scholarly journals Analysis of the physical layer security enhancing of wireless communication system under the random mobile

2019 ◽  
Vol 13 (9) ◽  
pp. 1164-1170 ◽  
Author(s):  
Tengyue Zhang ◽  
Hong Wen ◽  
Jie Tang ◽  
Huanhuan Song ◽  
Runfa Liao ◽  
...  
2021 ◽  
Vol 336 ◽  
pp. 04005
Author(s):  
Jiawei Li ◽  
Ruixia Cheng ◽  
Junwen Zhu ◽  
Yu Tian ◽  
Yiwen Zhang

Unmanned aerial vehicle (UAV) is a flight device with power and energy based on computer program control, which has the characteristics of small size, light weight, high maneuverability and low cost. With its characteristics, UAV can play an important role in military and civil fields. However, due to the broadcast nature of wireless communication and inherent air-to-ground line-of-sight channel, UAV wireless communication system is more vulnerable to security threats. On the basis of traditional encryption technology, the secrecy capacity of the UAV communication system can be improved by introducing physical layer security. This article aims to study the security of the physical layer in the UAV communication system, and summarizes the latest research results on the safety communication involving UAVs on the physical layer, such as trajectory optimization, power allocation, user scheduling and cooperative UAVs. Further, some potential research directions and challenges in physical layer security of UAV system are discussed.


2013 ◽  
Vol 791-793 ◽  
pp. 2071-2075
Author(s):  
Zhi Yuan Shi ◽  
Chang Zheng Zhang ◽  
Cai Dan Zhao ◽  
Lian Fen Huang ◽  
Yi Feng Zhao

Authentication is the process where claims of identity are verified. Most mechanisms of authentication exist above the physical layer, though some exist at the physical layer often with an additional cost in bandwidth. This paper introduces a general analysis and design framework for authentication at the physical layer where the authentication information is transmitted synchronously with the data. By superimposing a carefully designed secret modulation (wavelet transform) on the waveforms, authentication is added to the signal without requiring additional bandwidth. Simulation results are given that demonstrate the potential application of this authentication technique.


Author(s):  
SHARMA POOJA ◽  
SHRIVASTAVA SHARAD MOHAN ◽  
MISHRA ANUJA ◽  
AGRAWAL PRACHI ◽  
PARGANIHA RAHUL ◽  
...  

Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1439
Author(s):  
Janghyuk Youn ◽  
Woong Son ◽  
Bang Chul Jung

Recently, reconfigurable intelligent surfaces (RISs) have received much interest from both academia and industry due to their flexibility and cost-effectiveness in adjusting the phase and amplitude of wireless signals with low-cost passive reflecting elements. In particular, many RIS-aided techniques have been proposed to improve both data rate and energy efficiency for 6G wireless communication systems. In this paper, we propose a novel RIS-based channel randomization (RCR) technique for improving physical-layer security (PLS) for a time-division duplex (TDD) downlink cellular wire-tap network which consists of a single base station (BS) with multiple antennas, multiple legitimate pieces of user equipment (UE), multiple eavesdroppers (EVEs), and multiple RISs. We assume that only a line-of-sight (LOS) channel exists among the BS, the RISs, and the UE due to propagation characteristics of tera-hertz (THz) spectrum bands that may be used in 6G wireless communication systems. In the proposed technique, each RIS first pseudo-randomly generates multiple reflection matrices and utilizes them for both pilot signal duration (PSD) in uplink and data transmission duration (DTD) in downlink. Then, the BS estimates wireless channels of UE with reflection matrices of all RISs and selects the UE that has the best secrecy rate for each reflection matrix generated. It is shown herein that the proposed technique outperforms the conventional techniques in terms of achievable secrecy rates.


Sign in / Sign up

Export Citation Format

Share Document