The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The reciprocity of the wireless and the randomness of channel characteristic is the basis of physical layer key generation technology based on the channel. The complete key generation technologies include five steps that channel probing, channel feature extraction, quantification, reconciliation and privacy application. There are many theories and simulation prove the feasibility of key extraction...
In this paper a physical layer authentication method is proposed to suit to time-variant wireless channels by taking advantage of the varied mutually orthogonal basis functions and the constant basis coefficients to approximate the state of separable paths, in which each sampling values of separable paths is related within a block transmission time in time-variant channels. Simulation experiments...
By manipulating both binary and non-binary resilient functions, a novel approach for generating security codes is introduced and their threshold probabilities are derived, which provides the security condition proof for the proposed security codes. In particular, by taking advantage of matrix general inverse algorithms the encoding method of the proposed security codes is derived and is practically...
The wireless networks lack a physical boundary due to the broadcasting nature of wireless transmissions. The security has become a critical concern in the physical layer of the wireless networks. In this paper, we propose a novel MIMO-aided security scheme. By exploiting an extra dimension provided by MIMO systems for adding artificial noise to the transmission process, which let the attacker's signal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.