[PDF][PDF] Securing Physical Layer of 5G Wireless Network System over GFDM Using Linear Precoding Algorithm for Massive MIMO and Hyperchaotic QRDecomposition.
This paper introduces a novel voice encryption wireless system, which is based on
characteristics of massive Multiple Input Multiple Output (MIMO) wireless channel. By …
characteristics of massive Multiple Input Multiple Output (MIMO) wireless channel. By …
[PDF][PDF] Hyperchaotic modulo operator encryption technique for massive multiple input multiple output generalized frequency division multiplexing system
Fifth generation (5G) wireless communications technology has great challenges to ensure
security. Therefore, required a suitable approach to provide security. Using chaos theory in …
security. Therefore, required a suitable approach to provide security. Using chaos theory in …
Audio encryption–a chaos-based data byte scrambling technique
This study proposes an efficient audio byte scrambling technique using multiple chaotic
maps. The audio encryption scheme uses Henon map and chaotic economic map for …
maps. The audio encryption scheme uses Henon map and chaotic economic map for …
Hyperchaotic based encrypted audio transmission via massive MIMO-GFDM system using DNA coding in the antenna index of PSM
In recent times, due to the rapid growth in the use of modern wireless technologies and
networks, the number of users and devices has substantially increased. These technologies …
networks, the number of users and devices has substantially increased. These technologies …
Security analysis of encrypted audio based on elliptic curve and hybrid chaotic maps within GFDM modulator in 5G networks
Wireless communications face significant security challenges, so there is an ongoing
necessity to develop an appropriate security strategy to protect data from eavesdroppers …
necessity to develop an appropriate security strategy to protect data from eavesdroppers …
Design and implementation of speech encryption based on hybrid chaotic maps
A speech scrambling is an important method to enhance the information protection in
wireless communication systems. The main goal to achieve the security and high immunity …
wireless communication systems. The main goal to achieve the security and high immunity …
[PDF][PDF] A high security communication system based on chaotic scrambling and chaotic masking
This paper presents an efficient and high security communication system developed on two
encryption levels based on chaotic systems. The first level is chaotic scrambling, while the …
encryption levels based on chaotic systems. The first level is chaotic scrambling, while the …
Implementation of a chaos-based symmetric text encryption using Arduino microcontrollers
Over the last few years, security becomes more important in any communication system.
Several techniques have been implemented to transfer information in a secure way. One of …
Several techniques have been implemented to transfer information in a secure way. One of …
A review of Chaotic Maps used for Generating Secure Random Keys
BA Hameed, EK Gbashi - BIO Web of Conferences, 2024 - bio-conferences.org
The fusion of chaos theory and cryptography has yielded a dynamic landscape of innovative
solutions for safe random key generation. This paper presents a comparison of several …
solutions for safe random key generation. This paper presents a comparison of several …
Speech encryption using finite precision chaotic maps based stream ciphers
ZM Dawood, M Aboud, FS Hasan - Proceedings of the International …, 2019 - dl.acm.org
Efficient and simple design of speech encryption-based stream cipher is produced and
suggested in this paper with name finite precision chaotic map-based stream cipher (FPCM …
suggested in this paper with name finite precision chaotic map-based stream cipher (FPCM …