Academic literature on the topic 'Physical-layer security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Physical-layer security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Physical-layer security"
Poor, H. Vincent, and Rafael F. Schaefer. "Wireless physical layer security." Proceedings of the National Academy of Sciences 114, no. 1 (December 27, 2016): 19–26. http://dx.doi.org/10.1073/pnas.1618130114.
Full textMucchi, Lorenzo, Sara Jayousi, Stefano Caputo, Erdal Panayirci, Shahriar Shahabuddin, Jonathan Bechtold, Ivan Morales, Razvan-Andrei Stoica, Giuseppe Abreu, and Harald Haas. "Physical-Layer Security in 6G Networks." IEEE Open Journal of the Communications Society 2 (2021): 1901–14. http://dx.doi.org/10.1109/ojcoms.2021.3103735.
Full textPfeiffer, Johannes, and Robert F. H. Fischer. "Multilevel Coding for Physical-Layer Security." IEEE Transactions on Communications 70, no. 3 (March 2022): 1999–2009. http://dx.doi.org/10.1109/tcomm.2022.3145578.
Full textBloch, Matthieu, Merouane Debbah, Yingbin Liang, Yasutada Oohama, and Andrew Thangaraj. "Special issue on physical-layer security." Journal of Communications and Networks 14, no. 4 (August 2012): 349–51. http://dx.doi.org/10.1109/jcn.2012.6292260.
Full textHuo, Yan, Yuqi Tian, Liran Ma, Xiuzhen Cheng, and Tao Jing. "Jamming Strategies for Physical Layer Security." IEEE Wireless Communications 25, no. 1 (February 2018): 148–53. http://dx.doi.org/10.1109/mwc.2017.1700015.
Full textHumble, Travis. "Quantum security for the physical layer." IEEE Communications Magazine 51, no. 8 (August 2013): 56–62. http://dx.doi.org/10.1109/mcom.2013.6576339.
Full textTrappe, Wade. "The challenges facing physical layer security." IEEE Communications Magazine 53, no. 6 (June 2015): 16–20. http://dx.doi.org/10.1109/mcom.2015.7120011.
Full textSaad, Walid, Xiangyun Zhou, Mérouane Debbah, and H. Vincent Poor. "Wireless physical layer security [Guest Editorial]." IEEE Communications Magazine 53, no. 12 (December 2015): 18. http://dx.doi.org/10.1109/mcom.2015.7355560.
Full textKuljanski-Marić, Sonja. "LDPC codes for physical layer security." Vojnotehnicki glasnik 66, no. 4 (2018): 900–919. http://dx.doi.org/10.5937/vojtehg66-14776.
Full textEfstathiou, Dimitrios. "A collaborative physical layer security scheme." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (June 1, 2019): 1924. http://dx.doi.org/10.11591/ijece.v9i3.pp1924-1934.
Full textDissertations / Theses on the topic "Physical-layer security"
Bloch, Matthieu. "Physical-layer security." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24658.
Full textCommittee Chair: McLaughlin, Steven; Committee Member: Barros, Joao; Committee Member: Bellissard, Jean; Committee Member: Fekri, Faramarz; Committee Member: Lanterman, Aaron
Zhu, Jun. "Physical layer security in massive MIMO systems." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/58281.
Full textApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Alotaibi, Esa. "Physical layer security in cooperative wireless communications." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-security-in-cooperative-wireless-communications(6a0c261e-c4c4-4796-a08b-95d015d7528a).html.
Full textChu, Zheng. "Transmit optimization techniques for physical layer security." Thesis, University of Newcastle upon Tyne, 2016. http://hdl.handle.net/10443/3377.
Full textJo, Youngho. "Physical layer techniques for wireless communication security." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0041108.
Full textMostafa, Ayman. "Physical-layer security for visible-light communication systems." Thesis, University of British Columbia, 2017. http://hdl.handle.net/2429/61328.
Full textApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Al-Talabani, Ali Mohammed Noori Hasan. "Enhancing physical layer security in cognitive radio networks." Thesis, King's College London (University of London), 2016. https://kclpure.kcl.ac.uk/portal/en/theses/enhancing-physical-layer-security-in-cognitive-radio-networks(d9036158-5310-4292-b93d-f542354269a7).html.
Full textPierrot, Alexandre Jean Louis J. "Coding techniques for multi-user physical layer security." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53836.
Full textWang, Ting. "Wireless Network Physical Layer Security with Smart Antenna." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/23243.
