The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the huge growth in data traffic, the densification of the macro cell (MC) layer with low-powered small cell (SC) base stations (resulting in a heterogeneous network) will improve network performances in terms of radio coverage and capacity. However, this may influence the human exposure to radiofrequency electromagnetic fields (RF-EMFs). Through measurement campaigns in two different urban cities...
Small cells, novel low-powered base stations with local range, are nowadays investigated in order to improve the radio coverage and capacity in macro cell layer. The radio frequency exposure induced in such cells is unknown. Hence, we assess in this paper, through experimental measurements, the impact of an LTE small cell cluster on the radio frequency exposure induced by a mobile handset. With respect...
Secret key generation from the randomness provided by random channels is currently considered as one way to improve security in wireless communications at the physical layer level. However, the relation between the performance of SKG schemes and the characteristics of the radio channel has been moderately investigated. In this work, we evaluate the security performance through a simple channel model...
The goal of this work is to establish the accuracy of ray tracing to simulate the radio channel in a Physical Layer Security scenario, where two legitimate users try to take advantage of the intrinsic properties of the channel to generate a shared secret key inaccessible to an eavesdropper. A 3D Ray-Tracing software, including a diffuse scattering model, is employed to simulate spatial correlations...
In this paper, a new protocol is proposed for securing both authentication and communication in wireless public networks. It relies on the combination of two techniques presented in the article: Tag Signal (TS) and Secret Key Generation (SKG). First, tag signals are used to securely exchange identification information, perform Channel Frequency Response (CFR) and provide a controlled radio advantage...
In the recent years, a set of works have addressed inherent characteristics of the fading propagation channel in an information-theoretic framework oriented towards security. In particular, for cryptographic purposes, secure key bits can be extracted from reciprocal radio channels, seen as a shared source of randomness between any two entities. In this paper we intend to assess the impact of true...
Physical layer security is a method to ensure the confidentiality of a wireless communication from encryption keys exploiting the randomness of the reciprocal propagation channel between a pair of legitimate users, Alice and Bob. This confidentiality is achieved owing to the decorrelation between these channels and that experienced by a third terminal (Eve), acting as an eavesdropper. In this work,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.