Search
Now showing items 1-10 of 25
On Physical Layer Security in Energy-Efficient Wireless Health Monitoring Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In this paper, we investigate a multi-objective optimization framework for secure wireless health monitoring applications. In particular, we consider a legitimate link for the transmission of a vital EEG signal, threatened ...
3D Beamforming with Massive Cylindrical Arrays for Physical Layer Secure Data Transmission
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In this letter, a novel approach for physical layer security is implemented using massive cylindrical antenna arrays. A part of the arrays is used for transmitting a signal reliably from source to destination using highly ...
Precoded spatial modulation for the wiretap channel with relay selection and cooperative jamming
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
We propose in this paper a physical layer security (PLS) scheme for dual-hop cooperative networks in an effort to enhance the communications secrecy. The underlying model comprises a transmitting node (Alice), a legitimate ...
Secure multiple-users transmission using multi-path directional modulation
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
This work introduces a physical-layer secure multiple-users communication scheme. Our scheme employs the multi-path nature of the wireless channel to provide a different secure communication link for each of the legitimate ...
Robust secret key extraction from channel secondary random process
(
John Wiley and Sons Ltd
, 2016 , Conference Paper)
The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ...
3-D Stochastic Geometry-based Modeling and Performance Analysis of Efficient Security Enhancement scheme for IoT Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Internet of Things (IoT) systems are becoming core building blocks for different services and applications supporting every day’s life. The heterogeneous nature of IoT devices and the complex use scenarios make it ...
Channel secondary random process for robust secret key generation
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
Secret key generation based on AoA estimation for low SNR conditions
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable ...
Comparative simulation for physical layer key generation methods
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ...
I-SEE: Intelligent, Secure, and Energy-Efficient Techniques for Medical Data Transmission Using Deep Reinforcement Learning
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The rapid evolution of remote health monitoring applications is foreseen to be a crucial solution for facing an unpredictable health crisis and improving the quality of life. However, such applications come with many ...