Transmit beamforming for physical-layer multicasting

ND Sidiropoulos, TN Davidson… - … on signal processing, 2006 - ieeexplore.ieee.org
… This is a cross-layer optimization approach that exploits information available at the physical
layer to reduce relay retransmissions at the network layer, thus providing congestion relief …

[PDF][PDF] The physical layer of the IEEE 802.11 p WAVE communication standard: the specifications and challenges

AMS Abdelgader, W Lenan - Proceedings of the world congress …, 2014 - researchgate.net
process. This paper presented an overview of the physical layer (PHY) of the IEEE 802.11p
standard… The specifications, components, performance and challenges of the PHY layer are …

[图书][B] Physical layer security in wireless communications

X Zhou, L Song, Y Zhang - 2013 - books.google.com
… in applying signal processing techniques to design physical layer security enhancements. …
Chapter 9 extends the signal processing techniques from point-to-point systems to relay …

A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
… security has greatly benefited from recent advances to the point where optimization has
now emerged as a major signal processing technique. Towards general optimization problem (…

The road to 6G: Ten physical layer challenges for communications engineers

M Matthaiou, O Yurduseven, HQ Ngo… - IEEE …, 2021 - ieeexplore.ieee.org
… that need to be addressed at the physical layer to boost follow-up research in the 6G
ecosystem. • Finally, we articulate the critical role of fundamental signal processing (SP) in the 6G …

An overview of physical layer security in wireless communication systems with CSIT uncertainty

A Hyadi, Z Rezki, MS Alouini - IEEE Access, 2016 - ieeexplore.ieee.org
… designed coding techniques and signal processing strategies. In this vein, it … physical layer
security with CSIT uncertainty. We focus on both information theoretic and signal processing

Physical layer security in wireless networks: A tutorial

YS Shiu, SY Chang, HC Wu… - IEEE wireless …, 2011 - ieeexplore.ieee.org
… hiding is a method to embed private messages into a background signal or noise process. …
physical layer security against different attacks. We can classify the existing physical layer

Physical-layer authentication

LY Paul, JS Baras, BM Sadler - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
process in the midst of interference. With our channel assumptions (Section II-B2), each block
suffers a random fade which affects the SNR . Our authentication process fixes … process to …

A survey of physical layer security techniques for 5G wireless networks and challenges ahead

Y Wu, A Khisti, C Xiao, G Caire… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
… This is particularly true for realizing network security since by exploiting the security
capacity and signal processing technologies at the physical layer and the authentication and …

[HTML][HTML] LTE physical layer: Performance analysis and evaluation

H Mousavi, IS Amiri, MA Mostafavi… - Applied computing and …, 2019 - Elsevier
… In this paper, the study of LTE PHY layer performance … throughput performance results
of LTE PHY layer provided. … Once the layer mapping is done, the process of precoding of …