To see the other types of publications on this topic, follow the link: Secure communication channel.

Journal articles on the topic 'Secure communication channel'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Secure communication channel.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

YANG, TAO, and LEON O. CHUA. "CHANNEL-INDEPENDENT CHAOTIC SECURE COMMUNICATION." International Journal of Bifurcation and Chaos 06, no. 12b (1996): 2653–60. http://dx.doi.org/10.1142/s0218127496001727.

Full text
Abstract:
The generalized synchronization (GS) of two identical chaotic systems through an unknown channel is studied. First, some theoretical results of GS through an unknown channel are derived. Finally, an application of GS to channel-independent chaotic secure communication is presented.
APA, Harvard, Vancouver, ISO, and other styles
2

Mittelbach, Martin, Rafael F. Schaefer, Matthieu Bloch, Aylin Yener, and Onur Günlü. "Sensing-Assisted Secure Communications over Correlated Rayleigh Fading Channels." Entropy 27, no. 3 (2025): 225. https://doi.org/10.3390/e27030225.

Full text
Abstract:
We consider a secure integrated sensing and communication (ISAC) scenario, where a signal is transmitted through a state-dependent wiretap channel with one legitimate receiver with which the transmitter communicates and one honest-but-curious target that the transmitter wants to sense. The secure ISAC channel is modeled as two state-dependent fast-fading channels with correlated Rayleigh fading coefficients and independent additive Gaussian noise components. Delayed channel outputs are fed back to the transmitter to improve the communication performance and to estimate the channel state sequen
APA, Harvard, Vancouver, ISO, and other styles
3

Awan, Zohaib Hassan, Abdellatif Zaidi, and Luc Vandendorpe. "Secure Communication Over Parallel Relay Channel." IEEE Transactions on Information Forensics and Security 7, no. 2 (2012): 359–71. http://dx.doi.org/10.1109/tifs.2012.2185493.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bhattacharya, S., T. F. Keefe, and W. T. Tsai. "Covert Channel Secure Hypercube Message Communication." Journal of Parallel and Distributed Computing 26, no. 2 (1995): 233–47. http://dx.doi.org/10.1006/jpdc.1995.1062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

WANG, JIAN, QUAN ZHANG, and CHAOJING TANG. "QUANTUM SECURE DIRECT COMMUNICATION WITHOUT A PRE-ESTABLISHED SECURE QUANTUM CHANNEL." International Journal of Quantum Information 04, no. 06 (2006): 925–34. http://dx.doi.org/10.1142/s0219749906002304.

Full text
Abstract:
Most of the quantum secure direct communication protocols need a pre-established secure quantum channel. Only after ensuring the security of quantum channel can the sender encode the secret message and send it to the receiver through the secure channel. In this paper, we present a quantum secure direct communication protocol using Einstein–Podolsky–Rosen pairs and teleportation. It is unnecessary for the present protocol to ensure the security of the quantum channel before transmitting the secret message. In the present protocol, all Einstein–Podolsky–Rosen pairs are used to transmit the secre
APA, Harvard, Vancouver, ISO, and other styles
6

Wei, Yu-Yan, Zi-Kai Gao, Si-Ying Wang, Ya-Jing Zhu, and Tao Li. "Deterministic secure quantum communication with double-encoded single photons." Acta Physica Sinica 71, no. 5 (2022): 050302. http://dx.doi.org/10.7498/aps.71.20210907.

Full text
Abstract:
Quantum communication is an important branch of quantum technology. It can safely transmit private information between legitimate parties and its unconditional security is guaranteed by quantum physics. So far, deterministic secure quantum communication without entanglement usually transmits single photons in two-way quantum channels. We propose a deterministic secure quantum communication proposal, and it requires a one-way quantum channel and a classical channel. In our protocol, a sender encodes logical bits by using two conjugate bases consisting of the polarization and time-bin degrees of
APA, Harvard, Vancouver, ISO, and other styles
7

Yang, Yunqi, and Rui Zhang. "High Efficiency Secure Channels for a Secure Multiparty Computation Protocol Based on Signal." Security and Communication Networks 2023 (April 19, 2023): 1–10. http://dx.doi.org/10.1155/2023/7123175.

Full text
Abstract:
Secure multiparty computation (MPC) requires the messages transmitted in secure channels which can provide encryption and authorization to the messages. To implement a secure channel for MPC protocols, researchers have tried some communication protocols, such as TLS and Noise. However, these methods have some limitations. These protocols need a trusted certification authority to provide identity authorization which is difficult for an MPC protocol, and how participants manage the key of each party and how to use the key to establish communication is also a problem. A Signal protocol is an end-
APA, Harvard, Vancouver, ISO, and other styles
8

A. Aliesawi, Salah, Dena S. Alani, and Abdullah M. Awad. "Secure image transmission over wireless network." International Journal of Engineering & Technology 7, no. 4 (2018): 2758. http://dx.doi.org/10.14419/ijet.v7i4.15691.

Full text
Abstract:
The advances recently seen in data compression, and communication systems, have made it viable to design wireless image transmission systems. For many applications such as confidential transmission, military and medical applications, data encryption techniques should be also used to protect the confidential data from intruders. For these applications, both encryption and compression need to be performed to transmit a message in a fast and secure way. Further, the wireless channels have fluctuating channel qualities and high bit error rates. In this paper, a new scheme based on encryption and c
APA, Harvard, Vancouver, ISO, and other styles
9

Passerini, Federico, and Andrea M. Tonello. "Secure PHY Layer Key Generation in the Asymmetric Power Line Communication Channel." Electronics 9, no. 4 (2020): 605. http://dx.doi.org/10.3390/electronics9040605.

Full text
Abstract:
Leakage of information in power line communication (PLC) networks is a threat to privacy and security. A way to enhance security is to encode the transmitted information with the use of a secret key. If the communication channel exhibits common characteristics at both ends and these are unknown to a potential eavesdropper, then it is possible to locally generate a common secret key at the two communication ends without the need for sharing it through the broadcast channel. This is known as physical layer key generation. To this aim, known techniques have been developed exploiting the transfer
APA, Harvard, Vancouver, ISO, and other styles
10

Costa, D., N. G. de Almeida, and C. J. Villas-Boas. "Secure quantum communication using classical correlated channel." Quantum Information Processing 15, no. 10 (2016): 4303–11. http://dx.doi.org/10.1007/s11128-016-1389-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Yuzvak, Nazarii, Roman Banakh, and Abdallah A. Z. A. Ibrahim. "Creating secure communication channel with LoRa technology." Advances in Cyber-Physical Systems 10, no. 1 (2025): 111–16. https://doi.org/10.23939/acps2025.01.111.

Full text
Abstract:
This article addresses secure information transmission using LoRa technology in peer-to-peer mode, without relying on LoRaWAN. Such communication is vital in areas lacking centralized network infrastructure, such as rural, remote, emergency, or combat situations, where confidential data must be exchanged over several kilometers. The study explores methods for secure data transmission with LoRa devices, focusing on improving efficiency by optimizing encoding for higher data rates within limited byte sizes. Measurements of the maximum transmission rate and longest successful distance have been p
APA, Harvard, Vancouver, ISO, and other styles
12

Culbreth, Scott, and Scott Graham. "Demonstrating Redundancy Advantages of a Three-Channel Communication Protocol." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 513–22. http://dx.doi.org/10.34190/iccws.18.1.964.

Full text
Abstract:
Multi-Channel communications have the potential to provide advantages in security and redundancy. One widespread example of additional security is the use of 2 Factor Authentication wherein an authorization code is sent via a separate channel. As another example, spread spectrum technology offers resilience against channel interference. However, no currently deployed communication protocols take advantage of the full spectrum of security and performance gains that can be obtained through transmitting data over multiple channels. Taking inspiration from Redundant Array of Inexpensive Disks (RAI
APA, Harvard, Vancouver, ISO, and other styles
13

WANG, JIAN, QUAN ZHANG, and CHAOJING TANG. "QUANTUM SECURE DIRECT COMMUNICATION WITHOUT USING PERFECT QUANTUM CHANNEL." International Journal of Modern Physics C 17, no. 05 (2006): 685–92. http://dx.doi.org/10.1142/s0129183106009011.

Full text
Abstract:
Most of the quantum secure direct communication protocol needs a pre-established secure quantum channel. Only after insuring the security of quantum channel, could the sender encode the secret message and send them to the receiver through the secure channel. In this paper, we present a quantum secure direct communication protocol using Einstein-Podolsky-Rosen pairs without insuring the security of quantum channel before transmitting the secret message. Compared with the protocol proposed by Deng et al. [Phys. Rev. A68, 042317 (2003)] and the scheme proposed by Yan et al. [ Euro. Phys. J. B41,
APA, Harvard, Vancouver, ISO, and other styles
14

La Manna, Mario. "Secure Communications Based on Cognitive Multidisciplinary Strategies." Journal of Systemics, Cybernetics and Informatics 20, no. 4 (2022): 30–33. http://dx.doi.org/10.54808/jsci.20.04.30.

Full text
Abstract:
The use of cognitive multidisciplinary strategies represents a powerful tool to allow a communication system to transmit and receive data in a secure way by working in parallel with other electromagnetic devices, sharing the same frequency channels, without being affected by malfunctions caused by unintentional or intentional interferences (e.g. jammers). The cognitive operation is possible by modeling the channel behavior and predicting future channel occupancy. The model of the electromagnetic environment is based on the observation of the spectrum occupancy over time and on suitable reinfor
APA, Harvard, Vancouver, ISO, and other styles
15

GAO, TING, FENGLI YAN, and ZHIXI WANG. "QUANTUM SECURE CONDITIONAL DIRECT COMMUNICATION VIA EPR PAIRS." International Journal of Modern Physics C 16, no. 08 (2005): 1293–301. http://dx.doi.org/10.1142/s0129183105007881.

Full text
Abstract:
Two schemes for quantum secure conditional direct communication are proposed, where a set of EPR pairs of maximally entangled particles in Bell states, initially made by the supervisor Charlie, but shared by the sender Alice and the receiver Bob, functions as quantum information channels for faithful transmission. After insuring the security of the quantum channel and obtaining the permission of Charlie (i.e., Charlie is trustworthy and cooperative, which means the "conditional" in the two schemes), Alice and Bob begin their private communication under the control of Charlie. In the first sche
APA, Harvard, Vancouver, ISO, and other styles
16

Yan, Senlin. "Two chaotic synchronizations in er-doped fiber lasers and their application in two-channel coding secure communications." ITM Web of Conferences 45 (2022): 02008. http://dx.doi.org/10.1051/itmconf/20224502008.

Full text
Abstract:
A dual-ring erbium-doped fiber laser has nonlinear dynamic characteristics based on optical coupling interaction of lasing from the two laser rings and can send chaotic lasing to encode and mask an information to perform secure communication. Two independent groups of single-ring erbium-doped fiber lasers and a dual-ring erbium-doped fiber laser are used to construct two-channel chaos secure communication system while the synchronization’s physical mathematical model is presented by using the “active-passive” chaotic synchronization method, where a dual-ring erbium-doped fiber laser is used as
APA, Harvard, Vancouver, ISO, and other styles
17

Rajaram, Akashkumar, Dushnatha Nalin K. Jayakody, Rui Dinis, and Marko Beko. "Energy Efficient Secure Communication Model against Cooperative Eavesdropper." Applied Sciences 11, no. 4 (2021): 1563. http://dx.doi.org/10.3390/app11041563.

Full text
Abstract:
In a wiretap channel system model, the jammer node adopts the energy-harvesting signal as artificial noise (jamming signal) against the cooperative eavesdroppers. There are two eavesdroppers in the wiretap channel: eavesdropper E1 is located near the transmitter and eavesdropper E2 is located near the jammer. The eavesdroppers are equipped with multiple antennas and employ the iterative block decision feedback equalization decoder to estimate the received signal, i.e., information signal at E1 and jamming signal at E2. It is assumed that E1 has the channel state information (CSI) of the channe
APA, Harvard, Vancouver, ISO, and other styles
18

Hao, Yuan, Song Jun, He Qin, et al. "Robust Quantum Secure Direct Communication and Deterministic Secure Quantum Communication over Collective Dephasing Noisy Channel." Communications in Theoretical Physics 50, no. 3 (2008): 627–32. http://dx.doi.org/10.1088/0253-6102/50/3/19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

DONG, LI, XIAO-MING XIU, YA-JUN GAO, and FENG CHI. "MULTIPARTY CONTROLLED DETERMINISTIC SECURE QUANTUM COMMUNICATION THROUGH ENTANGLEMENT SWAPPING." International Journal of Modern Physics C 19, no. 11 (2008): 1673–81. http://dx.doi.org/10.1142/s0129183108013205.

Full text
Abstract:
A three-party controlled deterministic secure quantum communication scheme through entanglement swapping is proposed firstly. In the scheme, the sender needs to prepare a class of Greenberger–Horne–Zeilinger (GHZ) states which are used as quantum channel. The two communicators may securely communicate under the control of the controller if the quantum channel is safe. The roles of the sender, the receiver, and the controller can be exchanged owing to the symmetry of the quantum channel. Different from other controlled quantum secure communication schemes, the scheme needs lesser additional cla
APA, Harvard, Vancouver, ISO, and other styles
20

Schaefer, Rafael F., Holger Boche, and H. Vincent Poor. "Secure Communication Under Channel Uncertainty and Adversarial Attacks." Proceedings of the IEEE 103, no. 10 (2015): 1796–813. http://dx.doi.org/10.1109/jproc.2015.2459652.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Lu, Bowen, Shiwei Lai, Yajuan Tang, et al. "Intelligent Reflecting Surface Aided Secure Communication with Federated Learning." ICST Transactions on Mobile Communications and Applications 7, no. 4 (2023): e2. http://dx.doi.org/10.4108/eetmca.v7i4.2900.

Full text
Abstract:
Applying federated learning into the covert communication can not only ensure the communication reliability, but also reduce the probability of enemy detection. The use of airspace resources is an effective way to achieve covert communication. However, most of the existing works on the airspace covert communication represented by MIMO need to adapt to the channel state and cannot improve the channel, resulting in the performance bottleneck of covert communication. The intelligent reflective surface (IRS) provides a new perspective for the covert communication by flexibly adjusting the reflecti
APA, Harvard, Vancouver, ISO, and other styles
22

Fu, Min Cang, and Jia Chen Wang. "Efficient and Secure Two-Way Asynchronous Quantum Secure Direct Communication Protocol by Using Entangled States." Applied Mechanics and Materials 135-136 (October 2011): 1171–78. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1171.

Full text
Abstract:
An efficient and secure two-way asynchronous quantum secure direct communication protocol by using entangled states is proposed in this paper. Decoy photons are utilized to check eavesdropping; the securities of the protocol are equal to BB84 protocol. After ensuring the security of the quantum channel, both parties encode the secret message by using CNOT operation and local unitary operation separately. The two-way asynchronous direct transition of secret message can be realized by using Bell measurement and von Neumann measurement, combined with classical communication. Different from the pr
APA, Harvard, Vancouver, ISO, and other styles
23

XIA, YAN, JIE SONG, and HE-SHAN SONG. "PERFECT CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION." International Journal of Quantum Information 06, no. 03 (2008): 463–70. http://dx.doi.org/10.1142/s0219749908003682.

Full text
Abstract:
We present a complete controlled quantum secure direct communication (CQSDC) protocol using a nonsymmetric quantum channel. We point out that the roles of controllers in two recent works16,17 can be excluded due to their design. We also give a revised CQSDC protocol such that their original advantages are retained and the complete CQSDC can be realized. We then analyze the roles of the controllers in different CQSDC protocols with different purposes and these protocols' applicabilities.
APA, Harvard, Vancouver, ISO, and other styles
24

Wang, Meng, Kaizhi Huang, Zheng Wan, Xiaoli Sun, Liang Jin, and Kai Zhao. "Non-Reconciled Physical-Layer Keys-Assisted Secure Communication Scheme Based on Channel Correlation." Entropy 24, no. 8 (2022): 1167. http://dx.doi.org/10.3390/e24081167.

Full text
Abstract:
Physical-layer key generation technology requires information reconciliation to correct channel estimation errors between two legitimate users. However, sending the reconciliation signals over the public channel increases the communication overhead and the risk of information leakage. Aiming at the problem, integrated secure communication schemes using non-reconciled keys have attracted extensive attention. These schemes exploit channel coding to correct both inconsistent keys and transmission error bits. Meanwhile, more redundant code bits must be added to correct errors, which results in a l
APA, Harvard, Vancouver, ISO, and other styles
25

Ni, Lei, Xinyu Da, Hang Hu, Yuan Liang, and Ruiyang Xu. "PHY-Aided Secure Communication via Weighted Fractional Fourier Transform." Wireless Communications and Mobile Computing 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/7963451.

Full text
Abstract:
A weighted fractional Fourier transform (WFRFT) based on channel state information (CSI), aiming to safeguard the physical (PHY) layer security of wireless communication system, is proposed. With the proposed scheme, WFRFT is first applied to satellite communications such that the transmitted signal is distorted and can only be neutralized by inverse-WFRFT with the same parameter. Moreover, by exploiting the physical properties of wireless channels, the CSI matrix is transformed as a secret key. In addition, by adding phase rotation (PR) factors to each branch of the WFRFT system, a new unitar
APA, Harvard, Vancouver, ISO, and other styles
26

Yadav, Suneel, Anshul Pandey, Dinh-Thuan Do, Byung Moo Lee, and Adão Silva. "Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints." Sensors 21, no. 21 (2021): 7160. http://dx.doi.org/10.3390/s21217160.

Full text
Abstract:
Vehicular communication has been envisioned to support a myriad of essential fifth-generation and beyond use-cases. However, the increasing proliferation of smart and intelligent vehicles has generated a lot of design and infrastructure challenges. Of particular interest are the problems of spectrum scarcity and communication security. Consequently, we considered a cognitive radio-enabled vehicular network framework for accessing additional radio spectrum and exploit physical layer security for secure communications. In particular, we investigated the secrecy performance of a cognitive radio v
APA, Harvard, Vancouver, ISO, and other styles
27

Yuan, Zhen-hua, Chen Chen, Xiang Cheng, Guo-cheng Lv, Liu-qing Yang, and Ye Jin. "Correlated channel model-based secure communications in dual-hop wireless communication networks." Frontiers of Information Technology & Electronic Engineering 18, no. 6 (2017): 796–807. http://dx.doi.org/10.1631/fitee.1700023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Gvozdarev, Aleksey, Tatiana Artemova, Pavel Patralov, and Dmitriy Murin. "The Statistical Analysis of the Security for a Wireless Communication System with a Beaulieu-Xie Shadowed Fading Model Channel." Informatics and Automation 21, no. 5 (2022): 1044–78. http://dx.doi.org/10.15622/ia.21.5.8.

Full text
Abstract:
The paper considers the problem of a wireless communication system’s physical level security for a multipath signal propagation channel and the presence of a wiretap channel. To generalize the propagation effects, the Beaulieu-Xie shadowed channel model was assumed. To describe the security of the information transfer process, such a metric as the secure outage probability of was considered. An analytical expression of the secure outage probability was obtained and analyzed depending on the characteristics of the channel and the communication system: the average value of the signal-to-noise ra
APA, Harvard, Vancouver, ISO, and other styles
29

Kinzel, W., A. Englert, and I. Kanter. "On chaos synchronization and secure communication." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 368, no. 1911 (2010): 379–89. http://dx.doi.org/10.1098/rsta.2009.0230.

Full text
Abstract:
Chaos synchronization, in particular isochronal synchronization of two chaotic trajectories to each other, may be used to build a means of secure communication over a public channel. In this paper, we give an overview of coupling schemes of Bernoulli units deduced from chaotic laser systems, different ways to transmit information by chaos synchronization and the advantage of bidirectional over unidirectional coupling with respect to secure communication. We present the protocol for using dynamical private commutative filters for tap-proof transmission of information that maps the task of a pas
APA, Harvard, Vancouver, ISO, and other styles
30

Mr., Antony Jose, Fathima Lubna Ms., Jashini Siraju Ms., P. V. Rahana, Saliya Manaf A. P. Ms., and Shabna K. A. Ms. "SACT: AN ANONYMOUS COMMUNICATION TECHNIQUE." International Journal of Advances in Engineering & Scientific Research 3, no. 4 (2016): 43–56. https://doi.org/10.5281/zenodo.10774085.

Full text
Abstract:
<strong>Abstract: </strong> &nbsp; <strong>Objective- </strong>The aim of this paper is to realize a secure and anonymous communication technique which provides end-to-end encryption and anonymity simultaneously. <strong>Design/Methodology/Approach-</strong> End-to-end encryption and anonymity are considered as important features in privacy preserving communications. A simple combination of Public Key Infrastructure (PKI) and current anonymous communication protocols cannot be used to realize secure and anonymous communication. The anonymity is contradicted by the current PKI because the user
APA, Harvard, Vancouver, ISO, and other styles
31

Chang, Wei-Der, Shun-Peng Shih, and Chih-Yung Chen. "Chaotic Secure Communication Systems with an Adaptive State Observer." Journal of Control Science and Engineering 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/471913.

Full text
Abstract:
This paper develops a new digital communication scheme based on using a unified chaotic system and an adaptive state observer. The proposed communication system basically consists of five important elements: signal modulation, chaotic encryption, adaptive state observer, chaotic decryption, and signal demodulation. A sequence of digital signals will be delivered from the transmitter to the receiver through a public channel. It is rather reasonable that if the number of signals delivered on the public channel is fewer, then the security of such communication system is more guaranteed. Therefore
APA, Harvard, Vancouver, ISO, and other styles
32

Sharma, Arunima. "Adaptive beamforming approach for secure communication in 5G network." Computer and Telecommunication Engineering 2, no. 3 (2024): 2628. http://dx.doi.org/10.54517/cte2628.

Full text
Abstract:
&lt;p class="15"&gt;The beamforming approach has been emerging as a very important concept for next generation networks. In addition to the improved channel capacity, spectral efficiency, energy efficiency, secrecy rate and secrecy outage probability, the upcoming fifth generation network mainly aims at enhancing the parameters of the channel for secure communication. In this paper, we have implied the allocation of resource blocks adaptively using HMM with a beamforming approach in an intruded network. A system model for secure communication in an intruded network has been discussed using a b
APA, Harvard, Vancouver, ISO, and other styles
33

Sharma, Arunima. "Adaptive beamforming approach for secure communication in 5G network." Computer and Telecommunication Engineering 2, no. 3 (2024): 2628. http://dx.doi.org/10.54517/cte.v2i3.2628.

Full text
Abstract:
&lt;p class="15"&gt;The beamforming approach has been emerging as a very important concept for next generation networks. In addition to the improved channel capacity, spectral efficiency, energy efficiency, secrecy rate and secrecy outage probability, the upcoming fifth generation network mainly aims at enhancing the parameters of the channel for secure communication. In this paper, we have implied the allocation of resource blocks adaptively using HMM with a beamforming approach in an intruded network. A system model for secure communication in an intruded network has been discussed using a b
APA, Harvard, Vancouver, ISO, and other styles
34

Kumar, D. Pavun, S. Nithish Kumar, D. Sakthivel, and S. Saran. "An Anonymous Authentication and Secure Communication Protocol in Ad-Hoc Networks." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1840–45. http://dx.doi.org/10.22214/ijraset.2023.49412.

Full text
Abstract:
Abstract: The one-time pad (OTP) stable transmission is based at the random keys to acquire best secrecy, whilst the unpredictable wi-fi channel is proven to be an awesome random source. There is only a few paintings of the joint layout of OTP and key era from wi-fi channels. This paper presents a complete and quantitative research on stable transmission accomplished with the use of using OTP and wi-fi channel randomness. We recommend OTP stable transmission schemes, i.e., Identical Keyprimarily based totally Physical Layer Secure Transmission (IK-PST) and Un-Same Key-primarily based totally P
APA, Harvard, Vancouver, ISO, and other styles
35

Zhong, Jingxiang. "Network Communication Data Encryption Method Based on Wireless Channel Characteristics." International Journal of Circuits, Systems and Signal Processing 15 (August 31, 2021): 1242–51. http://dx.doi.org/10.46300/9106.2021.15.135.

Full text
Abstract:
In order to improve the secure transmission capability of wireless transmission network communication data, a network communication data encryption design is required. An encryption and secure transmission method of wireless transmission network communication data based on wireless channel feature detection is proposed. The ECC (Elliptic Curves Cryptography) algorithm analyzes by monitoring single-channel and multi-channel samples separately. The ciphertext protocol for data secure transmission is constructed, the Hash dynamic transmission protocol is used for data access control, the data dyn
APA, Harvard, Vancouver, ISO, and other styles
36

Wu, Weiwei. "A secure encryption method of communication channel based on cloud computing technology." Web Intelligence 19, no. 3 (2021): 239–51. http://dx.doi.org/10.3233/web-210470.

