Ara
Toplam kayıt 6, listelenen: 1-6
Iterative tap pursuit for channel shortening equalizer design
(Institute of Electrical and Electronics Engineers Inc., 2018)
In this work, an iterative tap pursuit algorithm for designing channel shortening equalizers is proposed. Similar to pursuit algorithms, a residual vector is initialized with a desired target impulse response, which is ...
Secure and reliable IoT communications using nonorthogonal signals' superposition with dual-transmission
(Institute of Electrical and Electronics Engineers Inc., 2020)
Ensuring secure communication for internet of things (IoT) has drawn much attention because of the limitation in the use of conventional cryptographic techniques owing to the unique features of IoT devices such as low ...
Deep learning-assisted detection of PUE and jamming attacks in cognitive radio systems
(Institute of Electrical and Electronics Engineers Inc., 2020)
Cognitive radio (CR)-based internet of things systems can be considered as an efficient solution for futuristic smart technologies. However, CRs are naturally vulnerable to two major security threats; primary user emulation ...
Physical layer security designs for 5G and beyond
(Institution of Engineering and Technology, 2020)
Physical layer security (PLS) has emerged as a promising and powerful concept for securing future wireless technologies, including fifth generation (5G) and beyond networks, as it has the potential to solve many of the ...
Flexible guard structure for timing synchronization in coordinated networks
(Institute of Electrical and Electronics Engineers Inc., 2022)
In this letter, a novel and flexible hybrid guard duration (HGD) based on zero tail (ZT) and cyclic prefix (CP) concepts is proposed for facilitating timing synchronization (TS) in coordinated multi-point (COMP) networks. ...
New physical layer key generation dimensions: Subcarrier indices/positions-based key generation
(Institute of Electrical and Electronics Engineers Inc., 2021)
In this letter, novel algorithms for secret key generation from the wireless channel in multi-carrier systems are proposed for ensuring the confidentiality and authentication in wireless communication systems. The novelty ...