scroll to top
0

Mobile Menu

Header Layout

EBSCO Auth Banner

Let's find your institution. Click here.

Page title

Advanced Search Results For "PHYSICAL layer security"

1 - 10 of 1,582 results for
 "PHYSICAL layer security"
Results per page:

Dual-Hop Transmission and Multiple Relays for Performance Analysis of Designing Physical Layer Security for IoT Networks.

Publication Type:Academic Journal

Source(s):Journal of Sensors. 9/15/2022, p1-14. 14p.

Abstract:This article presents a secure performance metric of a downlink nonorthogonal multiple access (NOMA) in the presence of interference from the traditional user. In the context of NOMA, we deploy two-hop transmission to improve the performance of destina...

View details

Physical Layer Security for CRNs over Beaulieu-Xie Fading Channels.

Publication Type:Academic Journal

Source(s):Wireless Communications & Mobile Computing. 8/8/2022, p1-9. 9p.

Abstract:In recent years, the access of massive communication devices leads to the insufficient spectrum resources of wireless networks. One of the practical means to resolve the problem is to build cognitive radio networks (CRNs), which can realize the sharing...

View details

Secure Irrigation System for Olive Orchards Using Internet of Things.

Publication Type:Academic Journal

Source(s):Computers, Materials & Continua. 2022, Vol. 72 Issue 3, p4663-4673. 11p.

Abstract:Smart irrigation system, also referred as precision irrigation system, is an attractive solution to save the limited water resources as well as to improve crop productivity and quality. In this work, by using Internet of things (IoT), we aim to design ...

View details

Physical Layer Security Technology Based on Nonorthogonal Multiple Access Communication.

Publication Type:Academic Journal

Source(s):Mobile Information Systems. 6/29/2022, p1-11. 11p.

Abstract:NOMA (nonorthogonal multiple access) technology is an effective technical means to improve spectral efficiency and system capacity. At present, due to the proliferation of access devices and other reasons, the network security communication is facing v...

View details

Electromagnetic Signal Intelligent Identification Based on Radio Frequency Fingerprints.

Publication Type:Academic Journal

Source(s):Wireless Communications & Mobile Computing. 6/7/2022, p1-12. 12p.

Abstract:Due to the open nature of WIFI connection, it is exposing its private information to the attackers. Traditional WIFI security methods are no longer able to meet the current security needs, and more and more wireless-side physical layer security solutio...

View details

IRS Backscatter-Assisted Security Transmission against Proactive Eavesdropping.

Publication Type:Academic Journal

Source(s):Wireless Communications & Mobile Computing. 5/5/2022, p1-10. 10p.

Abstract:In this paper, we consider the IRS backscatter-assisted physical layer security, aimed at countering smart eavesdroppers capable of sending jamming signals. Specifically, the eavesdropper increases the eavesdropping rate by sending jamming signals and ...

View details

Time-Division Multiarray Beamforming for UAV Communication.

Publication Type:Academic Journal

Source(s):Wireless Communications & Mobile Computing. 4/12/2022, p1-13. 13p.

Abstract:Recently, unmanned aerial vehicles (UAVs) have been widely used in various industries. However, the communication links of UAVs are also threatened by eavesdropping. To enhance physical layer security (PLS) for UAV communications, a time-division multi...

View details

Secrecy Rate Region Enhancement in Multiple Access Wiretap Channel.

Publication Type:Academic Journal

Source(s):Journal of Telecommunications & Information Technology. 2022, Issue 2, p14-25. 12p.

Abstract:It is commonly known that physical layer security is achieved with a trade-off in terms of the achievable rate. Hence, security constraints generate rate losses in wiretap channels. To mitigate such rate losses in multi-user channels, we propose a codi...

View details

LT Codes with Double Encoding Matrix Reorder Physical Layer Secure Transmission.

Publication Type:Academic Journal

Source(s):Journal of Sensors. 1/13/2022, p1-12. 12p.

Abstract:In traditional wireless sensor networks, information transmission usually uses data encryption methods to prevent information from being stolen illegally. However, once the encryption methods are leaked, eavesdropping nodes can easily obtain informatio...

View details

Physical Layer Security of Two-Way Ambient Backscatter Communication Systems.

Publication Type:Academic Journal

Source(s):Wireless Communications & Mobile Computing. 3/29/2022, p1-10. 10p.

Abstract:Achieving high network traffic demand in limited spectrum resources is a technical challenge for the beyond 5G and 6G communication systems. To this end, ambient backscatter communication (AmBC) is proposed for Internet-of-Things (IoT), because the bac...

View details

banner_970x250 (970x250)

sponsored