Full text
Abstract:
The traditional channel encryption method is interfered by noise signal, which leads to long encryption time and poor security. This paper proposes a communication channel security encryption method based on cloud computing technology. In order to obtain the minimum benefits of the same channel and orthogonal channel in the frequency conversion receiver, the dual input and dual output model is constructed; the influence of time domain and frequency domain on the transmission signal is analyzed, and the nonlinear transmission characteristics of the channel signal are obtained. Through cloud com
APA, Harvard, Vancouver, ISO, and other styles
37

Harun, Nur Ziadah, Zuriati Ahmad Zukarnain, Zurina Mohd Hanapi, and Idawaty Ahmad. "Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key." Symmetry 12, no. 9 (2020): 1481. http://dx.doi.org/10.3390/sym12091481.

Full text
Abstract:
The security of Quantum Secure Direct Communication (QSDC) and its authentication procedure based on multiple stages is analyzed. The security analysis shows that the process of authentication is required to be done three times based on the usage of unitary transformation that is only known between Alice and Bob. In the proposed protocol, a secure quantum handshake is utilized to share the secret polarization angle and an authentication key at the initial stage of authentication over the quantum channel. The symmetry key is used in this work to protect user data communication within the QSDC p
APA, Harvard, Vancouver, ISO, and other styles
38

Liu, Lei, Chao Ma, Yong Duan, Xinyu Liu, and Xin Qing. "Channel Estimation and Iterative Decoding for Underwater Acoustic OTFS Communication Systems." Journal of Marine Science and Engineering 12, no. 9 (2024): 1559. http://dx.doi.org/10.3390/jmse12091559.

Full text
Abstract:
Orthogonal Time–Frequency Space (OTFS) is an innovative modulation method that ensures efficient and secure communication over a time-varying channel. This characteristic inspired us to integrate OTFS technology with underwater acoustic (UWA) communications to counteract the time-varying and overspread characteristics of UWA channels. However, implementing OTFS in UWA communications presents challenges related to overspread channels. To handle these challenges, we introduce a specialized OTFS system and offer frame design recommendations for UWA communications in this article. We propose a Dop
APA, Harvard, Vancouver, ISO, and other styles
39

Athanasakos, Manos, and George Karagiannidis. "Secure Polar Coding for the Primitive Relay Wiretap Channel." Entropy 23, no. 4 (2021): 442. http://dx.doi.org/10.3390/e23040442.

Full text
Abstract:
With the emergence of wireless networks, cooperation for secrecy is recognized as an attractive way to establish secure communications. Departing from cryptographic techniques, secrecy can be provided by exploiting the wireless channel characteristics; that is, some error-correcting codes besides reliability have been shown to achieve information-theoretic security. In this paper, we propose a polar-coding-based technique for the primitive relay wiretap channel and show that this technique is suitable to provide information-theoretic security. Specifically, we integrate at the relay an additio
APA, Harvard, Vancouver, ISO, and other styles
40

Anshu, Anurag, Masahito Hayashi, and Naqueeb Ahmad Warsi. "Secure Communication Over Fully Quantum Gel’fand-Pinsker Wiretap Channel." IEEE Transactions on Information Theory 66, no. 9 (2020): 5548–66. http://dx.doi.org/10.1109/tit.2020.3005015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Lee, JunSeob, and Kisong Lee. "Secure Communication Via Untrusted Relay with Channel Estimation Error." Journal of Korean Institute of Communications and Information Sciences 44, no. 7 (2019): 1295–98. http://dx.doi.org/10.7840/kics.2019.44.7.1295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Sun, Yonghui, Jinde Cao, and Gang Feng. "An adaptive chaotic secure communication scheme with channel noises." Physics Letters A 372, no. 33 (2008): 5442–47. http://dx.doi.org/10.1016/j.physleta.2008.06.061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Liyanage, Madhusanka, An Braeken, Anca Delia Jurcut, Mika Ylianttila, and Andrei Gurtov. "Secure communication channel architecture for Software Defined Mobile Networks." Computer Networks 114 (February 2017): 32–50. http://dx.doi.org/10.1016/j.comnet.2017.01.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Su-Juan, Qin, Gao Fei, Wen Qiao-Yan, and Zhu Fu-Chen. "Robust Quantum Secure Direct Communication over Collective Rotating Channel." Communications in Theoretical Physics 53, no. 4 (2010): 645–47. http://dx.doi.org/10.1088/0253-6102/53/4/12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Gu, Bin, ShiXin Pei, Biao Song, and Kun Zhong. "Deterministic secure quantum communication over a collective-noise channel." Science in China Series G: Physics, Mechanics and Astronomy 52, no. 12 (2009): 1913–18. http://dx.doi.org/10.1007/s11433-009-0303-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Antony, Hyils Sharon Magdalene, and Thulasimani Lakshmanan. "Secure Beamforming in 5G-Based Cognitive Radio Network." Symmetry 11, no. 10 (2019): 1260. http://dx.doi.org/10.3390/sym11101260.

