi, Arsenia Chorti, and H. Vincent Poor. "Physical Layer Security: Authentication, Integrity, and Confidentiality." In Physical Layer Security, 129–50. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hu, Jinsong, Shihao Yan, Feng Shu, and Derrick Wing Kwan Ng. "Secure Transmission with Directional Modulation Based on Random Frequency Diverse Arrays." In Physical Layer Security, 29–50. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vybornyi, Ivan, Abderrahmen Trichili, and Mohamed-Slim Alouini. "Backflash Light as a Security Vulnerability in Quantum Key Distribution Systems." In Physical Layer Security, 83–97. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zheng, Tong-Xing, and Jinhong Yuan. "Physical Layer Security in Cache-Enabled Heterogeneous Cellular Networks." In Physical Layer Security, 51–82. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Javali, Chitra, Girish Revadigar, Lavy Libman, Ming Ding, Zihuai Lin, and Sanjay Jha. "Secure Device Pairing Protocol Based on Wireless Channel Characteristics for Body Area Networks." In Physical Layer Security, 151–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Javali, Chitra, Girish Revadigar, Ming Ding, Zihuai Lin, and Sanjay Jha. "Cooperative Physical Layer Secret Key Generation by Virtual Link Estimation." In Physical Layer Security, 99–128. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bankey, Vinay, Prabhat K. Upadhyay, and Daniel Benevides da Costa. "Physical Layer Security in Hybrid Satellite-Terrestrial Relay Networks." In Physical Layer Security, 1–28. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Physical-layer security"

1

Debbah, Merouane. "Wireless physical layer security." In 2009 International Conference on Advanced Technologies for Communications (ATC). IEEE, 2009. http://dx.doi.org/10.1109/atc.2009.5349415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Toliver, Paul. "Optical physical layer security." In 2011 IEEE Photonics Conference (IPC). IEEE, 2011. http://dx.doi.org/10.1109/pho.2011.6110414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Klinc, Demijan, Jeongseok Ha, Steven W. McLaughlin, Joao Barros, and Byung-Jae Kwak. "LDPC for Physical Layer Security." In GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. IEEE, 2009. http://dx.doi.org/10.1109/glocom.2009.5426065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Session MP1b: Physical layer security." In 2015 49th Asilomar Conference on Signals, Systems and Computers. IEEE, 2015. http://dx.doi.org/10.1109/acssc.2015.7421188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Session WA2a: Physical layer security." In 2016 50th Asilomar Conference on Signals, Systems and Computers. IEEE, 2016. http://dx.doi.org/10.1109/acssc.2016.7869663.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ankarali, Z. Esat, M. Harun Yilmaz, Mohammed Hafez, and Huseyin Arslan. "Channel independent physical layer security." In 2016 IEEE 17th Annual Wireless and Microwave Technology Conference (WAMICON). IEEE, 2016. http://dx.doi.org/10.1109/wamicon.2016.7483858.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Efstathiou, Dimitrios. "IoT Physical Layer Security Enhancement." In 2018 Global Information Infrastructure and Networking Symposium (GIIS). IEEE, 2018. http://dx.doi.org/10.1109/giis.2018.8635755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sekhar, P. Chandra, and T. S. N. Murthy. "Physical Layer Security using SMO." In 2022 International Conference on Computing, Communication and Power Technology (IC3P). IEEE, 2022. http://dx.doi.org/10.1109/ic3p52835.2022.00028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Graur, Oana, Nazia Islam, and Werner Henkel. "Quantization for Physical Layer Security." In 2016 IEEE Globecom Workshops (GC Wkshps). IEEE, 2016. http://dx.doi.org/10.1109/glocomw.2016.7849013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pan, Fei, Yixin Jiang, Hong Wen, Runfa Liao, and Aidong Xu. "Physical Layer Security Assisted 5G Network Security." In 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall). IEEE, 2017. http://dx.doi.org/10.1109/vtcfall.2017.8288343.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography