Ara
Toplam kayıt 6, listelenen: 1-6
User association for enhancing physical layer security in heterogeneous network
(Springer, 2019)
In this work, a fair user association scheme is proposed for heterogeneous networks aiming to enhance physical layer security (PLS). More specifically, the user association problem is formulated as a Nash bargaining problem ...
Deep learning-assisted detection of PUE and jamming attacks in cognitive radio systems
(Institute of Electrical and Electronics Engineers Inc., 2020)
Cognitive radio (CR)-based internet of things systems can be considered as an efficient solution for futuristic smart technologies. However, CRs are naturally vulnerable to two major security threats; primary user emulation ...
New physical layer key generation dimensions: Subcarrier indices/positions-based key generation
(Institute of Electrical and Electronics Engineers Inc., 2021)
In this letter, novel algorithms for secret key generation from the wireless channel in multi-carrier systems are proposed for ensuring the confidentiality and authentication in wireless communication systems. The novelty ...
Primary user emulation and jamming attack detection in cognitive radio via sparse coding
(Springer, 2020)
Cognitive radio is an intelligent and adaptive radio that improves the utilization of the spectrum by its opportunistic sharing. However, it is inherently vulnerable to primary user emulation and jamming attacks that degrade ...
Wireless communication, sensing, and REM: A security perspective
(Institute of Electrical and Electronics Engineers Inc., 2021)
The diverse requirements of next-generation communication systems necessitate awareness, flexibility, and intelligence as essential building blocks of future wireless networks. The awareness can be obtained from the radio ...
Physical layer security for wireless sensing and communication
(Institution of Engineering and Technology, 2023)
Wireless physical layer (PHY) security has attracted much attention due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping, jamming, and interference. Physical Layer Security for ...