Full textWe first investigate the problem of enhancing wireless communication privacy. A novel scheme named "artificial fading" is proposed, which leverages the beam switching capability of smart antennas to prevent eavesdropping attacks. We introduce the optimization strategy to design a pair of switched beam patterns that both have high directional gain to the intended receiver. Meanwhile, in all the other directions, the overlap between these two patterns is minimized. The transmitter switches between the two patterns at a high frequency. In this way, the signal to unintended directions experiences severe fading and the eavesdropper cannot decode it. We use simulation experiments to show that the artificial fading outperforms single pattern beamforming in reducing the unnecessary coverage area of the wireless transmitter.
We then study the impact of beamforming technique on wireless localization systems from the perspectives of both location privacy protection and location spoofing attack.
For the location privacy preservation scheme, we assume that the adversary uses received signal strength (RSS) based localization systems to localize network users in Wireless LAN (WLAN). The purpose of the scheme is to make the adversary unable to uniquely localize the user when possible, and otherwise, maximize error of the adversary\'s localization results. To this end, we design a two-step scheme to optimize the beamforming pattern of the wireless user\'s smart antenna. First, the user moves around to estimate the locations of surrounding access points (APs). Then based on the locations of the APs, pattern synthesis is optimized to minimize the number of APs in the coverage area and degenerate the localization precision. Simulation results show that our scheme can significantly lower the chance of being localized by adversaries and also degrade the location estimation precision to as low as the coverage range of the AP that the wireless user is connected to.
As personal privacy preservation and security assurance at the system level are always conflictive to some extent, the capability of smart antenna to intentionally bias the RSS measurements of the localization system also potentially enables location spoofing attacks. From this aspect, we present theoretical analysis on the feasibility of beamforming-based perfect location spoofing (PLS) attacks, where the attacker spoofs to a target fake location by carefully choosing the beamforming pattern to fool the location system. The PLS problem is formulated as a nonlinear feasibility problem, and due to its intractable nature, we solve it using semidefinite relaxation (SDR) in conjunction with a heuristic local search algorithm. Simulation results show the effectiveness of our analytical approach and indicate the correlation between the geometry of anchor deployment and the feasibility of PLS attacks. Based on the simulation results, guidelines for guard against PLS attacks are provided.
Ph. D.
Polisetti, Mounika. "Physical Layer Security With Active Jamming Using NOMA." Thesis, Blekinge Tekniska Högskola, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21259.
Full textBooks on the topic "Physical-layer security"
Le, Khoa N., ed. Physical Layer Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1.
Full textBloch, Matthieu. Physical-layer security: From information theory to security engineering. Cambridge: Cambridge University Press, 2011.
Find full textDjordjevic, Ivan B. Physical-Layer Security and Quantum Key Distribution. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27565-5.
Full textWang, Li. Physical Layer Security in Wireless Cooperative Networks. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-61863-0.
Full textZou, Yulong, and Jia Zhu. Physical-Layer Security for Cooperative Relay Networks. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31174-6.
Full textWang, Hui-Ming, and Tong-Xing Zheng. Physical Layer Security in Random Cellular Networks. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-1575-5.
Full textShu, Feng, and Jiangzhou Wang. Intelligent Reflecting Surface-Aided Physical-Layer Security. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-41812-9.
Full textStübing, Hagen. Multilayered Security and Privacy Protection in Car-to-X Networks: Solutions from Application down to Physical Layer. Wiesbaden: Springer Fachmedien Wiesbaden, 2013.
Find full textInstitute Of Electrical and Electronics Engineers. IEEE standards for local and metropolitan area networks: Supplement to token-passing bus access methods and physical layer specifications -- enhancements for physical layer diversity (redundant media control unit). New York, NY: Institute of Electrical and Electronics Engineers, 1992.
Find full textInstitute Of Electrical and Electronics Engineers. IEEE standards for local and metropolitan area networks: Supplements to distributed queue dual bus (DQDB) access method and physical layer specifications : physical layer convergence procedure (PLCP) for DS1-based systems (Clause 12) and isochronous service on a distributed queue dual bus (DQDB) subnetwork of a metropolitan area network (MAN). New York: Institute of Electrical and Electronics Engineers, 1994.
Find full textBook chapters on the topic "Physical-layer security"
Soderi, Simone, Lorenzo Mucchi, Matti Hämäläinen, Alessandro Piva, and Jari Iinatti. "Physical Layer Security." In A Comprehensive Guide to 5G Security, 117–41. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119293071.ch6.
