L Yin, H Haas - … Journal on Selected Areas in Communications, 2017 - ieeexplore.ieee.org
In this paper, we study the physical-layersecurity in a 3-D multiuser visible light communication (VLC) network. The locations of access points (APs) and mobile users are modeled as …
S Raza, S Duquennoy, J Höglund… - … and Communication …, 2014 - Wiley Online Library
… /IPsec security with traditional 802.15.4 link-layersecurity. For this purpose, we also implement 802.15.4 link-layersecurity for Contiki, which allows us to compare both security …
… Communicationnetworks are undergoing a transformation from simple point to point, static … with a flexible network fabric and cognitive control plane. The physical layer of the network is …
A Pittolo, AM Tonello - IET Communications, 2014 - Wiley Online Library
… the secure transmission of information over power line communication (PLC) networks. The focus is on the secrecy guaranteed at the physical layer, named physical layersecurity (PLS)…
YS Shiu, SY Chang, HC Wu… - … Communications, 2011 - ieeexplore.ieee.org
… wireless communication model, we show some existing physical layersecurity approaches. … In this article, issues in physical layersecurity for wireless networks have been discussed in …
A Omri, MO Hasna - 2018 IEEE 88th vehicular technology …, 2018 - ieeexplore.ieee.org
… aerial communicationnetwork with a single eavesdropper. Then, we evaluate the physical layersecurity of a standard and a beamforming based aerial communication systems in the …
A Mukherjee - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
… ; and 2) those that exploit the wireless communication medium to develop secret keys over … -scale multiuser networks. Security aspects of sensor and communicationsnetworks will be …
… and cognitive radio networks, along with physical layer message … the treatment of physical layersecurity offered in this paper … We recall that the original securecommunication system …
L Sun, Q Du - China communications, 2017 - ieeexplore.ieee.org
… Physical layersecurity techniques harness the intrinsic randomness at the physical layer to … In the next section, we will review the major physical-layersecurity approaches proposed in …