Search
Now showing items 1-6 of 6
Secure multiple-users transmission using multi-path directional modulation
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
This work introduces a physical-layer secure multiple-users communication scheme. Our scheme employs the multi-path nature of the wireless channel to provide a different secure communication link for each of the legitimate ...
Robust secret key extraction from channel secondary random process
(
John Wiley and Sons Ltd
, 2016 , Conference Paper)
The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ...
Channel secondary random process for robust secret key generation
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
Comparative simulation for physical layer key generation methods
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ...
Precoding-Aided Spatial Modulation for the Wiretap Channel with Relay Selection and Cooperative Jamming
(
Hindawi Limited
, 2018 , Article)
We propose in this paper a physical-layer security (PLS) scheme for dual-hop cooperative networks in an effort to enhance the communications secrecy. The underlying model comprises a transmitting node (Alice), a legitimate ...
Unleashing the secure potential of the wireless physical layer: Secret key generation methods
(
Elsevier B.V.
, 2016 , Report)
Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from ...