Full text
Abstract:
Cognitive radio network (CRN) and non-orthogonal multiple-access (NOMA) is a significant system in the 5G wireless communication system. However, the system is an exceptional way for the cognitive users to secure a communication from the interferences in multiple-input multiple-output (MIMO)-NOMA-based cognitive radio network. In this article, a new beamforming technique is proposed to secure an information exchange within the same cells and neighboring cells from all intervened users. The interference is caused by an imperfect spectrum sensing of the secondary users (SUs). The SUs are intende
APA, Harvard, Vancouver, ISO, and other styles
47

Heshem, A. El Zouka. "PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS." International Journal of Network Security & Its Applications (IJNSA) 7, no. 4 (2015): 31–41. https://doi.org/10.5281/zenodo.8300141.

Full text
Abstract:
The broadcast nature of radio medium in GSM networks makes them more vulnerable to various attacks. Any attacker can have complete control over the communication channel, listen to phone calls, read email, and spy on whatever data has been sent via GSM mobile communication system. This paper introduces a middleware security system that aims to protect the GSM communication channel and minimize the computational overheads of the provided authentication and cryptographic schemes of the network The proposed scheme supports an end-to-end secured communication between the GSM mobile devices and the
APA, Harvard, Vancouver, ISO, and other styles
48

Yang, Lei, Song Gao, ZiYue Liu, and ZhuoJun He. "Secure transmission strategy of multi UAV relays in jamming environment." Journal of Physics: Conference Series 2187, no. 1 (2022): 012015. http://dx.doi.org/10.1088/1742-6596/2187/1/012015.

Full text
Abstract:
Abstract This paper studies a multi UAV relays communication system based on secure transmission strategy in jamming environment. In the multi UAV relays communication system with interference, we use the physical layer security technology based on the physical layer to maximize the minimum average rate by optimizing the flight trajectory and resource allocation of the signal source and UAV relays, and adjust the channel state information of the legal communication channel, so as to improve the communication performance of the legal channel. Since the optimization problem and constraints are n
APA, Harvard, Vancouver, ISO, and other styles
49

Berkman, Liubov, Andrii Zakharzhevskyi, and Kostiantyn Lavrinets. "Improving the technology for processing the aggregated data flow of a secure corporate multiservice communication network." Eastern-European Journal of Enterprise Technologies 4, no. 9 (124) (2023): 14–23. http://dx.doi.org/10.15587/1729-4061.2023.285414.

Full text
Abstract:
This paper considers the process of dynamic reservation of the channel resource of a secure corporate multi-service communication network. It has been established that the processes of building and functioning of the schemes of a secure corporate multi-service communication network and improving the quality of the implementation of its main work processes involve the evaluation and dynamic reservation of channel resources for incoming aggregated data flows of the network. The model of dynamic reservation of the channel resource of the aggregated data stream of the secure corporate multi-servic
APA, Harvard, Vancouver, ISO, and other styles
50

Mushenko, Alexey, Julia Dzuba, Alexey Nekrasov, and Colin Fidge. "A Data Secured Communication System Design Procedure with a Chaotic Carrier and Synergetic Observer." Electronics 9, no. 3 (2020): 497. http://dx.doi.org/10.3390/electronics9030497.

Full text
Abstract:
We have considered the problem of secure communication by means of chaotic carrier communication channels. Data protection is provided if the signal in the communication channel looks like a stochastic or noisy one, i.e., by the steganography property, and also by using advanced and secured approaches of mixing a useful signal into a chaotic carrier. The problem is to find effective and efficient techniques for useful signal reconstruction at the receiver side. We firstly use a synergetic nonlinear mathematical observer to recover the two useful signals transmitted simultaneously over a single
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!