scholarly journals Secure Communication in Non-Geostationary Orbit Satellite Systems: A Physical Layer Security Perspective

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 3371-3382 ◽  
Author(s):  
Yeqiu Xiao ◽  
Jia Liu ◽  
Yulong Shen ◽  
Xiaohong Jiang ◽  
Norio Shiratori
2016 ◽  
Vol 114 (1) ◽  
pp. 19-26 ◽  
Author(s):  
H. Vincent Poor ◽  
Rafael F. Schaefer

Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.


2012 ◽  
Vol 11 (2) ◽  
pp. 852-863 ◽  
Author(s):  
Gan Zheng ◽  
Pantelis-Daniel Arapoglou ◽  
Bjorn Ottersten

2020 ◽  
Vol 10 (2) ◽  
pp. 9-17
Author(s):  
Tuan Nhu Nguyen

Abstract— To secure communication from the sender to the receiver in wireless networks, cryptographic algorithms are usually used to encrypt data at the upper layers of a multi-tiered transmission model. Another emerging trend in the security of data transmitted over wireless networks is the physical layer security based on beamforming and interference fading  communication technology and not using cryptographic algorithms. This trend has attracted increasing concerns from both academia and industry. This paper addresses how physical layer security can protect secret data compare with the traditional cryptographic encryption and which is the better cooperative relaying scheme with the state of the art approached methods in wireless relaying beamforming network.Tóm tắt— Việc bảo mật truyền thông vô tuyến từ nơi gửi đến nơi nhận thường sử dụng các thuật toán mật mã để mã hoá dữ liệu tại các tầng phía trên trong mô hình phân lớp. Một xu hướng khác đang được quan tâm rộng rãi là bảo mật tầng vật lý dựa trên kỹ thuật truyền tin beamforming và kỹ thuật tương tác fading kênh chủ động. Xu hướng này hiện đang được thu hút cả trong giới công nghiệp và nghiên cứu. Đóng góp của bài báo này là làm rõ khả năng bảo mật tầng vật lý và so sách chúng với phương pháp bảo mật dùng kỹ thuật mật mã truyền thống. Bài báo cũng so sánh hai kỹ thuật chuyển tiếp được sử dụng chính trong bảo mật tầng vật lý cho mạng vô tuyến chuyển tiếp là Amplify-and-Forward và Decode-and-Forward.


2021 ◽  
Vol 336 ◽  
pp. 04005
Author(s):  
Jiawei Li ◽  
Ruixia Cheng ◽  
Junwen Zhu ◽  
Yu Tian ◽  
Yiwen Zhang

Unmanned aerial vehicle (UAV) is a flight device with power and energy based on computer program control, which has the characteristics of small size, light weight, high maneuverability and low cost. With its characteristics, UAV can play an important role in military and civil fields. However, due to the broadcast nature of wireless communication and inherent air-to-ground line-of-sight channel, UAV wireless communication system is more vulnerable to security threats. On the basis of traditional encryption technology, the secrecy capacity of the UAV communication system can be improved by introducing physical layer security. This article aims to study the security of the physical layer in the UAV communication system, and summarizes the latest research results on the safety communication involving UAVs on the physical layer, such as trajectory optimization, power allocation, user scheduling and cooperative UAVs. Further, some potential research directions and challenges in physical layer security of UAV system are discussed.


Sign in / Sign up

Export Citation Format

Share Document