Q Wang, W Wu, L Qian, Y Cai, J Qian… - China …, 2023 - ieeexplore.ieee.org
In order to improve the comprehensive defense capability of data security in digital twins (DTs), an information security interaction architecture is proposed in this paper to solve the …
Y Huang, W Li, J Lei - Iet Communications, 2018 - Wiley Online Library
A novel concatenated physical‐layer encryption (CPLE) scheme is proposed in this study, where better security can be achieved as well as reliability advantage. In CPLE scheme, the …
T Nazzal, H Mukhtar - 2021 4th international conference on …, 2021 - ieeexplore.ieee.org
In this paper, four physical layer security methods which are based on Orthogonal Frequency Division Multiplexing (OFDM) are evaluated and compared. The four methods …
In the 6G era, physical layer security (PLS) can be foreseen as a promising solution to enhance the security of future massive Internet of Things (IoT) applications relying on RF …
Purpose The technique for hiding confidential data in specific digital media by enhancing the graphical contents is known as watermarking. The dissemination of information over a …
Y Huang, J Lei, M El‐Hajjar, W Li - IET Communications, 2018 - Wiley Online Library
In order to solve the security problem for fading channel, a pragmatic physical layer encryption (PLE) scheme is proposed, which utilises diversity technique elaborately …
LP Qian, M Li, X Dong, Y Wu… - ICC 2023-IEEE …, 2023 - ieeexplore.ieee.org
Digital twin has been emerging as a promising paradigm that connects the physical entities and digital space, and continuously evolves and optimizes the physical systems. In this …
Without any doubt, wireless infrastructures and services have fundamental impacts on every aspect of our lives. Despite of their popularities, wireless communications are vulnerable to …
N Aldaghri, H Mahdavifar - IEEE Journal on Selected Areas in …, 2021 - ieeexplore.ieee.org
Cryptographic protocols are often implemented at upper layers of communication networks, while error-correcting codes are employed at the physical layer. In this article, we consider …