scroll to top
Press enter or spacebar to select a desired language.
Press enter or spacebar to select a desired language.
Your source for trusted research content

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "PHYSICAL layer security"

1 - 10 of 2,008 results for
 "PHYSICAL layer security"
Press enter or spacebar to adjust the number of results displayed.

Robust Secure Beamforming for Multiantenna Relay Networks with Multiple Eavesdroppers.

Publication Type: Academic Journal

Source(s): Mathematical Problems in Engineering. 9/21/2023, p1-10. 10p.

Abstract: Physical layer security has recently emerged as a promising approach to achieve security and communication integration. The built-in security mechanism based on the characteristics of the wireless channel provides a feasible idea for the realization of...

Analysis of Eavesdropping Region in Hybrid mmWave-Microwave Wireless Systems.

Publication Type: Academic Journal

Source(s): Wireless Communications & Mobile Computing. 9/2/2023, p1-14. 14p.

Abstract: Hybrid communication systems, where millimeter-wave (mmWave) links coexist with microwave links, have been an essential component in the fifth-generation (5G) wireless networks. Nevertheless, the open feature of the wireless medium makes hybrid systems...

Securing Non-Terrestrial FSO Link with Public Key Encryption against Flying Object Attacks.

Publication Type: Academic Journal

Source(s): Photonics. Aug2023, Vol. 10 Issue 8, p884. 18p.

Abstract: Free Space Optical (FSO) communication has potential terrestrial and non-terrestrial applications. It allows large bandwidth for higher data transfer capacity. Due to its high directivity, it has a potential security advantage over traditional radio fr...

Disguised Full-Duplex Covert Communications.

Publication Type: Academic Journal

Source(s): Sensors (14248220). Jul2023, Vol. 23 Issue 14, p6515. 13p.

Authors:

Abstract: Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security. The main objective is to completely conceal from external devices the very existence o...

Security- and Reliability-Guaranteed Transmission Control of Time-Sensitive Physical Layer Security Systems.

Publication Type: Academic Journal

Source(s): Entropy. Jul2023, Vol. 25 Issue 7, p1040. 18p.

Abstract: In this paper, we consider information transmission over a three-node physical layer security system. Based on the imperfect estimations of the main channel and the eavesdropping channel, we propose reducing the outage probability and interception prob...

Multimode Optical Interconnects on Silicon Interposer Enable Confidential Hardware-to-Hardware Communication.

Publication Type: Academic Journal

Source(s): Sensors (14248220). Jul2023, Vol. 23 Issue 13, p6076. 11p.

Abstract: Following Moore's law, the density of integrated circuits is increasing in all dimensions, for instance, in 3D stacked chip networks. Amongst other electro-optic solutions, multimode optical interconnects on a silicon interposer promise to enable high ...

Physical Layer Security Performance of Multi-User Mixed Radio-Frequency/Free-Space-Optics System Based on Optimal User Interference.

Publication Type: Academic Journal

Source(s): Sensors (14248220). Jul2023, Vol. 23 Issue 14, p6523. 14p.

Abstract: This paper presents research on the physical layer security performance of a multi-user mixed RF/FSO system based on optimal user interference. In this system model, the RF link experiences Rayleigh fading, and the FSO link follows the Fischer–Snedecor...

Analysis of the Mutual Information of Channel Phase Observations in Line-of-Sight Scenarios.

Publication Type: Academic Journal

Source(s): Entropy. Jul2023, Vol. 25 Issue 7, p1038. 11p.

Abstract: The mutual information of the observed channel phase between devices can serve as an entropy source for secret key generation in line-of-sight scenarios. However, so far only simulated and numeric results were available. This paper derives the probabil...

Secure Downlink Transmission Strategies against Active Eavesdropping in NOMA Systems: A Zero-Sum Game Approach.

Publication Type: Academic Journal

Source(s): CMES-Computer Modeling in Engineering & Sciences. 2023, Vol. 136 Issue 1, p531-533. 23p.

Abstract: Non-orthogonal multiple access technology (NOMA), as a potentially promising technology in the 5G/B5G era, suffers fromubiquitous security threats due to the broadcast nature of the wirelessmedium. In this paper, we focus on artificial-signal-assisted ...

Optical Systems Identification through Rayleigh Backscattering.

Publication Type: Academic Journal

Source(s): Sensors (14248220). Jun2023, Vol. 23 Issue 11, p5269. 14p.

Abstract: We introduce a technique to generate and read the digital signature of the networks, channels, and optical devices that possess the fiber-optic pigtails to enhance physical layer security (PLS). Attributing a signature to the networks or devices eases ...

sponsored