… Abstract—We analyze the physicallayer (PHY) security of a communication scheme … probability, and we show that the PHYsecurity can be considerably enhanced when multiple …
… [94] considered the problem of resource allocation scheme for physicallayersecurity in cooperative OFDM networks using amplify-andforward (AF) strategy. To maximize the secrecy …
… knowledge, and the achieved security can be quantified precisely. … schemes in addition to the exploitation of any available channel state information, physicallayersecurityschemes …
… This is important to evaluate the usefulness of the physicallayer based securityschemes and evaluate their performance in a practical transmission environment. Both WiFi …
YS Shiu, SY Chang, HC Wu… - IEEE wireless …, 2011 - ieeexplore.ieee.org
… schemes that could be used to achieve physicallayer … physicallayersecurity for wireless networks have been discussed in a tutorial manner. Numerous existing physicallayersecurity …
… to show the physicallayersecurity improvement by exploiting … direct transmission as a benchmark scheme, where the source … selection scheme for physical-layersecurity improvement. …
Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
… to implement any extra securityschemes or algorithms on other layers above the physical layer. This survey introduces the fundamental theories of PHY-security, covering confidentiality …
J Li, AP Petropulu, S Weber - IEEE transactions on signal …, 2011 - ieeexplore.ieee.org
… Although security is typically addressed via cryptographic … security at the physicallayer, following the pioneering work of [9]. Recently, wireless physical (PHY) layer based security from …
D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
… Before designing a secure transmission scheme with limited power and energy, we first analyse the factors of power consumption in wireless networks [163]. According to [164], the total …