Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2793280
Abstract: In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jamming attacks only when it detects the legitimate transmission, known as the reactive jamming. Compared with the conventional constant jamming…
read more here.
Keywords:
iot;
game;
transmission;
legitimate user ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2024.3435938
Abstract: Physical-layer security techniques can be added on top of the cryptography-based security framework, mainly relying on the multi-antenna-based beamforming and artificial noise, where yet the high-cost multiple radio frequency (RF) chains are typically required. In…
read more here.
Keywords:
modulated bit;
time modulated;
time;
bit metasurface ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2017.2765500
Abstract: Transmit beamforming and artificial noise-based methods have been widely employed to achieve physical-layer (PHY) security. However, these approaches may fail to provide satisfactory secure performance if the channels of legitimate user (LU) and eavesdropper (Eve)…
read more here.
Keywords:
array;
user eavesdropper;
frequency;
physical layer ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Entropy"
DOI: 10.3390/e27040401
Abstract: Physical-layer (PHY) security is widely used as an effective method for ensuring secure wireless communications. However, when the legitimate user (LU) and the eavesdropper (Eve) are in close proximity, the channel coupling can significantly degrade…
read more here.
Keywords:
secure wireless;
antenna;
array;
legitimate user ... See more keywords