Full textDjordjevic, Ivan B. "Physical-Layer Security." In Physical-Layer Security and Quantum Key Distribution, 93–161. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27565-5_4.
Full textLe, Khoa N. "Conclusions." In Physical Layer Security, 181. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_8.
Full textShakiba-Herfeh, Mahdi, Arsenia Chorti, and H. Vincent Poor. "Physical Layer Security: Authentication, Integrity, and Confidentiality." In Physical Layer Security, 129–50. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_6.
Full textHu, Jinsong, Shihao Yan, Feng Shu, and Derrick Wing Kwan Ng. "Secure Transmission with Directional Modulation Based on Random Frequency Diverse Arrays." In Physical Layer Security, 29–50. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_2.
Full textVybornyi, Ivan, Abderrahmen Trichili, and Mohamed-Slim Alouini. "Backflash Light as a Security Vulnerability in Quantum Key Distribution Systems." In Physical Layer Security, 83–97. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_4.
Full textZheng, Tong-Xing, and Jinhong Yuan. "Physical Layer Security in Cache-Enabled Heterogeneous Cellular Networks." In Physical Layer Security, 51–82. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_3.
Full textJavali, Chitra, Girish Revadigar, Lavy Libman, Ming Ding, Zihuai Lin, and Sanjay Jha. "Secure Device Pairing Protocol Based on Wireless Channel Characteristics for Body Area Networks." In Physical Layer Security, 151–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_7.
Full textJavali, Chitra, Girish Revadigar, Ming Ding, Zihuai Lin, and Sanjay Jha. "Cooperative Physical Layer Secret Key Generation by Virtual Link Estimation." In Physical Layer Security, 99–128. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_5.
Full textBankey, Vinay, Prabhat K. Upadhyay, and Daniel Benevides da Costa. "Physical Layer Security in Hybrid Satellite-Terrestrial Relay Networks." In Physical Layer Security, 1–28. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_1.
Full textConference papers on the topic "Physical-layer security"
Debbah, Merouane. "Wireless physical layer security." In 2009 International Conference on Advanced Technologies for Communications (ATC). IEEE, 2009. http://dx.doi.org/10.1109/atc.2009.5349415.
Full textToliver, Paul. "Optical physical layer security." In 2011 IEEE Photonics Conference (IPC). IEEE, 2011. http://dx.doi.org/10.1109/pho.2011.6110414.
Full textKlinc, Demijan, Jeongseok Ha, Steven W. McLaughlin, Joao Barros, and Byung-Jae Kwak. "LDPC for Physical Layer Security." In GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. IEEE, 2009. http://dx.doi.org/10.1109/glocom.2009.5426065.
Full text"Session MP1b: Physical layer security." In 2015 49th Asilomar Conference on Signals, Systems and Computers. IEEE, 2015. http://dx.doi.org/10.1109/acssc.2015.7421188.
Full text"Session WA2a: Physical layer security." In 2016 50th Asilomar Conference on Signals, Systems and Computers. IEEE, 2016. http://dx.doi.org/10.1109/acssc.2016.7869663.
Full textAnkarali, Z. Esat, M. Harun Yilmaz, Mohammed Hafez, and Huseyin Arslan. "Channel independent physical layer security." In 2016 IEEE 17th Annual Wireless and Microwave Technology Conference (WAMICON). IEEE, 2016. http://dx.doi.org/10.1109/wamicon.2016.7483858.
Full textEfstathiou, Dimitrios. "IoT Physical Layer Security Enhancement." In 2018 Global Information Infrastructure and Networking Symposium (GIIS). IEEE, 2018. http://dx.doi.org/10.1109/giis.2018.8635755.
Full textSekhar, P. Chandra, and T. S. N. Murthy. "Physical Layer Security using SMO." In 2022 International Conference on Computing, Communication and Power Technology (IC3P). IEEE, 2022. http://dx.doi.org/10.1109/ic3p52835.2022.00028.
Full textGraur, Oana, Nazia Islam, and Werner Henkel. "Quantization for Physical Layer Security." In 2016 IEEE Globecom Workshops (GC Wkshps). IEEE, 2016. http://dx.doi.org/10.1109/glocomw.2016.7849013.
Full textPan, Fei, Yixin Jiang, Hong Wen, Runfa Liao, and Aidong Xu. "Physical Layer Security Assisted 5G Network Security." In 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall). IEEE, 2017. http://dx.doi.org/10.1109/vtcfall.2017.8288343.
Full text