A survey on wireless security: Technical challenges, recent advances, and future trends
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …
accessible to both authorized and illegitimate users. This completely differs from a wired …
NB-IoT security: A survey
In the past few years, the term Internet of Things (IoT) has become very prevalent. In IoT,
aggregation of data (from sensors) to processing the data (to the cloud) is energy constraint …
aggregation of data (from sensors) to processing the data (to the cloud) is energy constraint …
On Wireless Channels With -Antenna Eavesdroppers: Characterization of the Outage Probability and -Outage Secrecy Capacity
In this correspondence, we characterize the probability of secrecy-outage and the
asymptotic high-signal-to-noise ratio (SNR) ε-outage secrecy-capacity for a single-input …
asymptotic high-signal-to-noise ratio (SNR) ε-outage secrecy-capacity for a single-input …
EMF-Constrained Artificial Noise for Secrecy Rates With Stochastic Eavesdropper Channels
An information-theoretic confidential communication is achievable if the eavesdropper has a
degraded channel compared to the legitimate receiver. In wireless channels, beamforming …
degraded channel compared to the legitimate receiver. In wireless channels, beamforming …
Physical Layer Security over Tsallis Statistics for Wireless Communications with Hardware Impairments in the Presence of some Eavesdroppers
M Fatehi - International Journal of Theoretical Physics, 2023 - Springer
In this paper, considering Tsallis statistics, we investigate the problem of physical layer
security (PLS) in information theory. To do this, we choose q-exponential distribution to …
security (PLS) in information theory. To do this, we choose q-exponential distribution to …
Downlink Secrecy Rate Maximization for IRS-Aided Cell-Free Massive MIMO Networks: Analysis and Deep Learning Design
TN Tran, B An - 2022 13th International Conference on …, 2022 - ieeexplore.ieee.org
In this paper, we study to maximize the downlink secrecy rate for IRS-Aided Cell-Free
Massive MIMO (CF-mMIMO) networks. Particularly, firstly, we derive the signal to …
Massive MIMO (CF-mMIMO) networks. Particularly, firstly, we derive the signal to …
[PDF][PDF] Wireless information-theoretic security in an outdoor topology with obstacles: Theoretical analysis and experimental measurements
This paper presents a Wireless Information-Theoretic Security (WITS) scheme, which has
been recently introduced as a robust physical layer-based security solution, especially for …
been recently introduced as a robust physical layer-based security solution, especially for …
Wep, Wap and Wap2 wireless network security protocol: A compact algorithm:(wireless network security protocol)
A Badholia, V Verma… - … Conference on Computing …, 2019 - ieeexplore.ieee.org
The modern communication lies with the Wireless Network Systems (WNS). This paper
studies the three popular WNS protocols ie WEP, WAP and WAP2. The improved version of …
studies the three popular WNS protocols ie WEP, WAP and WAP2. The improved version of …
Wireless information-theoretic security for moving users in autonomic networks
This paper studies Wireless Information-Theoretic Security for low-speed mobility in
autonomic networks. More specifically, the impact of user movement on the Probability of …
autonomic networks. More specifically, the impact of user movement on the Probability of …
Refined model for calculation of limiting secret efficiency of Wi-Fi communication channel
The urgent problem of investigations in the field of wire less technologies the search of new
ways for raising the communication channels security not only on the information button the …
ways for raising the communication channels security not only on the information button the …