Using information-theoretic constructions, it is possible to characterise the security of a communication system. This is called physical layer security. The intrinsic randomness of the …
C Liu, N Yang, J Yuan… - 2015 IEEE Globecom …, 2015 - ieeexplore.ieee.org
We propose a secure transmission scheme for a relay wiretap channel, where a source communicates with a destination via a decode-and-forward relay in the presence of spatially …
We investigate the scalability of a class of algorithms that exploit the dynamics of wireless fading channels to achieve secret communication in a large wireless network of n randomly …
N Arı, N Thomos, L Musavian - 2020 IEEE 31st Annual …, 2020 - ieeexplore.ieee.org
This paper studies the problem of secure communication from a transmitter to a receiver with the use of short packets under the existence of multiple eavesdroppers, who are …
M de Ree, G Mantas… - GLOBECOM 2022-2022 …, 2022 - ieeexplore.ieee.org
Communications, wired and wireless, have integrated various cryptographic techniques to ensure privacy and counter surveillance. These techniques have been integrated in most of …
B Dai, C Li, Y Liang, HV Poor - EURASIP Journal on Wireless …, 2020 - Springer
Physical layer security (PLS), which is based on information-theoretic principles of message confidentiality, has attracted considerable attention in recent years. This paper provides a …
HM Furqan, H Arslan - Flexible and Cognitive Radio …, 2020 - acikerisim.medipol.edu.tr
Physical layer security (PLS) has emerged as a promising and powerful concept for securing future wireless technologies, including fifth generation (5G) and beyond networks, as it has …
Security has emerged as one of the critical requirements of future wireless networks. Unlike traditional cryptography-based security, physical layer security (PLS) tends to exploit various …
Wireless communications, such as relay systems, ad hoc networks, and cellular networks, have been an indispensable part of our modern life, connecting us to the digital world …