… Recently, the requirement of high data rates, data reliability, and security drives the development of RFID systems, which motivates our investigation on the physicallayersecurity of a …
PC Pinto, J Barros, MZ Win - … symposium on information theory, 2009 - ieeexplore.ieee.org
… Due to the properties of the physical medium, any … , recent results in informationtheory indicate that the physical properties of … The theoretical foundation for physical-layersecurity over …
… Kanter, “Noise-enhanced encryption for physicallayersecurity in an OFDM radio,” in Proc. … ysis, statistical signal processing, and informationtheory, and their applications in wireless …
… With the development of multi-user informationtheory, the focus of information-theoretic security research is also shifted from the point-to-point systems to multi-user systems. In multi-…
… To design physicallayersecurity techniques under practical scenarios, the uncertainty and … development in physicallayersecurity considering the imperfect channel state information (…
M Baldi, M Bianchi, F Chiaraluce - … IEEE Information Theory …, 2010 - ieeexplore.ieee.org
… In the context defined above, an important parameter is the security gap, that expresses the … a sufficient level of physicallayersecurity. An important target is to keep the security gap as …
… The strongest security protection may be achieved at the physicallayer”. In this work, we review how it is possible to move some of the security core functions down to the physicallayer, …
… Therefore, new security approaches are issued from informationtheory fundamentals and … as physicallayersecurity [2]–[10]. The advantages of employing physicallayersecurity tech…
… Third, more recently there has been interest in physicallayersecurity techniques that exploit … physicallayer technique that exploits the characteristics of multipath propagation for secure …