X Luo, Y Liu, HH Chen, Q Guo - IEEE Network, 2020 - ieeexplore.ieee.org
… (V2V) communicationnetworks can no longer satisfy today’s vehicular communication require… (5G) and beyond network infrastructures, the next generation vehicle networks, called …
V Seferian, R Kanj, A Chehab… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
… In [8], we propose a secure and scalable identity based key distribution framework for the link layersecurity of wireless mesh-based AMI. It employs Identity based NonInteractive Key …
… of these technologies to secure SDMN communication channels and … Then, we propose a novel securecommunication channel … networks from other communicationnetworks. Mobile …
Y Wang, Z Miao, L Jiao - IEEE Access, 2016 - ieeexplore.ieee.org
… future communicationnetworks. More importantly, the physical layersecurity technologies … demands on the processing ability of communication entities. This significantly reduces the …
GJ Blinowski - International Journal of Electronics and …, 2016 - infona.pl
… securecommunication method. In this work we focus on security aspects of VLC communication, starting from basic physical characteristics of the communication channel. We analyze …
Q Wu, W Mei, R Zhang - IEEE Wireless Communications, 2019 - ieeexplore.ieee.org
… a physical-layer (PHY) design perspective. Note that PHY security has been extensively … eavesdropping and/ or jamming attacks in terrestrial communicationnetworks (eg, [3, 4, …
… However, since the goal of the proposed scheduling technique is securecommunication, the BS also needs to manage the leakage to EVEs by beamforming. It is obvious that the BS …
PC Pinto, J Barros, MZ Win - … Information Forensics and Security, 2011 - ieeexplore.ieee.org
… introduced the intrinsically securecommunications graph (iS-graph)—a random graph which describes the connections that can be securely established over a large-scale network. We …
Y Xu, J Liu, Y Shen, X Jiang, N Shiratori - Computer Networks, 2017 - Elsevier
… quality of service (QoS) caused by improving security is largely uninvestigated. As a step to … layersecurity-aware routing and performance tradeoffs in a multi-hop ad hoc network. …